{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

Eight Defences and Responses to Ransomware Attacks

If all companies followed these recommendations, ransomware would become a thing of the past.

Bryce Austin
Wed, 12/22/2021 - 12:03
  • Comment
  • RSS

Social Sharing block

  • Print
  • Add new comment
Body

There were seven people seated around the table: The CEO, the VP, the CFO, the special agent from the FBI, the owner, the forensics technician, and the company’s CISO (chief information security officer).

ADVERTISEMENT

“Don’t pay,” was the CEO’s vote. Same for the VP.

“Pay it,” was the owner’s response. The CFO nodded in agreement.

“Paying could be a violation of Federal law,” stated the FBI representative.

The CISO had a hard time getting words out, as this was the largest ransom that he had dealt with at the time. $1.2 million was a lot of money. “I don’t see another option given the status of our backups,” he said. “Either we pay the ransom, or we begin liquidating the assets of the company as soon as possible. Which is the lesser of two evils?”

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Comments

Submitted by Sergey Grigoryev on Wed, 12/22/2021 - 10:16

Great article.

Great article. Thanks, Bryce!

  • Reply

Submitted by William A. Levinson on Fri, 12/24/2021 - 22:59

This is valuable information

The offline backup you mentioned means ransomware can be disregarded.

I keep a system image with which to rebuild everything on my hard drive, and I keep an IDrive backup to ensure that my critical files cannot be lost.

  • Reply

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us