Gartner Research

How to Prevent or Mitigate Ransomware Attacks That Demand Payment in Blockchain Cryptocurrency

Published: 26 September 2018

ID: G00367630

Analyst(s): Avivah Litan

Summary

Organizations hit by ransomware should avoid paying ransom, especially as payment often doesn’t result in files being decrypted — paying ransom should be the last resort. This report advises enterprise architecture and technology innovation leaders how to avoid such attacks or mitigate the damage.

Table Of Contents
  • Key Challenges

Introduction

Analysis

  • Practice Good Security Hygiene Using Gartner’s Adaptive Security Architecture Model to Prevent Ransomware Attacks
    • Continuously Back Up Desktop and Server Files, So You Can Recover Any Files That Fall Victim to Ransomware Encryption
  • Use Publicly Available Resources to Try and Decrypt Any Files Encrypted by Ransomware
    • Paying Ransom Won’t Necessarily Get Your Files Back
  • Avoid the Need to Pay Ransom
    • But as Paying May Be Your Last Resort, Prepare to Acquire Cryptocurrency
  • Secure Cryptocurrency Wallets Using the Strongest Security Measures Your Organization Can Manage
    • Cautions About Online Wallet Security
    • Hardware Wallets That Enable “Cold Storage”
    • Cautions About Hardware Wallet Security

Gartner Recommended Reading

©2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Purchase this Document

To purchase this document, you will need to register or sign in above

Become a client