Here are the tips and strategies that governments around the world can take away from the cyberattack and the recovery lags

This, according to Hall, includes incorporating advanced data backup and recovery systems into its data centers that will enable them to restore business operations rapidly. Other baseline characteristics of a mission critical disaster recovery system are:

  • Having immutable data snapshots and rapid restore solutions to reduce recovery time from weeks to hours.
  • Secure up-to-date offline backups to enable public agencies to restore systems independently, eliminate reliance on cybercriminals’ decryption keys and undermine the ransomware attacker’s business model.
  • A paradigm shift (in the case of Indonesia) to focus on maintaining uninterrupted operations and protecting critical services as legacy data storage solutions are no longer adequate. Traditional tape or disk-based backups are generally optimized for backup purposes but are often not efficient for recovery, often resulting in lengthy restoration times and high failure rates.
  • Advanced flash-based storage that offer recovery speeds of hundreds of terabytes per hour to restore ransomware-immune backups typically within minutes or hours, at any scale.
  • A focus around developing a comprehensive data protection strategy that both protects critical systems and restores them as quickly as possible.

Despite unanswered questions, the government of Indonesia is lauded for its decision to reject payment of the ransom despite having a non-resilient disaster recovery system. This leads to the question: should any corporate victim of ransomware have any reason to pay the cybercriminals? The answer and the mantra to live by is, Do Not Pay, because:

  • Each ransomware payment has been known to fund up to 10 or more future cyberattacks, as one meta-analysis suggests.
  • Prevention is better than payment since the latter in no way guarantees that the attackers will keep their word after receiving payment, or will not treat the victim organization as a weak target ripe for repeated attacks in future.
  • Payment is illegal in some countries, and more governments will ban it in future, so taking the easy way out today is not a sustainable strategy for tomorrow.
  • Paying ransoms renders defense teams vulnerable to complacency, which invites repeat (and likely more sophisticated) attacks. Reinfections are also a higher risk since the teams will not be motivated to reinvent their security processes to the level expected of them.
  • Resisting payment also stress-tests a firm’s holistic defenses, which is a good thing for the longer term.
  • Surveys suggest that paying ransoms doubles the overall cost of recovering from a ransomware attack, shifting the responsibility to investors/shareholders/insurance coverage, and raising doubts about a firm’s priorities and brand of ethics and accountability.
  • Cyber insurance policies now reward the cyber diligent, and will consider firms with a history of paying ransoms unfavorably.