Ransomware: to pay or not to pay

This is an opinion piece. The original article was first published on Linked In.

I’ve been reading some recently published articles about ransomware attacks in the United States and they got me thinking tangentially about issues of accountability and transparency.

The Washington Post published an article on 28 May about an attack that paralysed Baltimore’s city government in the USA for almost a month!

Try to imagine South Africa’s title deed property entity being down for a month and no-one being able to register transfers or purchases of properties. It would be a serious situation.

While the The Washington Post article is full of astonishing facts, the paragraph that really got me thinking was this one:

“It is tempting to view cybercriminals as extremely clever, capable of breaking through the strongest defenses put in front of them. The reality is that they often aren’t, if for no other reason than they don’t need to be.”

What they’re saying is that it doesn’t take a lot to launch an attack, and that many entities – public and private – don’t take basic precautions.

Again, quoting from the Baltimore example: “Nonetheless, basic cyber-hygiene, were it in place, could have greatly limited the damage in Baltimore or stopped the attack altogether. The ransomware, called RobinHood, worked only because city computers had not applied freely available software patches and were operating without effective backups.

Baltimore’s mayor has so far refused to pay the ransom of $100,000. Instead the city is trying to work around the problem.

Last year, the Atlanta Municipality spent $2,6 million to avoid paying the $51,000 ransom the attackers were asking.

Recently, Florida Town decided to pay $600,000 to attackers rather than go though the nightmare of work-arounds.

How would you feel if you were a rate and tax paying citizen of the Jhb municipality, and you heard that it paid more than R10-million to have its IT system “un-ransomed” because it was negligent in its cybersecurity approach?

Business is in the same boat

Equally, what about your business? If you experienced a ransomware attack, would you place the blame on yourself or your IT personnel for not taking enough care?

And when would you come clean that you’ve had a ransomware attack, especially if YOU can be found negligent?

Do you even know what you can do to protect yourself against ransomware attacks?

In another article on ransomware The Washington Post says: “The argument for refusing to put taxpayer money into malicious actors’ coffers is stronger. Morally, taxpayer money should not be used to reward criminal enterprises. Practically, if cities collectively stop providing that reward, hackers may pack up their keyboards. Every dollar or, more accurately, every bitcoin that cities turn over to cybercriminals encourages them to continue attacking, and it also gives them the resources to do so more effectively and more often.”

It even suggests passing a federal law to bar ransomware payments: “An anti-ransom law would be a dramatic step, but it’s the route to a dramatically positive result”.

Just imagine!

Are you aware of all the different types of cyber attacks?

Download this list as a PDF to arm yourself

Cyber attacks pdf

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

Does your business send bulk emails?

Learn all you need to know about Google & Yahoo’s new requirements for bulk email senders.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

This field is for validation purposes and should be left unchanged.

"*" indicates required fields

Hidden

Training

We also offer certified training packages The training will cover POPIA in general. We have two options available. Once off costs. Employee Awareness Training - R490 per candidate Senior Employees Awareness Training - R650 per candidate All prices exclude VAT

Company Structure

Are you part of a group structure?*
IronTree is committed to protecting and respecting your privacy, and we'll only use your personal information to administer your account and to provide the products and services you requested. From time to time, we'd like to contact you about our products and services, as well as any other content that may be of interest to you. If you consent us contacting you for this purpose please tick the checkbox below*

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

"*" indicates required fields

Hidden
Keep me up to date

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

Give us a call:

+27 87 943 2278

Send us a WhatsApp:

+27 66 372 4061

Drop us an email:

After hours support:

+27 72 595 1066

After hours hosting support:

+27 76 102 9813

Log a support request

The reseller zone is currently out getting a facelift as we look to integrate it with our backup platform, as it stands you can overview your clients on our new backup console. If you don't know what console that is, please reach out to us.

"*" indicates required fields

Hidden

I have read and understand IronTree Internet Services (Pty) Ltd's privacy notice.

This field is for validation purposes and should be left unchanged.
One of our team members will be happy to help answer any questions you have!
Just click the chat icon in the right-hand corner.