Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used




Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used


This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties


Here are some suggested Connections for you! - Log in to start networking.

Thamer Noori
Director of Industrial Security and Safety Dept.
Rafal Jarosz
Managing Partner
Ayaz Khan
Manager operation
Alanoud Alaswad
Passenger Experience Specialists
Ilse Hess
Director, Talent Acquisition & Organizational Development

Ransomware Is a Growing Problem, How Do We Combat It? - Finnegan Pierson - Blog

Ransomware Is a Growing Problem, How Do We Combat It?

All cybersecurity threats can be dangerous, but one of the most dangerous types is ransomware. When a cybercriminal commits a ransomware attack, he or she can lock you out of your systems or data and hold them for ransom. It's vitally important that you find ways to protect yourself and recover from these attacks. Here are some methods people can use to combat ransomware.

  1. Follow Cybersecurity Best Practices

You may already be well-versed in cybersecurity best practices, or just starting out and learning such concepts as what is SSL, but whatever your level of understanding, it's important to follow best practices for your organization. Make sure you have a cybersecurity policy in place that includes what tools you use and how to use them. It should also include things that employees should do and be aware of to protect themselves, their work devices and your networkas what is SSL and data.

  1. Back Your Data And Systems Up and Update All Software Regularly And Safely

The main goal of a ransomware attack is to hold your systems or data for ransom. One of the most effective ways to combat these attacks is to regularly back your systems and data up. However, you must remember to do so safely. As long as you back files up to a secured location, one that is either out-of-band or offline, then they should be safe from would-be attackers or hackers. Then, if your systems do experience a ransomware attack, you'll be able to recover much more quickly because you'll have access to the most recent versions of your data and systems.

  1. Develop A Ransomware Prevention And Recovery Strategy

Whatever tools you choose to use, you should incorporate them into a prevention and recovery strategy. Your strategy should include an incident response policy. This type of policy ensures that everyone in your organization, and on your IT and cybersecurity teams in particular, knows what his or her role in the protection or recovery plan is. Make sure someone is entrusted with contacting any outside parties who need to be made aware of the situation and the actions you're taking to combat the attack, as well.

  1. Make Sure Employees Are Educated About Ransomware And Your Policy

Not only does each employee need to be aware of his or her role in your ransomware prevention policy, but each employee also needs to be educated about ransomware and how to effectively perform his or her role. Make sure employees are aware of social engineering attacks such as phishing and smishing. They should also be made aware of the risks of unsafe browsing, weak passwords and similar weak points. It's a good idea to implement yearly security training courses online or in-person so new employees can be brought up to speed and current employees can be reminded of these things and made aware of any new developments.

  1. Utilize Effective Ransomware Prevention Models

There are several network and connection security models that are effective against ransomware incursions. They include the zero-trust mode and network segmentation. Zero-trust models utilize several layers of authentication and access requirements. Instead of only needing to provide a password, an employee may also be required to provide a PIN, for example. This model also often requires role-based access control. Network segmentation involves dividing your network into smaller sub-networks to keep hackers from accessing your entire network.

Ransomware attacks can be frightening for everyone involved, from the leader of an organization to that organization's clients or customers. It's important to be as transparent as possible about your plans to combat ransomware attacks without giving away any details that might allow a cybercriminal to circumvent your security.

Publish Date: August 17, 2022 2:25 PM

About us - in 60 seconds!

Submit Event

Upcoming Events

The 19th AMERICAS Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...
Showing 1 - 1 of 3 items

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.

Industry Champion Award Leaderboard

Most active award entrants in the past 48 hours! - Vote for Others / About Program
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed = True
session blnCompletedAwardInterestPopup = False
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =