www.helpnetsecurity.com
Open in
urlscan Pro
44.229.104.176
Public Scan
URL:
https://www.helpnetsecurity.com/2023/10/30/holistic-ransomware-strategy/
Submission: On October 31 via api from TR — Scanned from DE
Submission: On October 31 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1698718597"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
Text Content
* News * Features * Expert analysis * Videos * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * Please turn on your JavaScript for this page to function normally. Help Net Security October 30, 2023 Share COMPANIES SCRAMBLE TO INTEGRATE IMMEDIATE RECOVERY INTO RANSOMWARE PLANS More than one-third of companies still do not have a well-rounded, holistic ransomware strategy in place, according to Zerto. IMMEDIATE RECOVERY CRUCIAL FOR BUSINESSES’ SURVIVAL The survey also found that companies are reevaluating their data protection and cyber resilience strategies to align more closely with the threats they are facing. The report shows that 35.4% of companies are not prioritizing recovery. This is concerning as ransomware actors are becoming more capable of impounding data. Businesses will suffer wide-ranging consequences if they cannot recover and get back up and running immediately on their own behalf. In all, just over half of the companies surveyed (56.6%) focus on both recovery and prevention. This indicates that a holistic view is far from widespread amongst those surveyed. “It is natural for companies to start by building a robust prevention strategy focused on thwarting attacks,” said Caroline Seymour, VP of product marketing at Zerto. “However, as attacks become more sophisticated and capable of breaching prevention measures, prioritizing recovery must be a key element of a modern, multi-layered approach. It’s just as crucial as prevention, if not more, in the current threat environment.” The survey also found that 66.2% of companies are reevaluating their data protection and cyber resilience strategies. This is a positive sign as it shows that companies are taking the threat of ransomware seriously. REEVALUATING DATA PROTECTION IN THE FACE OF RANSOMWARE Still, the fact that companies are reevaluating strategies they have in place, especially considering that nearly two thirds (63.1%) of those surveyed have multiple data protection and ransomware detection tools at their disposal, signals that prevention is not enough and that legacy data protection falls short. “It’s encouraging to see that organizations are reevaluating their ransomware strategies. For companies that have not put a focus on recovery, this is a step in the right direction toward a more holistic ransomware strategy,” continued Seymour. “One solution that companies should consider is isolated cyber vaults that can employ a secure architecture to protect data and thwart ransomware. Organizations should not rely on protection alone. That is a risk that can’t be alleviated by insurance and preventative measures and is not worth taking. “ In addition, the survey found that obtaining cyber insurance requires a holistic approach. For those utilizing cyber insurance, the underwriters that evaluate applicants require backup, disaster recovery, detection, and data vault capabilities to approve policies. This shows that those who are in the business of financially protecting against ransomware threats require policy holders to protect their data in a comprehensive fashion. The survey’s findings suggest that companies need to reevaluate their ransomware strategies and adopt a more holistic approach that includes recovery, data protection, and cyber insurance. By doing so, companies can better protect themselves from the devastating financial and operational consequences of a ransomware attack. More about * cyber insurance * data protection * disaster recovery * ransomware * report * strategy * survey * Zerto Share FEATURED NEWS * F5 fixes critical BIG-IP vulnerability, PoC is public (CVE-2023-46747) * Citrix Bleed: Mass exploitation in progress (CVE-2023-4966) * Logging Made Easy: Free log management solution from CISA eBook: Cybersecurity career hacks for newcomers SPONSORED * eBook: Cybersecurity career hacks for newcomers * Guide: SaaS Offboarding Checklist * Webinar: The external attack surface & AI’s role in proactive security DON'T MISS * F5 fixes critical BIG-IP vulnerability, PoC is public (CVE-2023-46747) * Citrix Bleed: Mass exploitation in progress (CVE-2023-4966) * Logging Made Easy: Free log management solution from CISA * Google expands bug bounty program to cover AI-related threats * The dangers of dual ransomware attacks Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - monthly newsletter with top articles Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2023 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×