www.helpnetsecurity.com Open in urlscan Pro
44.229.104.176  Public Scan

URL: https://www.helpnetsecurity.com/2023/10/30/holistic-ransomware-strategy/
Submission: On October 31 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1698718597"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Help Net Security
October 30, 2023
Share


COMPANIES SCRAMBLE TO INTEGRATE IMMEDIATE RECOVERY INTO RANSOMWARE PLANS



More than one-third of companies still do not have a well-rounded, holistic
ransomware strategy in place, according to Zerto.




IMMEDIATE RECOVERY CRUCIAL FOR BUSINESSES’ SURVIVAL

The survey also found that companies are reevaluating their data protection and
cyber resilience strategies to align more closely with the threats they are
facing.

The report shows that 35.4% of companies are not prioritizing recovery. This is
concerning as ransomware actors are becoming more capable of impounding data.
Businesses will suffer wide-ranging consequences if they cannot recover and get
back up and running immediately on their own behalf.

In all, just over half of the companies surveyed (56.6%) focus on both recovery
and prevention. This indicates that a holistic view is far from widespread
amongst those surveyed.

“It is natural for companies to start by building a robust prevention strategy
focused on thwarting attacks,” said Caroline Seymour, VP of product marketing at
Zerto. “However, as attacks become more sophisticated and capable of breaching
prevention measures, prioritizing recovery must be a key element of a modern,
multi-layered approach. It’s just as crucial as prevention, if not more, in the
current threat environment.”

The survey also found that 66.2% of companies are reevaluating their data
protection and cyber resilience strategies. This is a positive sign as it shows
that companies are taking the threat of ransomware seriously.


REEVALUATING DATA PROTECTION IN THE FACE OF RANSOMWARE

Still, the fact that companies are reevaluating strategies they have in place,
especially considering that nearly two thirds (63.1%) of those surveyed have
multiple data protection and ransomware detection tools at their disposal,
signals that prevention is not enough and that legacy data protection falls
short.

“It’s encouraging to see that organizations are reevaluating their ransomware
strategies. For companies that have not put a focus on recovery, this is a step
in the right direction toward a more holistic ransomware strategy,” continued
Seymour. “One solution that companies should consider is isolated cyber vaults
that can employ a secure architecture to protect data and thwart ransomware.
Organizations should not rely on protection alone. That is a risk that can’t be
alleviated by insurance and preventative measures and is not worth taking. “

In addition, the survey found that obtaining cyber insurance requires a holistic
approach. For those utilizing cyber insurance, the underwriters that evaluate
applicants require backup, disaster recovery, detection, and data vault
capabilities to approve policies. This shows that those who are in the business
of financially protecting against ransomware threats require policy holders to
protect their data in a comprehensive fashion.

The survey’s findings suggest that companies need to reevaluate their ransomware
strategies and adopt a more holistic approach that includes recovery, data
protection, and cyber insurance. By doing so, companies can better protect
themselves from the devastating financial and operational consequences of a
ransomware attack.





More about
 * cyber insurance
 * data protection
 * disaster recovery
 * ransomware
 * report
 * strategy
 * survey
 * Zerto

Share


FEATURED NEWS

 * F5 fixes critical BIG-IP vulnerability, PoC is public (CVE-2023-46747)
 * Citrix Bleed: Mass exploitation in progress (CVE-2023-4966)
 * Logging Made Easy: Free log management solution from CISA

eBook: Cybersecurity career hacks for newcomers



SPONSORED

 * eBook: Cybersecurity career hacks for newcomers
 * Guide: SaaS Offboarding Checklist
 * Webinar: The external attack surface & AI’s role in proactive security




DON'T MISS

 * F5 fixes critical BIG-IP vulnerability, PoC is public (CVE-2023-46747)
 * Citrix Bleed: Mass exploitation in progress (CVE-2023-4966)
 * Logging Made Easy: Free log management solution from CISA
 * Google expands bug bounty program to cover AI-related threats
 * The dangers of dual ransomware attacks




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×