Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
There’s no doubt that the thought of having their company featured in national headlines as a victim of yet another ransomware attack strikes fear in the hearts of executives. As a result, too many place their trust in the honesty of cybercriminals, and their cyber insurance coverage, as they make the decision to pay the ransom.
According to a survey conducted for the 2022 State of Ransomware Report by CyberRisk Alliance, 63% of respondents said their organizations paid the ransom, ranging from $100,000 to $1 million USD.
So, the real question becomes: Is paying the ransom the wrong thing to do, or simply prohibited? The answer doesn’t fit nicely in a yes or no convention–the closest answer is, it depends.
Although paying the ransom may seem like the only choice, it shouldn’t be the only one especially since there’s no guarantee that a payment will lead to recovery. In fact, it can even violate serious federal laws.
Cyber insurance has proven to be a partial solution. When cyber insurers have to make a payout, they lose money which will impact future insurance policies: Premiums will go up, coverage will go down, and more “good driver history” type enforcement will apply.
Implementing back-ups isn’t a perfect solution either, as they weren’t really designed to withstand intentional espionage and highly-targeted cyberattacks. You need more than a fix-it-after approach.
The best way to avoid paying the ransom is enabling rapid detection and response capabilities. The faster you identify the early stages of the attack (and there are plenty of indicators), the better chance you have of preventing your adversary from establishing a persistent connection that leads to a pervasive ransomware detonation and successful data exfiltration.
In fact, external IR firms have referred customers to engage MDR solutions after becoming a victim of a ransomware attack to strengthen their threat detection and response capabilities. Here are two examples:
Total Cost: $2,000,000
Total Cost: $1,000,000
Assuming you don’t catch the criminals in the act, rapid recovery is preferable to payment. With business continuity practices and recovery programs that emphasize cyber resilience in place, you can restore systems while mitigating prolific service outages. It doesn’t mean the criminals won’t be back, but the first score goes to you.
So, how do you establish controls and programs that detect and respond to a ransomware attack? Basic security controls drastically reduce the risk of a business disrupting ransomware attack and provide quick recovery methods that don’t rely on paying extortion fees for decryption keys. Here are my recommendations for your employees and your security team:
The legal landscape of ransomware attacks and data breaches has changed significantly over the last couple of years. Once protected by attorney-client privilege, incident response documents, executive decisions and potentially damaging budget exclusions can lead to expensive lawsuits. Plus, many government agencies are pushing a “don’t pay” ethos backed by restrictions, and even prosecution, if you make a payment to a known terrorist or a cybercriminal group. So, you need to do your homework before you decide to pay.
When faced with this decision, no one is going to make it for you. No one will indemnify your decision or alleviate knock-on liability. That’s only limited by the creativity of the plaintiff’s lawyers! So, engage experts who can help you plan and respond to a major incident like a ransomware attack.
Most importantly, you need to know your obligations. You need specific information to make informed decisions that are designed to minimize any negative impact.
I once had the privilege of meeting Bruce Mathison, the quarterback of the Buffalo Bills back in the 1980s. While trading a signed copy of my book for a signed copy of his rookie card, he gave me the best piece of wisdom when it comes to dealing with incidents out of your control. He said, “You don’t practice until you get it right. You practice until you don’t get it wrong.”
If you are faced with the untenable decision to pay a ransom, answer these questions before you do:
It’s important to note that when you answer those questions, especially on the issue of ransom payment itself, it’s not a yes or no exercise. You have to stand by your answers and possibly defend your decisions in court. This is a scenario to practice until you no longer get the answers wrong.
The reality is that the majority of companies that pay ransoms were prepared but didn’t see themselves as a target. Either they downplayed the risk, or overestimated their ability to defend against the cyberattack.
As cyberattacks increase to an all-time high, don’t be one of these companies. It’s better to err on the side of caution than be overconfident about your team’s capabilities to defend against an attack and then be forced to pay the ransom.
Get notified of the latest news, intel and helpful tools & assets. You can unsubscribe anytime.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.