Commercial Insights

Eight Steps to Effective Ransomware Prevention

Sep 15, 2023 (updated May 24, 2024) • 10 mins
Bag of money icon
In 2023, corporations paid more than $1 billion in ransom to fraudsters.5

These aren’t trends any organization wants to continue, except criminal enterprises, of course. Companies must understand how to identify risks and develop a plan for ransomware prevention.


What is ransomware?

Ransomware is a form of malware that fraudsters use to gain access and control of a company's network. They then lock the network, deny access to business-critical data and demand a ransom. Often backup systems are also disabled to prevent network restoration.

Ransoms are usually paid in cryptocurrency because it’s hard to track. But even if the company pays or otherwise regains access to its data, there’s no guarantee that the criminals haven’t already sold it to others. Or that they won’t target the company again. In fact, hackers attacked 78% of companies that paid a ransom again, requesting a higher ransom from 63% of these organizations.6

Remember, these are criminals without a high moral compass. If you think your company is too obscure to target, think again. Ransomware attacks aren’t just targeted at critical infrastructure or blue-chip corporations, and their initial goal isn’t to collect money. While ransomware schemes are designed to hold corporate networks hostage, they begin the attack with data theft.

Rather than pondering the likelihood of an attack, ask yourself these important questions:

  • What’s at stake?
  • How long can my company operate without the most recent data?
  • What will be the long-term impact of a ransomware attack or our response?

Carefully consider not only the fiscal impact of an incident, but also the potential effects on your reputation, your customers, partners, and suppliers.


Which industries are most often attacked?

In 2023, healthcare (including public health) was the most targeted industry of all sectors attacked (see Figure 1). Critical manufacturing, which includes transportation, energy, water and utility systems and the government sector followed. Manufacturers, along with technology companies are targeted for proprietary intellectual property such as patents and processes. Financial services companies are obvious targets for consumer and business transactional data.

Figure 1

Source: Federal Bureau of Investigation, “Internet Crime Report,” 2023

Any organizations that collect PII, such as social security numbers, logins, and other sensitive data are frequently attacked to steal the data, which they can ransom and/or sell. For these organizations ransomware protection is imperative.


Be proactive to prevent ransomware.

Safeguarding the network, systems and data from any type of fraud should be every company’s overarching goal. So, it’s important to configure systems to achieve a strong security posture that reduces overall risks as well as prevents ransomware attacks.

  1. Limit publicly shared and accessed information.

    Fraudsters carefully study organizations before launching attacks. Social media and other online resources are treasure troves for spear phishing, which targets specific individuals and companies for details like job titles, interests, etc. Your social media policy should limit work-related information shared and online policies should limit the types of sites employees can access.

  2. Implement a multi-layered security solution.

    Threats are constantly evolving. Your system and network protection should as well. The more layers, the harder it will be for fraudsters to penetrate your network. Focus on monitoring and prevention. It starts with an effective password manager and security system that denies fraudsters access. Multi-factor authentication further strengthens efforts to prevent unauthorized access.

    Intrusion detection systems (IDS) scans network traffic logs for potentially malicious activities and issues alerts if any are found. Intrusion prevention systems (IPS) continuously monitor the network, blocking and reporting any malicious actions.

    Antiviral and anti-malware software detect and remove malicious files, protecting against ransomware. Secure every device that touches your network. Out-of-date or jailbroken devices create open doorways for hackers. Also, secure and monitor remote desktop protocol (RDP).

    If you haven’t performed a security audit in a while, now’s the time. You need to know where vulnerabilities lie and how to address them.

  3. Update systems regularly.

    Your network design, implementation and maintenance can be a lifeline. Up-to-date hardware and software are simply harder to hack. Be sure you’re working with a nimble IT team that’s aware of the latest threats and countermeasures.

    Insist on frequent network audits and scans for new accounts, open ports, and unusual remote connections. For example, some ransomware uses RDP and server message block to launch attacks – for ports 3389 and 445, respectively. Determine whether these ports should be accessible to only trusted hosts. Review both onsite and cloud settings.

    Always apply security patches as they are released, automating this task if possible.

  4. Systematically back up data.

    Consistently backing up data ensures a recent copy is readily available. Ransomware can encrypt backup drives. So, if you’re using a device, disconnect the drive after backing up data. Consider offsite storage and the cloud to further isolate your information. You’ll be able to return to a previous version that hackers haven’t encrypted. However, always test files before and after backup to ensure you haven’t saved infected files and protect against ransomware.

  5. Create an incident response and disaster recovery plan.

    As equally important as ransomware prevention is a plan for how to manage it should an incident occur. Your employees will need to know exactly what to do if your data is compromised or your network is disabled.

    An incident response plan establishes company-wide policies, roles and responsibilities to guide teams during a security event. As well as instructions, it should also provide a list of contacts and details for how and when to inform employees, customers and vendors.

    A disaster recovery plan is a comprehensive guide detailing steps to recover as quickly as possible from unexpected events. These may include cyberattacks, natural disasters or any business disruptions.

  6. Restrict administrative rights.

    Limit employees’ ability to install software as well as access to certain data. Only share sensitive information on a “need-to-know” basis. Group Policy Objects, a collection of client and system control settings, provide rules and restrictions for file executions. This further reduces the risk of installing malicious software and protects against ransomware.

  7. Train employees, remind and repeat.

    Employees look for ways to efficiently accomplish often overwhelming workloads, which can lead to shortcuts or distractions. Fraudsters count on less attention to detail. Remind staff not to click on unfamiliar or suspicious links. Of course, everyone knows this. But given the sophistication of today’s cyberattacks, it can be hard to discern a legitimate email link from a phishing scam.

    Employees may be confident enough in their IT network to think “a breach can’t happen here.” Train them to recognize and protect against ransomware themselves. Because cybersecurity may not be top of mind, frequent reminders and repetition are key.

  8. Report threats immediately.

    Don’t hesitate to report an attack – even if you’re not certain there is one. The FBI encourages reporting suspicious or criminal activity to your local FBI field office or its 24/7 CyWatch team, available by email at CyWatch@fbi.gov or by phone at 855-292-3937.

If you see suspicious activity, it may already be too late. For example, BlackCat breached Change Healthcare’s portal nine days before demanding ransom. Develop an end-to-end plan to prevent ransomware before its needed.


Invest in cyber liability insurance for additional ransomware protection.

Cyber liability insurance covers a range of incidentals related to cyberattacks, including forensic investigations, regulatory fines, legal fees, business disruption and preventative measures. “Cyber extortion coverage” for investigation, ransom negotiation and payment can also be included in insurance packages.


Need help with ransomware prevention strategies?

Fraud is an ongoing problem but help is available. You can turn to local law enforcement, government agencies and professional associations for assistance.

  • The FBI offers definitions and tips to recognize this and other types of fraud, as well as news. You can download a guide entitled “How to Protect Your Networks from Ransomware.”

  • U.S. Cybersecurity and Infrastructure Security Agency (CISA) offers many services, including free scanning and testing, malicious domain blocking and reporting, and an annual assessment. CISA has a comprehensive site that also features links to contact agency regional directors, as well as access to industry information, training, tips and news.7

  • The U.S. Secret Service, through its Cyber Fraud Task Forces, helps law enforcement, companies and educational institutions investigate financial fraud. The agency also offers a “Guide to Ransomware,” other tools to prevent cyber incidents, and contact information for field offices.8

We can also help with ransomware prevention. If you’d like to learn more, complete a short form and a Synovus Treasury & Payment Solutions Consultant will contact you with more details. You can also stop by one of our local branches.
Related

Fraud and Risk Management

How to Prevent Phishing and Other Business Fraud

Last year, phishing was the leading fraud claim and the second costliest in FBI investigations. Corporations must know how to prevent phishing to avoid fraud losses.
Article 4 mins

Fraud and Risk Management

BEC Fraud: The Rising Threat in Your Inbox

Any business that uses email is at risk of fraud. A sound risk management strategy can help prevent falling victim to email scams.
Article 5 mins

Fraud and Risk Management

Electronic Payments More Secure Alternative to Paper Checks

The Federal Reserve collected more than 3.1 million commercial checks last year. Yet, checks are most susceptible to fraud. Companies must take action to prevent fake check scams.
Article 9 mins
Recent

Important disclosure information

This content is general in nature and does not constitute legal, tax, accounting, financial or investment advice. You are encouraged to consult with competent legal, tax, accounting, financial or investment professionals based on your specific circumstances. We do not make any warranties as to accuracy or completeness of this information, do not endorse any third-party companies, products, or services described here, and take no liability for your use of this information.

  1. Government Technology, “Dallas Cyber Attack More Extensive Than First Thought,” January 11, 2024 Back
  2. CFO, “85% of Cybersecurity Leaders Say Recent Attacks Powered by AI: Weekly Stat,” August 30, 2023 Back
  3. Cyberint, “Ransomware Recap: 2023 Report,” April 7, 2024 Back
  4. Federal Bureau of Investigation, “Internet Crime Report,” 2023 Back
  5. WIRED, “Ransomware Payments Hit a Record $1.1 Billion in 2023,” February 7, 2024 Back
  6. Infosecurity Magazine, “78% of Organizations Suffer Repeat Ransomware Attacks After Paying,” February 23, 2024 Back
  7. Cybersecurity and Infrastructure Security Agency, “Stop Ransomware” Back
  8. United States Secret Service, “Preparing for a Cyber Incident” Back