WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships The True Cost of Paying Ransoms – Pay a Lot Now, or Pay a Lot More Later
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

The True Cost of Paying Ransoms – Pay a Lot Now, or Pay a Lot More Later

Author: Jennifer Walker

Created: Tuesday, July 9, 2019 - 18:00

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

Paying ransom demands in the hopes of regaining access to critical data is controversial, to say the least. Succumbing to extortion goes against conventional advice and wisdom against incentivizing the cybercrime business model, but sometimes organizations feel they have no other choice and paying seems like the best option at the time. However, paying a ransom is not straightforward. Just ask Lake City, the 65,000 population city in Florida who voted to pay their attackers a negotiated price of 42 bitcoins, worth approximately $500,000 at the time of payment, to end a ransomware attack that reportedly began on June 10 (see the June 27 Security and Resilience Update for the original coverage). In a follow up story, The New York Times published details of Lake City’s recovery efforts, minus technical details not able to be disclosed due to the active FBI investigation. Lake City should be applauded for their transparency to help others from having to endure a similar incident, particularly during the throes of their response and painful recovery efforts. The account poignantly highlights potentially hidden costs associated with ransomware recovery. In addition to the ransom, organizations are likely to incur fees related to higher insurance premiums (if insurance even paid the claim), exorbitant rates to cyber incident response firms, and a significant investment in updating system backup architecture – and that is just for starters… Members are encouraged to read the post and (if you haven’t already) consider bolstering your backups and retaining a cyber incident response firm sooner, rather than later for more money. Read the article in the New York Times

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar