Why do businesses pay ransomware when they have good backups? (2024)

Business Continuity,Security

Last year, the global damage from ransomware attacks was an estimated $20 billion—the highest yet. Companies around the world were in panic mode, some on the verge of partial collapse, and others already left in ruin. This year has been no different with ransomware attacks on the rise targeting some of the country’s largest industries such as the Colonial Pipeline and JBS Foods, which in turn left many people wondering why companies aren’t doing more to protect themselves?

The truth is, though many companies have backup systems in place for when such emergencies occur, many are unaware of how such systems will work and how they will keep their businesses afloat in the meantime. What’s even more concerning is that large companies like JBS are not the main targets—small businesses are. Many small business owners believe themselves immune to such attacks because they assume their information is relevant to them alone. But organized hackers are not interested in a small business’ data so much as they are interested in holding that data hostage in order to get what they really want—money. The results can be catastrophic for that small business, everything from losing credibility with ones clients and customers to ultimately paying a ransom to cybercriminals that one may never financially recover from.

Here’s why so many businesses end up paying the ransom and what companies need to do better in the future so they don’t end up in a similar fate:

Do the Math

Unfortunately, though most businesses have backup systems in place for natural disasters or emergency situations, most never take the time to figure out how long it will take to restore their files. These backup systems are complex—not something that can easily be restored within an hour’s time. As a result, cybercriminals are able to decrypt the files sooner than the backup systems can be restored.

The first thing your company must do is establish your RTO (recovery time objective) and your RPO (recovery point objective). Though these terms may sound similar, it is essential for your company to understand the difference.

RTO (recovery time objective) is the amount of time it takes to return to regular business practices after a natural disaster or cyberattack. In many instances, the extortion payment is only half the battle. What companies don’t realize is that the amount of time it takes for them to get back up and running can be just as, if not more, costly. “A steadily growing list of victimized companies have reported that other costs associated with an attack—downtime, lost sales opportunities, angry customers, the expense of attack mitigation and recovery, damage to company brand reputation, penalties for unmet contractual obligations to customers, and fines for non-compliance—make the cost of the ransom look trivial,” says Acronis.com.

That is why it is crucial for your company to identify your RPO (recovery point objective)—the point in time from which you want to recover your data. For example, if your company backs up its systems every day at midnight, the night before will essentially be your recovery point. It’s easy for one to assume that a company would back up its systems consistently—say, every hour. Unfortunately, every time a system is backed up, it creates additional copies of your company’s data and drives up the cost of offsite storage. That is why it is essential your company identify your ideal RPO. If you fail to do so, your business could find itself under complete collapse. Site outages usually cost businesses at least $20k for every day of downtime, with more than a quarter of organizations reporting that one day of downtime would cost over $100k. Once an organization sees how detrimental one day of downtime is to their company, many will give in and pay the ransom to keep their organization from going under.

Paying the Ransom Sets Up a Harmful Precedent

Paying the ransom is the last thing a company should do, but it is a decision that doesn’t come lightly. The FBI is just one of the top agencies that does not support paying a ransom in response to a ransomware attack. FBI Director Chris Wray recently pleaded with the public to avoid paying ransom money at all costs: “In general, we would discourage paying the ransom because it encourages more of these attacks, and frankly, there is no guarantee whatsoever that you are going to get your data back.” The Forbes Technology Council predicted that by the end of 2019, businesses would fall prey to a ransomware attack every 40 seconds. These numbers have only gotten worse since then. As a result, the FBI has seen cybercriminals ask for nearly triple the amount of money they have in previous years. Organizations no longer have the luxury of steering clear of such attacks on good faith and unchecked recovery processes.

But when companies fail to determine their RPO and RTO properly, some feel as if they have no other choice but to pay the ransom. Yet, preparing and bypassing such attacks is not impossible. All of these issues can be resolved with specific and detail-oriented action plans in place for how to handle such emergencies.

Have a Business Continuity Plan

The best thing your organization can do to protect itself against a cyberattack is to have a business continuity plan—a detailed outline of how your business will operate during short and long-term disruptions. This document will summarize your company’s processes, assets, personnel, partners, customers, and more—every aspect of the business that might be affected.

A business continuity plan is sometimes misidentified as a disaster recovery plan, but it is much more comprehensive. A disaster recovery plan mainly covers IT infrastructure and processes. That is why in the face of such large-scale disasters, it is imperative to have a thorough business continuity plan that covers every corner of the company. Once a disaster strikes, it is impossible to go back and plan a response. In order for your organization to survive a cyberattack without paying the ransom, you must be proactive. Otherwise, you risk losing everything you built.

Advantages to Having a Business Continuity Plan

The entire business landscape has changed with 13% of small business owners saying they rely more on technology than ever before due to the Covid-19 pandemic. With so many businesses now operating within a digital landscape, business continuity plans offer far more advantages and solutions with greater capabilities than in previous years. If your company is one of the hundreds of thousands of businesses that has now transitioned to a remote work environment, it is crucial to not only review, but reframe your plans for business continuity.

Review Your Current Plan

In order to avoid paying ransomware, the first thing your business must do is review its current business continuity plan. Pay attention to these six areas of development:

  1. Define the scope of your work: What does the plan cover and what are its objectives?
  2. Identify essential business areas: What are the elements of your business that are vulnerable to attack? (For the most part, this will include every department likely to be affected by the attack).
  3. Identify critical functions: What are the most vital operations of your business?
  4. Compare the business areas and functions: How are these systems integrated and how do they function alongside one another?
  5. Identify the RPO for each function: How much downtime is acceptable without sustaining too much financial risk and company reputation?
  6. Design a plan to maintain operations and minimize downtime: After assessing and evaluating your strategy, how can the plan be shared with individual stakeholders so that when an attack occurs, all parties involved will understand and undertake their given role(s)?

Reframe Your Current Plan
In reaction to Covid-19, we can look at your current business continuity plan and offer greater peace of mind and better forecasting for the tough times ahead with these four new areas of development:

  1. More comprehensive, solution-based capabilities: While past solutions relied on physical storage with slower response times, today’s options are greater with much more fluidity and connectivity.
  2. Minimal to no downtime: With the high cost of downtime being one of the number one reasons companies submit to paying ransomware, this area was essential to reframe. New business continuity plans ensure that clients and customers experience little to no downtime even while recovering from an attack.
  3. Unlimited data storage: Backup systems used to be stored in separate facilities, sometimes miles from central business operations. With the advent of cloud networks, data can be stored in architectures that are easily accessible and organized.
  4. Backups for various systems: A modern business continuity plan will provide security to individual systems and hardware to function properly. These solutions will not replace existing systems, but rather, support current systems to maintain operation.

Be Proactive. Be Prepared.

The reason why so many businesses end up paying ransomware when they have good backup systems is because they are not prepared. They either set up backup systems without testing them, or fail to write up a business continuity plan and then scramble in the face of a cyberattack. The best thing your business can do to survive a cyberattack is to be proactive. In our current times, data security and recovery is the last place to cut corners. If you have questions about how to review or reframe your current business continuity plan, contact us today to see how we can be of service.

Why do businesses pay ransomware when they have good backups? (1)

Tags: Business Continuity, Security

Subscribe to our Newsletter

Don’t miss out on the latest news from Entech. Submit your e-mail to subscribe to our monthly e-mail list.

Why do businesses pay ransomware when they have good backups? (2024)

FAQs

Why do businesses pay ransomware when they have good backups? ›

Ransomware is Targeting your Backups

Why do companies pay ransomware? ›

Once an organization sees how detrimental one day of downtime is to their company, many will give in and pay the ransom to keep their organization from going under. Paying the ransom is the last thing a company should do, but it is a decision that doesn't come lightly.

Why is backup important in ransomware? ›

A backup is a copy of your data stored in a separate location from your primary systems. If your primary data is compromised or encrypted by ransomware, you can restore your data from a backup, effectively neutralizing the attack.

Should you pay ransomware or not? ›

Payment can encourage criminal behavior to continue,” DeGrazio said. “Even if the ransomware is paid, there is no guarantee that the decryption keys will work or that the threat actors will keep promises to not release sensitive data or extort the victim.”

Why shouldn t you pay the ransom demanded by ransomware? ›

Risk of repeat attacks.

Paying the ransom may seem like the quickest way to find your way out of a ransomware attack. Unfortunately, organizations that hackers know are willing to pay are often targeted repeatedly. So giving in to a ransom demand actually does more harm than good.

How does ransomware make money? ›

Attacks on Individuals

Once they do, the hacker's ransomware infects their computer. At that point, the ransomware will often encrypt large swaths of the user's data and trigger a message to appear with the hacker's ransom. It will include a demand for a certain amount of money in exchange for the data to be decrypted.

Should companies pay ransomware demands? ›

In general, the FBI advises that organizations refrain from paying ransoms because it simply emboldens malicious actors by telling them that extortion works.

Are backups no longer effective for stopping ransomware attacks? ›

Although backups won't make your data more secure, they can improve your recovery time and lower your costs after a ransomware attack. Prevention and disaster recovery strategies are essential, with the average ransom payment creeping up to $500,000 and the total costs averaging over $4.5 million.

What is a good backup plan in case of ransomware? ›

It is still embarrassing to any company to report a data breach, but much less embarrassing when the exfiltrated data is useless to thieves. Use the 3-2-1 backup strategy—This practice calls for having at least three copies of data. Two are kept on-site but on different media. At least one copy is kept offsite.

Why is ransomware so successful? ›

The primary reason behind the surge in ransomware attacks is that it helps cybercriminals make money easily. Ransomware attacks have devastating effects on targeted systems, rendering files and data inaccessible and taking businesses and services offline.

What if you don't pay ransomware? ›

The options for dealing with a ransomware attack may look bleak — lose your data if you don't pay and lose your information if you do. Yet if your organization is victimized by a ransomware attack, complying with the demand for funds is never the ideal solution.

Does ransomware go away if you pay? ›

Paying the Ransom Won't Guarantee You Get Your Data Back

For another 29%, more than half of their stolen data remains encrypted. This means it's extremely unlikely you'll get all of your data back, even if you pay.

Do you get your files back if you pay ransomware? ›

Paying the ransom does not guarantee the encrypted files will be released; it only guarantees that the malicious actors receive the victim's money, and in some cases, their banking information. In addition, decrypting files does not mean the malware infection itself has been removed.

Is paying ransom now illegal? ›

U.S. law criminalizes receiving, possessing, or disposing of money that at any time has been delivered as ransom for a kidnapping. 1 There is no generally applicable law prohibiting individuals or organizations from paying ransoms for the return of individuals or goods.

Is paying ransom unethical? ›

The Ethical Considerations of Paying a Ransom

First and foremost, paying a ransom does not guarantee that the attacker will release the decryption key or unlock the system. Furthermore, by paying the ransom, victims indirectly fund criminal activities and potentially enable further attacks against other organizations.

How often do companies pay ransomware? ›

By the numbers: 29% of organizations paid a ransom in the last quarter of 2023 to get their stolen data back and unlock their systems during a cyberattack, according to Coveware's report, released Friday. That's a completely different story from the 85% who were paying in the first quarter of 2019.

Is it legal for companies to pay ransomware? ›

In the United States, it is generally legal to make ransom payments. However, cybersecurity experts and law enforcement agencies strongly discourage organizations from doing so.

Is it ethical to pay ransomware? ›

However, this approach is fraught with ethical concerns. First, paying the ransom can be seen as funding criminal activities. This not only perpetuates the ransomware business model but also potentially finances other forms of cybercrime.

What happens if you don't pay ransomware? ›

The options for dealing with a ransomware attack may look bleak — lose your data if you don't pay and lose your information if you do. Yet if your organization is victimized by a ransomware attack, complying with the demand for funds is never the ideal solution.

Top Articles
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 5347

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.