Most UK firms pay ransomware demands, despite ‘do not pay’ policies
With ransomware attacks on the rise, organizations are paying up but still take weeks to recover
Most "do not pay" ransomware policies in the UK aren't worth the paper they're written on, according to a new report.
While 94% of UK organizations have a policy not to pay out in the event of a ransomware attack, 97% of those that have fallen victim in the past two years have paid out a ransom.
The research, from data security and management firm Cohesity, polled over 900 IT and security leaders in the UK, US and Australia. It found that three quarters of respondents said their company would be willing to pay over £2.4 million to recover data and restore business processes, with four in ten saying the figure would be more than £4 million.
"Many organizations said they would pay a ransom to reduce disruption. Paying the ransom almost certainly results in a loss of some of the data," said James Blake, Cohesity's global head of cyber resiliency GTM strategy.
"Not to mention we’ve seen the UK sanction ransomware operators; the last thing senior management need after dealing with a ransomware attack is the prospect of a huge fine or custodial sentence for breaching sanctions."
More than eight in ten (83%) respondents said they'd fallen victim to a cyber attack in the second half of last year and 95% believe that the threat of cyberattacks to their industry will increase this year, with seven in ten predicting it will increase by more than 50%.
Respondents are also pessimistic about their ability to deal with incidents, with only a quarter having full confidence in their company’s cyber resilience strategy and its ability to address today’s challenges and threats.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Everyone said they needed more than 24 hours to recover data and restore business processes, with only one in ten saying their company could recover data and restore business processes within three days.
RELATED RESOURCE
Discover the different ways your businesses can use AI
DOWNLOAD NOW
A third (34%) said they would need one to two weeks to recover, and almost a quarter (24%) said they would need more than three weeks to recover data and restore business processes.
"The figures in the survey show huge deficiencies in an organization’s ability to achieve the required recovery times to avoid significant disruption," said Blake.
Respondents were keen to see improvements in executive awareness and responsibility for data security, with only three in ten saying their senior and executive management fully understands the "serious risks and daily challenges of protecting, securing, managing, backing up, and recovering data".
Four in five said executive management and boards should share the responsibility for their company’s data security strategy, while 64% said their company’s CIO and CISO, in particular, could be better aligned.
In terms of the effects of a successful data breach or cyberattack, the biggest concerns were brand and reputational damage, long-term operational outcomes and projects, a direct hit to revenue, and a loss of stakeholder trust, all cited by around a third.
"Cyber resilience and data security should be a holistic organizational priority because the use of data and technology occurs in every function by every employee," said Cohesity CEO and president Sanjay Poonen.
"The severe impact of a successful cyberattack or data breach on business continuity, revenue, brand reputation, and trust is enough to keep all business, IT, and Security leaders awake at night."
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Hackers are using LLMs to generate malicious JavaScript in real timeNews Defenders advised to use runtime behavioral analysis to detect and block malicious activity at the point of execution, directly within the browser
-
Developers in India are "catching up fast" on AI-generated codingNews Developers in the United States are leading the world in AI coding practices, at least for now
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposedNews No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems
-
The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible'News Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world
