Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Wednesday, July 2
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Security Think Tank: Banning ransomware payments is not so straightforward
    Latest News

    Security Think Tank: Banning ransomware payments is not so straightforward

    TeamBy TeamApril 4, 2024No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Security Think Tank: Banning ransomware payments is not so straightforward
    Share
    Facebook Twitter LinkedIn Pinterest Email


    I can understand why Ciaran Martin has taken the position of advocating for legal controls on ransomware payments, and the logic behind this proposal is simple: criminal gangs are a business, using ransomware attacks to generate revenue. Like any business, they operate on the principle of return on investment (RoI). So, if ransomware attacks consistently yield no returns, then it is not profitable and those engaging in it will move on to something else.

    Not to mention, ransomware gangs are only getting greedier. It wasn’t so long ago that there seemed to be almost a sense of honour among them. Several prominent gangs publicly pledged not to attack healthcare organisations during the Covid-19 pandemic, for example. However, an advisory notice issued by the FBI in February for US hospitals highlights that this was a temporary truce at best, warning that ransomware gangs are specifically targeting US hospitals.

    Organisations that pay the ransom are also likely to be targeted again. Estimates from the NCSC suggest that around one-third of all organisations affected by ransomware are attacked again, with some experiencing multiple attacks in a year.  

    And finally, there’s no guarantee that paying the ransom will even get you your files back. Firstly, the criminals might not play fair. Secondly, they might choose to double or even triple dip on the ransom – you might have to pay to have your files decrypted, pay not to have your files released on the dark web, and even pay for the criminals not to tell your regulator or the Information Commissioners Office (ICO) about your breach.

    Those are some of the arguments for not paying. However, the issue is not that straightforward. Imagine a scenario where your company is under a ransomware attack, facing an existential threat. The dilemma becomes whether to pay up or refuse payment, risking the closure of the business and loss of jobs. Even if the attack might not directly finish off your organisation, the time it might take to recover could do so. Look at the example of the British Library – they were successfully attacked in October 2023, and as of March 2024, they are still not back to a full service – access to many of their online services is limited, and they estimate that it could take up to 12 months to recover fully.

    There are also practicalities to consider. If ransom payments were criminalised, it might discourage organisations from reporting these incidents, driving the illegal practice further underground and making it more challenging for law enforcement to track and address. Just as individuals are encouraged to report social engineering attacks they encounter; companies must also feel safe to report ransomware incidents without fear of penalisation.

    Both NCSC and the ICO currently ask that even if you’re going to pay the ransom, keep them informed, especially sharing information about indicators of compromise (IoCs) or how the attack succeeded. One of the few good things that has come out of the British Library attack is an in-depth report on how they were attacked, which can only help organisations in the future.

    How can we effectively reduce the number of ransomware attacks? The truth is, as humans, we are prone to errors, which can be exploited by cyber criminals. While security training can minimise these mistakes by encouraging individuals to be more cautious, human error can never be eliminated.

    A more sustainable approach is to focus on a multi-layered defence, emphasising security in design and hygiene practices. This involves integrating security measures into every level of an organisation’s operations, making it more difficult for cyber criminals to exploit vulnerabilities.

    Network design principles such as zero-trust should be incorporated to allow for quick isolation of infected machines and to limit and contain the spread of ransomware and other malware internally. Artificial intelligence (AI) could also play a role in bolstering cyber security. For instance, anomalous behavioural pattern matching would enable systems to quickly identify and isolate unusual behavioural patterns. For example, IBM’s X-Force report from 2023 suggested that machine learning algorithms had up to an 85% success rate in identifying ransomware attacks by analysing network traffic patterns. By quickly identifying and responding to unusual activities, such as the sudden encryption of large amounts of data, the impact of a ransomware attack can be more effectively mitigated.

    In essence, the key to addressing ransomware attacks might not lie solely in banning payments. Instead, a combination of strategies, including robust security measures, transparency, continuous education, and leveraging AI technology, could be a more effective way forward.

    John Scott is lead cyber security researcher at CultureAI

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      BenQ showcases next-gen Google-integrated education solutions

      July 2, 2025

      The road to quantum datacentres goes beyond logical qubits

      July 1, 2025

      Block by Block: The Student Skilling Journey

      July 1, 2025

      Cleverlike focuses on the real power in using games for education

      June 30, 2025

      Scattered Spider cyber gang turns fire on aviation sector

      June 30, 2025

      Forget Prestige. A New Ranking Shows Great Colleges May Be Close to Home.

      June 29, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202453 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202427 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202422 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202516 Views
      Reviews

      Salesforce Cloud: A Complete Guide for Beginners | Udemy Coupons 2025

      July 2, 2025

      RN Registered Nurse | Fremont 4

      July 2, 2025

      Svelte Kit Bootcamp: Basic to Advance Build 2 Real Projects | Udemy Coupons 2025

      July 2, 2025

      BenQ showcases next-gen Google-integrated education solutions

      July 2, 2025

      RN Emergency Department

      July 2, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      BenQ showcases next-gen Google-integrated education solutions

      July 2, 2025

      The road to quantum datacentres goes beyond logical qubits

      July 1, 2025

      Block by Block: The Student Skilling Journey

      July 1, 2025

      Cleverlike focuses on the real power in using games for education

      June 30, 2025

      Scattered Spider cyber gang turns fire on aviation sector

      June 30, 2025
      Latest Videos

      Navigate Your Marketing Career with Expert Mentorship | NIMS Academy Success Guide

      July 1, 2025

      Inside the World of Ethical Hacking in 60 Seconds | Cybersecurity Career

      June 30, 2025

      The TRUTH About Finance Jobs After MBA

      June 29, 2025

      Restart Your Digital Marketing Career in 2024 Before It’s Too Late!

      June 28, 2025

      I Break FOLTYN’S WIN STREAK in Roblox Rivals! Rage! #roblox #rivals #shorts #foltyn #gaming

      June 27, 2025
      Latest Jobs

      RN Registered Nurse | Fremont 4

      July 2, 2025

      RN Emergency Department

      July 2, 2025

      Designer – Workplace

      July 1, 2025

      Line Cook (PRN)

      July 1, 2025

      Real Estate Insights Writer

      July 1, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202531 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202521 Views
      Blog

      Why Community Is Your Most Valuable Career Asset In 2025

      June 28, 2025

      What Employers Are Really Looking For In Job Interviews

      June 27, 2025

      The Best Way to End a Cover Letter (With 4 Winning Examples)

      June 26, 2025

      5 Job Interview Secrets To Beat The Competition

      June 25, 2025

      10 Overused LinkedIn Buzzwords (And What To Say Instead)

      June 24, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT