A comprehensive lifecycle approach to ransomware defense

  • Solutions
  • Cybersecurity and Risk
  • Karl Klaessig
  • 2021
November 17, 2021

Ransomware defense: A man's left eye shows while binary code covers the rest of his face.

Ransomware continues to be a costly and growing problem. According to Infosecurity Magazine, the number of ransomware attacks grew 288% between the first and second quarters of 2021. Cybersecurity Ventures estimated a ransomware attack occurs every 11 seconds, Cybercrime Magazine reports.

The resulting price tag from ransomware is truly staggering. Cybersecurity Ventures further ransomware damages could cost victims approximately $20 billion globally in 2021, and that ransomware costs would increase to $265 billion by 2031.

Why ransomware defense efforts fail

Your technical and business managers may recognize the threat and high cost of this cybercrime, but ransomware defense strategies are too often haphazard.

Many organizations continue to treat ransomware as a technology or IT matter alone, or as a business continuity or cyber compliance controls issue—instead of developing a comprehensive ransomware defense program.

Ransomware is often thought of in the context of threat detection and response, but this viewpoint also comes with a host of problems. For example, security operations are often stymied by too many tools, manual processes, and limited security staff and skills.

This results in a perfect environment for ransomware adversaries to circumvent controls, encrypt data, extort victims, and demand ransom payments.

Countering ransomware: A 4-phase approach

To defend against ransomware, organizations like yours need to change their defense approach. The best way to ensure end-to-end cybersecurity is with a strategic, four-phase lifecycle program:

  1. Planning: Organizations need a specific plan focused on ransomware defense. This plan must be supported at all levels and across all departments—security, IT, compliance, risk, and business management.

  2. Prevention: Although no action will guarantee ransomware immunity, organizations can take pragmatic steps to make ransomware attacks less likely and more costly for cyber adversaries to conduct.

  3. Incident response: You need an incident response plan that’s been tested and fine-tuned.

  4. Continuous improvement: Once a ransomware attack is fully under control, organizations should strive for continuous improvement by taking steps, such as assessing all aspects of a ransomware event, conducting an impact analysis, and identifying an improvement plan.


Integrate security, risk, and IT technologies

Ransomware defense should be managed as a closed-loop lifecycle program with each phase influenced by its predecessor and impacting its successor. Because this demands tight coordination across security, risk, and IT technologies, ServiceNow offers a complete portfolio of IT, security, and risk management tools that spans all four phases of ransomware defense.

Learn more in the Enterprise Strategy Group white paper, A prudent approach to ransomware defense.

© 2021 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.

Topics

  • Total experience companies outperform: prism refraction with an arrow pointing to the right
    Employee Experience
    Survey says: Total experience-focused companies outperform
    Organizations are aligning employee experience and customer experience to create a positive total experience. See findings from the latest research.
  • 4 ServiceNow employees who worked on support case creation and auto-agent workflows
    Now on Now
    Streamlining support case creation and administration
    When customer feedback revealed areas ripe for improvement, ServiceNow employees listened and upgraded two support workflows: case creation and auto-agent.
  • Scaled Agile Framework (SAFe): business man looking at phone while standing on bridge overlooking a city
    IT Management
    How the Scaled Agile Framework (SAFe) truly supports business
    The Scaled Agile Framework (SAFe) delivery model can help IT leaders manage the transition from a stability-focused to a continuously evolving infrastructure.

Trends & Research

  • Total experience companies outperform: prism refraction with an arrow pointing to the right
    Employee Experience
    Survey says: Total experience-focused companies outperform
  • Customer service: smiling businessman on phone walking outdoors
    Customer Experience
    Survey: 3 tips to deliver world-class customer service
  • Enterprise SRE (site reliability engineering): where service reliability and business agility meet
    Application Development
    Service quality and the rising need for enterprise SRE

Year