PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Ransomware Preys on Poorly Administered IT Operations; Are You Prepared?

By Tim Sloane
June 19, 2020
in Analysts Coverage, Fraud & Security, Fraud Risk and Analytics
0
3
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Ransomware

This article from Forbes discusses how ransomware gains entry into your network and how criminals are targeting industrial systems to improve the frequency of pay outs. Missing from the article are the steps that should be taken to greatly reduce the risk of your having to pay a ransom. 

First, recognize that ransomware is like COVID-19, a virus that spreads through contact. So monitor all external and internal data communications for the fingerprints of ransomware using the best anti-virus/anti-ransomware you can find – but don’t expect that this makes you safe.

Next talk your IT Operations manager about backup practices. Ask if they are implementing the 3-2-1 backup approach and, if not, fund and implement that approach immediately for all aspects of your operational data. Then develop a plan that will restore that backed up data in a time period acceptable to your operations. This is critical because restoring data can take a long time. The restore function should identify and eliminate any sleeping viruses hiding in the data before restoring. This is time consuming and expensive operationally but at least you won’t need to pay anyone a ransom which still won’t magically bring you back online:

“Developments in networked connectivity, including 5G, are pushing connectivity deeper into organizations as they connect an expanding group of industrial systems. The real-time criticality of industrial operations makes them a very valuable target for hackers.

This new hostage will change the ransom game because it changes the risk game through real-time disruption and what it puts at risk. It also introduces some frightening new risks if industrial processes involve hazardous or volatile environments or materials.

Hackers are productive with their time, and they attack where there’s opportunity and money. The advancement of highly connected operational technology environments offers them a rich and relatively easy target environment.  

Galina has several recommendations for businesses addressing this expanding risk landscape. First, don’t have a separate cybersecurity function for operational technology and industrial networks.  Integrate this capability within the organization’s core cybersecurity function. 

Second, understand what’s at stake and what’s at risk from a leadership perspective with operational technology. The operational threats are unique, as are their risks. They need a contextual understanding of how these systems are creating value and what the risks are to that value and beyond. 

Ransomware will continue to expand as an effective cyber-attack tactic. Operational systems are an attractive hostage for cyber adversaries regardless of their motivations in both the public and private sectors.”

Overview by Tim Sloane, VP, Payments Innovation at Mercator Advisory Group

3
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: CybercrimeFraud PreventionRansomware

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    Startups: Fintechs Data Streaming Technology in Banking, corporates Enriched Data vs Faster Payments

    Fighting Fraud in the Era of Faster Payments

    February 13, 2026
    cross-border payments

    Solving for Fraud in Cross-Border Payments Requires Better Counterparty Verification

    February 12, 2026
    agentic commerce

    Demystifying the Agentic Commerce Enigma

    February 11, 2026
    payment gateways

    How Payment Gateways for Businesses Can Help You Offer Your Customers More Options

    February 10, 2026
    Reserve Bank of India (RBI) Extends Mandate for Tokenization to June '22

    Late Payments? Governments Are Taking Action

    February 9, 2026
    ai phishing

    The Fraud Epidemic Is Testing the Limits of Cybersecurity

    February 6, 2026
    stablecoins b2b payments

    Stablecoins and the Future of B2B Payments: Faster, Cheaper, Better

    February 5, 2026
    Payment Facilitator

    The Payment Facilitator Model as a Growth Strategy for ISVs

    February 4, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result