Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Mesa shuts down credit card that rewarded cardholders for paying their mortgages

    December 14, 2025

    India’s Spinny lines up $160M funding to acquire GoMechanic, sources say

    December 14, 2025

    Netflix growing up, data center jet engines, and the circular AI economy

    December 12, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Mesa shuts down credit card that rewarded cardholders for paying their mortgages
    • India’s Spinny lines up $160M funding to acquire GoMechanic, sources say
    • Netflix growing up, data center jet engines, and the circular AI economy
    • What most VCs won’t tell you about raising capital
    • Retro, a photo-sharing app for friends, lets you ‘time-travel’ through your camera roll
    • The market has ‘switched’ and founders have the power now, VCs say
    • Capital is a commodity (but your investor relationships aren’t)
    • Harness hits $5.5B valuation with $240M raise to automate AI’s ‘after-code’ gap
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Apps»Ransomware attacks can’t be eliminated, but collaboration can increase resilience
    Apps

    Ransomware attacks can’t be eliminated, but collaboration can increase resilience

    TechurzBy TechurzMay 20, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Representational image of data security
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Ransomware remains one of the most disruptive and costly cyber threats facing businesses and public sector organizations. In June 2024, a ransomware attack on Synnovis, an NHS laboratory services provider, resulted in £32.7 million in damages – over seven times its annual profits. This incident caused widespread disruption to medical procedures across London hospitals, further reinforcing the real-world consequences of such attacks.

    This is just one example of the many high-profile incidents that have occurred over the years, despite successful efforts by the UK Government and their allies to use various tools to disrupt and counter the operations of ransomware gangs.

    One tool under consideration by the UK Government is extending a ban on ransom payments beyond central government to all public sector bodies and Critical National Infrastructure (CNI) operators.


    You may like

    The aim is clear: reducing the financial incentives that sustain ransomware operations. While disrupting the revenue stream for cybercriminals is a logical step, it raises a critical question: will this make the public sector and CNI more resilient?

    Justin Kuruvilla

    Social Links Navigation

    Chief Cyber Security Strategist at Risk Ledger.

    The pitfalls of paying ransom

    While paying a ransom may seem an appealing way to quickly recover your operations, it is a risky gamble. There is no guarantee that cybercriminals will restore access to systems, refrain from selling your stolen data, or even re-exploit an organization. Furthermore, organizations risk making payments to a sanctioned entity that might have obfuscated their affiliation

    If public sector organizations are stripped of the option to pay, they need to be equipped with the resources to defend against and recover from attacks. That might require additional funding to bolster security and resilience programs, timely access to specialist expertise, and the use of real-world threat intelligence to guide decisions. The NHS, for example, presents a particularly complex challenge – could a blanket ban on payments be maintained in cases where a ransomware attack might impact public safety?

    Additionally, if ransom payments become increasingly banned, they may be excluded from cyber insurance coverage. Organizations could face steeper premiums as insurers adjust for potentially increased recovery costs. Forensic investigations, system rebuilds, and operational downtime might exceed the cost of a ransom demand.

    The supply chain dimension of ransomware attacks

    Comprehensive supply chain security should be a critical part of an organization’s resilience strategy. Even if an organization has strong cybersecurity defenses, it is still vulnerable if its suppliers do not.

    The government is weighing up whether to extend ransom payment prohibitions to critical suppliers of public sector bodies and CNI. If suppliers fall victim to ransomware, how confident can organizations be that those suppliers can recover quickly without paying?

    A ransomware attack on a critical supplier can trigger a domino effect. Many businesses lack visibility into these hidden dependencies, only realizing their exposure when a disruption occurs. A single compromised supplier could paralyze multiple organizations downstream, causing widespread outages and significant business challenges.

    Without clear visibility of supply chain risks, businesses can only prepare for a limited range of scenarios and are unable to identify and prepare for risks resulting from dependencies from suppliers existing at the 4th party level and beyond, i.e. subcontractors and suppliers’ suppliers.

    Industry-wide collaboration can increase resilience

    Regardless of whether ransom payments get banned, the key to enhancing operational resilience to ransomware attacks lies in proactive, collaborative defense. When businesses share information about suppliers, they may spot risks that a single company might miss on its own. By exchanging timely insights, organizations can detect and respond to emerging threats before they escalate into serious incidents.

    Mapping out these connections help reveal concentration risks where an attack could cause widespread damage. Organizations may then initiate discussions with targeted suppliers on their ability to recover from a ransomware attack without the ability to pay a ransom.

    Additionally, by taking a broad view across the industry, this enables organizations to make informed decisions on their overall supplier base. This may include whether to diversify their set of suppliers to reduce concentration risks or introduce additional controls to reduce exposure to ransomware attacks.

    Organizations can better prepare for additional risk scenarios that are only illuminated after consolidating supply chain information with their peers and seeing a comprehensive and holistic view of their supply chain. While many businesses recognize that a supplier might be the limiting factor in their overall security, it is imperative for them to understand that this potential limiting factor may be beyond their current visibility.

    Banning ransom payments may remove some of the financial incentives for cybercriminals, but it won’t make ransomware disappear. However, organizations are right to scrutinize their suppliers’ ability to resume operations without paying a ransom. Therefore, the real challenge lies in building organizational resilience – and that requires a shift in mindset.

    Businesses must move beyond siloed thinking and treat cybersecurity as a shared responsibility. Only by working collaboratively with peers, suppliers, and regulators, and by broadening visibility across the supply chain to identify and address potential risks, can we reduce the impact of ransomware and make it less viable business model for criminals.

    We’ve featured the best malware removal.

    This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    attacks collaboration eliminated increase Ransomware resilience
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMarshall brings music to your TV stand with the new Heston 120 soundbar
    Next Article The Download: Introducing the AI energy package
    Techurz
    • Website

    Related Posts

    Security

    CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

    November 1, 2025
    Security

    ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

    November 1, 2025
    Security

    Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

    October 30, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    College social app Fizz expands into grocery delivery

    September 3, 202524 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202514 Views

    Bosch Series 6 Air Fryer review: a quality single-basket air fryer, perfect for smaller households

    August 3, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    College social app Fizz expands into grocery delivery

    September 3, 202524 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202514 Views

    Bosch Series 6 Air Fryer review: a quality single-basket air fryer, perfect for smaller households

    August 3, 20259 Views
    Our Picks

    Mesa shuts down credit card that rewarded cardholders for paying their mortgages

    December 14, 2025

    India’s Spinny lines up $160M funding to acquire GoMechanic, sources say

    December 14, 2025

    Netflix growing up, data center jet engines, and the circular AI economy

    December 12, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.