Skip to main

5 Ways to Deliver A Deadly Counterpunch to #Ransomware

Download Point of View
5 Ways to Deliver A Deadly Counterpunch to #Ransomware


By putting in place sound preventative measures, understanding the Cyber Kill Chain®, and knowing how to respond to a breach, you can lower your risk of infection and reduce the impact of a breach. Your goal is to be prepared with a plan if a breach occurs so it does not become a newsworthy and costly incidence by fending off the majority of attacks and dealing swiftly and smoothly with those that do manage to penetrate your defenses, you will help keep your business on track, your customers and employees protected, and your reputation intact.

With phishing sites growing by 640% in 20191, 65% of ransomware attacks delivered via phishing2 and 90% of corporate data breaches being caused by human error3, the threat of ransomware hangs over every IT professional. The average cost of a breach ranges from $5.11 million for large organizations to $2.65 million for smaller organizations. The global cost to victims of ransomware is estimated to be $20 billion in 2020.

Ransomware is a specific type of malware designed to encrypt a computer’s content until the user pays to get the recovery key. This effectively halts productivity, impacting business revenue. However, IT professionals can take decisive action to minimize both the threat and the impact of ransomware. Here, we define the preventative steps that can be taken to protect the enterprise against ransomware, examine how to limit the impact of a breach, explore where an in-process attack can be stopped, and discuss what to do if a hacker succeeds in gaining access.

1. Protect the Enterprise

2. Minimize the Impact

3. Break the Cyber Kill Chain®

4. Respond to an Attack

5. Lessons Learned

1 2020 Webroot Quarterly Threat Report, February 2020

2, July 2020

3, May 2019

Mathew Newfield

Mathew Newfield

Mathew Newfield is senior vice president and Chief Information Officer (CIO) of Unisys. The Chief Security and Infrastructure Officer (CSIO) organization comprises the former Unisys Information Technology (UIT) and Chief Information Security Office (CISO) organizations. It is responsible for delivering secure solutions that enable the company to serve its clients more effectively and for providing internal IT and security services across the enterprise.