The attack coming to eat Availability – Ransomware 

Ransomware has teeth, and in the evolving landscape of cyber-security, few attacks pose as serious a threat to availability as Ransomware. A form of malware that is specifically designed to disrupt, damage, or obtain unauthorized access, ransomware is a type of software that directly attacks an organization’s ability to operate. Attackers utilizing this method don’t cast a wide net for a smash and grab style attack but rather research a company and perform a methodical intrusion. Such attacks don’t just interrupt workflows; they undermine the very trust that sustains organizations. In addition to being encrypted out of its own data, an organization faces a potential chain reaction of severe consequences including regulatory penalties, reputational damage, and the looming threat of future breaches using stolen data.  

According to the Cybersecurity & Infrastructure Security Agency’s Ransomware Guide (CISA, 2024), these attacks are increasingly “strategic, persistent, and financially motivated,” with modern variants employing double extortion, threatening both data loss and public exposure. Similarly, Fortinet (2025) highlights that phishing emails, Remote Desktop Protocol vulnerabilities, and software flaws remain primary vectors, underscoring the need for layered defenses. The importance of monitoring and isolation of physical hardware must also be stressed in this context for if an attacker was able to gain access to the system, they could install it manually via download or even USB.  

Fortunately the risk can be mitigated though proper training and strict adherence to these standards: Don’t click suspicious links or attachments in emails from unknown senders; these should be filtered and placed in spam as suspicious automatically. Endpoint protection should be utilized that features monitoring of the behavior occurring on the network. Patches should be applied regularly to maintain an up-to-date system. Unused RDP ports should be secured and encrypted with 2FAuth. Lastly, all employees interacting with the system should be trained in the risks associated with the consequences of allowing a ransomware attack to occur. “Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication.” – James Scott, Institute for Critical Infrastructure Technology. 

Cited:  

Leave a Reply

Your email address will not be published. Required fields are marked *