Global Column | What is the minimum countermeasure against ‘ransomware of any size’?

Steven J. Vaughan-Nichols | Computerworld

I’ve heard countless times that “my company is too small to be subjected to a cyberattack.” But this is wrong. There is no company big or small for ransomware attackers.
ⓒ Getty Images Bank

Cybersecurity firm Webroot recently published a report ‘The hidden cost of ransomwareAccording to ‘, 85% of Managed Service Providers (MSPs) report cyberattacks targeting small and medium-sized enterprises (MSPs). Despite the high figure, only 28% of small and medium-sized businesses are concerned about ransomware attacks.

Regardless of the size of the enterprise, ransomware attacks are something to be concerned about. This is because the era has come when anyone who needs vacation money can try a ransomware attack. Thanks to the Dark Web’s ransomware-as-a-service, a little bit of Bitcoin is enough to disrupt businesses.

According to security firm Sophos, ransomware-as-a-service accounts for 60% of all ransomware attacks. It is ironic that there are trust issues among ransomware attackers, but in the meantime, ransomware attacks continue.

A simple fact. A ransomware attack can waste weeks of labor and tens of thousands of dollars in ransomware attacks, even for small businesses that aren’t going to be asked for a headline ransom.

According to the Webroot report, 64% of businesses affected by ransomware have experienced business disruption, and 45% said that the disruption caused their business to suffer. Losses due to business disruption increased from $47,000 in 2020 to $141,000 in 2021. This excludes the average ransom price of $6,000 for a ransomware attack.

How to survive a ransomware attack?

A recent Cyberreason survey found that nearly half of respondents didn’t have the tools to fight ransomware attacks. They were particularly vulnerable to attacks that occurred on holidays. No one wants their PCs and servers infected with ransomware when they return to work after Thanksgiving.

I recently argued that Ransomware protection measures should be thoroughly prepared using EDR (Endpoint Detection and Response). However, some companies cannot afford to purchase and deploy a robust security system. These companies also have a way to respond to ransomware.

Getting started is simple. It’s about practicing basic security precautions and then watching the system operate safely over the next few weeks. According to the Verizon Data Breach Report 2021, 85% of data breaches involve employees opening phishing messages or being subjected to social engineering attacks such as pretexting.

Therefore, when dealing with someone, it is necessary to not only trust but also verify the identity of the other party and whether the information requested by the other party is absolutely necessary. It may sound like a paranoia, but if your opponent is really a cyber attacker, it’s not a paranoia. Unfortunately, there are many approaches in this way these days.

The basic security requirements are as follows.

  • Patches and updates operating systems to minimize vulnerabilities that cyber attackers can exploit.
  • If you don’t know exactly what new software you’re installing or what administrative privileges it grants, don’t install and allow it.
  • Never click a link in an email, instant message, or groupware like Teams or Slack unless you’re sure it’s safe.
  • Bitdefender Antivirus Plusme Check Point ZoneAlarm Anti-RansomwareBuy an easy-to-use and inexpensive endpoint security program like
  • Prepare at least three backups, including backup files that can be accessed without a network connection. After that, check that the backup data is in good condition and available for system restore.

Adhering to these basic security precautions will keep your system safe during the New Year’s holidays. Importantly, it is important to ensure that security compliance is maintained from now on until the business is sold. This is the minimal way you can protect your business from cyberattacks, including ransomware. [email protected]

Source: ITWorld Korea by

*The article has been translated based on the content of ITWorld Korea by If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!