No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Battling Ransomware Means Combining Emerging Tech With Tried & True Methods

With potential for steep fines & reputation loss, non-compliance is a non-option

by Darren Williams
November 13, 2023
in Cybersecurity
ransomware on a computer

Effective cybersecurity measures aren’t cheap. In fact, one analysis pegged the expense at just under $5.5 million. But with that same study finding that the cost of non-compliance is nearly $15 million, BlackFog CEO Darren Williams suggests a proactive approach.

Ransomware attacks have come to pose one of the greatest cyber risks facing businesses today. These attacks pose a dual threat: immediate operational disruption and long-term legal and compliance challenges.

The average ransom payout has surged to over $258,000, a 13% increase in just six months, according to BlackFog’s State of Ransomware 2022 report. However, the real financial toll extends beyond the ransom. IBM’s 2023 Cost of a data breach report puts the average cost of a breach at $4.54 million, accounting for factors like downtime and reputational damage.

Regulatory penalties can escalate these costs far beyond the attack itself. GDPR fines reach up to 4% of a company’s annual global turnover or €20 million. In the U.S., California privacy laws allow consumers to seek damages between $100 and $750 per individual per incident.

High-risk sectors like healthcare and finance face additional regulatory layers. HIPAA fines can range from $100 to $50,000 per violation, with an annual cap of $1.5 million. Merchants under PCI DSS could face monthly fines between $5,000 and $100,000 for non-compliance.

Beyond financial repercussions, firms risk severe reputational damage. Regulatory investigations can result in negative news coverage and erode public trust, especially when industry-specific bodies like HIPAA or PCI are involved.

With all of these costs and compliance challenges, organizations must ensure they are taking action to reduce their exposure to a serious ransomware attack or data breach. This demands a proactive approach to get ahead of the problem.

Proactive security is essential

The adage “prevention is better than cure” holds significant weight in cybersecurity, especially when compliance is at stake. A proactive approach that reduces the chance of an incident is always ideal, but organizations often compromise based on their available budgets and resources.

Proactive strategies involve taking steps to prevent ransomware attacks before they occur. This includes regular software updates, employee training and a multi-layered security strategy. 

There should be a comprehensive data protection strategy serving as a living document that everyone in the business is aware of and can review regularly. It should cover both accidental data loss incidents and intentional security incidents like ransomware and data exfiltration attacks.

Regulators know there is no such thing as a 100% successful security strategy – determined adversaries will eventually penetrate even the best defenses. However, enterprises with a track record of taking threats seriously are considered more favorably when a breach does occur. For example, adhering to the NIST cybersecurity framework can demonstrate due diligence in maintaining a robust cybersecurity posture, thereby mitigating legal risks.

Certifications like ISO 27001 are also useful as a way of reassuring customers about their data security. These standards typically place strong emphasis on resilience to cyberattacks, as well as meeting data privacy requirements. Furthermore, organizations should consider undergoing regular third-party security audits to identify vulnerabilities and gaps in their security posture, which can be invaluable for demonstrating compliance during regulatory assessments.

Conversely, reactive strategies focus on actions taken after an attack, such as isolating affected systems and negotiating with attackers. While these measures are necessary for limiting damage, they often come too late to mitigate compliance issues. Organizations relying solely on reactive measures are more likely to face retribution from regulatory investigators.

While both proactive and reactive strategies have their place in an organization’s cybersecurity toolkit, the compliance implications of these choices are critical. A balanced approach that integrates both strategies can go a long way in maintaining compliance and safeguarding the organization’s critical data.

an illustration of a ransomware attack
Cybersecurity

Report: 80% of IT Professionals Expect to Increase Spending to Support Ransomware Payments

by Staff and Wire Reports
September 1, 2023

Ransomware continues to plague corporations, as according to a new survey, 65% of IT professionals say ransomware is one of their organization’s biggest survival threats — and for 13% of organizations, it’s the single biggest threat.

Read moreDetails

The most important data protection measures for compliance

A sound data protection strategy requires a multi-layered approach, combining several different tools and tactics to maximize the chances of averting an attack and minimizing damage.

Employ next-generation firewalls, antivirus tools, access management, comprehensive backups, and security information and event management systems for a multi-layered, defense-in-depth approach.

Consider advanced technologies like machine learning-powered analytics to build up a picture of what normal behavior looks like and automatically detect unusual activity. Implementing real-time monitoring and alerting systems can provide immediate notifications of suspicious activities, thereby allowing for quick remedial actions.

Organizations struggling to find the resources to man these systems internally should strongly consider implementing a security operations center (SOC) to continuously monitor and analyze its security posture and threat landscape on an ongoing basis.

Data loss prevention (DLP) tools can be used in identifying and controlling the flow of sensitive information within an organization. These tools facilitate data compliance and align with specific requirements of HIPAA and GDPR.

Anti-data exfiltration (ADX) is an emerging endpoint-based data protection and control technique that can proactively prevent data loss from an organization. Using behavioral monitoring, the technique can flag suspicious activities and block exfiltration attempts, providing further safeguards against data loss. These tools can also provide detailed post hoc analysis to identify the source of any breaches for both remediation and regulatory reporting.

Finally, encryption is a cornerstone of any robust data protection strategy. It ensures that even if data is accessed by unauthorized users, it remains secure. Most regulations now require all sensitive data to be encrypted both in transit and at rest.

Data protection compliance is a value, not a cost

The costs of implementing security measures is an investment with a tangible return. By integrating solutions to create a robust data protection ecosystem, organizations can provide safeguards against attacks and ensure ongoing compliance. This can significantly reduce the risk associated with regulatory penalties, offering a high return on investment. In fact, research indicates that while the average cost of compliance was $5.47 million, the average cost of non-compliance was $14.82 million.

Compliance with regulations governing the privacy and security of data can also be a competitive advantage. Moreover, it can open doors to markets with stringent data protection laws, expanding business opportunities. Although hard to quantify, these factors are invaluable in the long run and contribute to the organization’s stability, trust and growth.

Looking ahead

In an era marked by escalating cyber threats, robust data protection and compliance measures have never been more critical. Organizations must adopt a balanced approach, integrating proactive and reactive strategies to navigate the complex landscape of ransomware attacks and regulatory requirements. As we look to the future, the evolving nature of cyber threats and regulations will demand vigilance and continuous improvement.

Resilient businesses should be able to ensure their critical data is always available and accessible whatever happens. Figures from the Uptime Institute show that the cost of outages has grown significantly, making data resiliency a key part of any protection plan.

Businesses must have a robust incident response plan that outlines the procedures to follow in the event of a data breach or cyberattack. This can help minimize the impact and ensure a more coordinated response, which is likewise crucial for compliance. Enterprises should also invest in disaster recovery solutions and regularly test their effectiveness to ensure they can quickly recover critical data and systems in the worst-case scenario of their other measures failing.

The stakes are high, but the rewards — both in terms of security and compliance — are well worth the investment. By incorporating these practical insights into your data protection strategy, you can better prepare your organization for the challenges that lie ahead. With the right blend of proactive and reactive measures, coupled with a strong focus on compliance, organizations can navigate the complex cybersecurity landscape more effectively and securely.


Tags: Cyber RiskCybercrimeRansomwareReputation Risk
Previous Post

FinServ Cloud Data Management Survey

Next Post

Strange Bedfellows? Internal Audit Function Needs to Make Friends With ESG Metrics

Darren Williams

Darren Williams

Darren Williams, Ph.D., is a serial entrepreneur and founder of three technology startups over the past 20 years, two of which have been sold to public companies. He is currently the founder and CEO of BlackFog, a global cybersecurity company focusing on ransomware prevention and cyber warfare. Williams is responsible for the strategic direction and leads global expansion for BlackFog and has pioneered anti-data exfiltration technology for the prevention of cyber attacks across the globe.

Related Posts

matrix numbers cybersecurity concept

Why Scalable Global Frameworks Like ISO 27001 Matter

by Sam Peters
May 29, 2025

Updated security standard addresses modern threats with expanded digital protections

news roundup green bars

In-House Counsel Salary Increases Slow

by Staff and Wire Reports
May 2, 2025

Majority of execs predict rise in fincrime in ’25

cfpb building sign

What Does Weakened CFPB Mean for FinServ Compliance?

by Carrie Pallardy
April 30, 2025

State-level enforcement, private rights of action & public perception all call for staying the course

data abstract green purple

66% of CISOs Worry Cyber Threats Are More Advanced Than Companies’ Defenses

by Staff and Wire Reports
April 25, 2025

US business sector falling behind in adoption of renewable energy

Next Post
lush forest with data points called out

Strange Bedfellows? Internal Audit Function Needs to Make Friends With ESG Metrics

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights