Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services
        Object Storage

        Premium storage without the premium price

        Buy 11:11 Object Storage now
        BUY NOW
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Extended Detection and Response (XDR)
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Buy NowFree Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Extended Detection and Response (XDR)
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Buy Now
  • Free Trial
Tags: CybercrimeData ProtectionDraaSRansomware
Author: 11:11 Systems
Date: August 18, 2023

Prioritizing cyber resilience in response to a potential ransom payment ban

Ransomware attacks do not simply start and end with a locked computer screen and a ransom note. They unravel as intricate narratives, leaving a trail of financial wreckage, operational interruptions, and reputational damage in their wake.

These attacks bear significant costs. In 2022, the average cost of a ransomware attack was a whopping $4.54 million, per IBM Security and the Ponemon Institute. And that does not include the actual ransom payment itself.

Beyond the immediate financial impact, ransomware attacks can cripple critical infrastructure, like health care or utility services with potential life-threatening implications. Take the 2021 Colonial Pipeline attack, for example.

The 5,500-mile pipeline ground to a halt after threat actors exploited a compromised password, pilfered a staggering 100 gigabytes of data, and wreaked havoc on the company’s IT infrastructure. The fallout? The vital flow of gasoline, diesel, and jet fuel was obstructed, causing gas shortages along the East Coast, and disrupting countless businesses across the United States.

In short, ransomware attacks, once a blip on the digital radar, have morphed into a full-blown crisis. So the White House and its international partners are considering a novel approach to the burgeoning threat: a ban on ransom payments.

The White House’s ransomware reckoning

The central premise is to stifle the very lifeblood of ransomware operations and disincentivize cybercriminals by making ransomware attacks less profitable.
This proposed policy change is more than a mere adjustment in tactics; it is a strategic recalibration. It signals a shift from reactive measures to a more proactive stance against these digital threats. If implemented, this policy could mark a new chapter in our collective response to the menace of ransomware, setting a new course for the U.S. and the global cybersecurity community.

The White House also introduces “waivers” for ransom payments under particular circumstances within this proposed ban. For instance, a waiver might be granted if an attack hampers critical services and paying the ransom is the only viable solution. But, the waiver system adds another layer of complexity. Who decides when a waiver is warranted? How quickly can this decision be made? And most importantly, would a waiver system dilute the ban’s intended effect or even be exploited by shrewd attackers?

Those championing the ban argue that it could pull the rug from under the feet of ransomware criminals. By cutting off the financial lifeline, the hope is that the tide of attacks may recede. However, the proposal is not without its detractors.

Abandoning victims at their most vulnerable

Many critics liken the ban to leaving victims stranded in the eye of the storm.

Organizations could find themselves locked in a stalemate with their digital assailants without the option to pay a ransom. This could result in prolonged disruptions to their operations and the ripple effects could extend far beyond the immediate impact, potentially spiraling into significant operational and financial fallout.

For instance, a manufacturing company could see its production lines grind to a halt, leading to delayed deliveries and breached contracts. A health care provider could lose access to critical patient data, which could compromise patient care and result in potential regulatory penalties.

This concern is particularly grave for small and medium-sized businesses that often operate without the safety net of a robust cybersecurity framework. For these organizations, the option to pay a ransom is often a last resort to restore operations and mitigate damage.

The potential ban, therefore, presents a complex dilemma. While it could disrupt the business model of ransomware criminals, it could also leave organizations, particularly smaller ones, increasingly vulnerable.

The cybersecurity community’s perspective

The cybersecurity community is divided on the issue.

Some professionals view the ban as a necessary evil to stem the tide of ransomware attacks. Others feel a ban could trigger a domino effect of unintended consequences, even driving ransomware activity further underground. Organizations might opt for secrecy out of desperation or fear of penalties, leading to underreported or completely unreported attacks.

Plus, there is no guarantee it will dissuade attackers. North Carolina implemented a similar ban in the public sector. And, despite outlawing ransom payments, there was no perceptible decrease in ransomware attacks.

Regardless of where you stand on the potential ban, its mere consideration underscores the critical importance of cyber resilience.

Building a culture of cyber resilience

This is not just about erecting digital defenses but fostering a culture that anticipates and mitigates threats as they evolve. A robust cybersecurity infrastructure is the cornerstone of this resilience, serving as the foundation for all other measures.

Regular system updates are part of this foundation to ensure that the organization’s defenses are equipped to handle the latest threats. Employee training, too, plays a crucial role. A workforce that can identify and respond to potential threats is a powerful deterrent against ransomware attacks.

Beyond prevention, cyber resilience also encompasses readiness for recovery. Having a comprehensive cyber incident recovery plan in place is critical. This plan serves as a roadmap for navigating the aftermath of an attack, detailing the steps you must take to recover compromised data, restore operations and mitigate damage, including periodic cyber recovery simulations to improvise overall cyber resiliency posture.

Regular immutable or temper-proof data backups are a key part of this recovery process. Ensuring that a recent and clean copy of vital data is always available can significantly improve the chances of a successful cyber recovery.

Similarly, having clear protocols and procedures for responding to an attack and continuously monitoring and improving these measures as the threat landscape evolves can help you manage the situation efficiently and minimize downtime.

Face the constantly changing cyber threat landscape with confidence

The debate over a potential ban on ransom payments highlights the complexities of cybersecurity policy. It underscores the need for a multifaceted approach to combating ransomware, one that includes not only policy interventions but also organizational practices.

As we await the White House’s decision, one thing is clear: There are no easy answers in the fight against ransomware, only informed choices. These choices, whether they involve investing in employee training, implementing robust and modern backup systems, and developing a comprehensive disaster recovery (DR) plan, can significantly influence your ability to respond to — and recover from — ransomware attacks.

Regardless of whether a ransom payment ban is implemented, cyber resilience remains essential. It is not just about dealing with attacks when they occur but about creating an environment where cyber threats are anticipated, mitigated, and recovered from effectively and efficiently.

Categories: Cybercrime, RansomwareBy 11:11 SystemsAugust 18, 2023
Tags: CybercrimeData ProtectionDraaSRansomware
11:11 Systems

Author: 11:11 Systems

11:11 Systems (“11:11”) is a managed infrastructure solutions provider that holistically addresses the challenges of next-generation managed cloud, connectivity and security requirements. 11:11 combines the teams and technology behind market leading, analyst vetted companies like Green Cloud Defense and iland to deliver increased performance, optimization and savings.

Post navigation

PreviousPrevious post:Spending, Security, and Expertise Are the Top 3 Cloud Challenges — But They Don’t Have to Be YoursNextNext post:“Flying Under the Radar:” How to Protect Your Organization’s Reputation

Related Posts

Cyber Resilience
Data Protection vs. Cyber Resilience: Mastering Both in the Complex World of Gambling
May 27, 2025
ransomware attack, worst day
The Remedy Against Ransomware: Insights from Our April 2025 Webinar
May 19, 2025
Cyber Resilience
Reimagining Cyber Resilience in the Gambling Industry: A Strategic Imperative for the Digital Age
May 13, 2025
effective passwords
Creating Effective Password Policies in Your Organization
May 5, 2025
World Password Day 2025
10 Tips for Strengthening Enterprise Security this World Password Day  
April 30, 2025
cost optimization
Achieving IT Cost Optimization with 11:11 Systems
April 15, 2025
11:11 Systems
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top