WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Don’t Pay the Ransom – Easier Said than Done
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Don’t Pay the Ransom – Easier Said than Done

Author: Jennifer Walker

Created: Thursday, August 20, 2020 - 17:40

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

When ransomware strikes a company, it is easy for pundits to say, “don’t pay the ransom.” But in reality, that is not always a practical choice. If you have not been impacted by ransomware yet, you are fortunate. Furthermore, if you think you know what you will do when you are (and even if you don’t know), you might want to read this recent post by Mailguard. The article includes a quick timeline of events regarding the WastedLocker ransomware attack on Garmin last month and thoughts on navigating the critical quandary to pay or not to pay. There are countless headlines of organizations paying ransoms for decryption keys and for keeping data from being publicly leaked. Likewise, organizations facing service disruptions and/or loss of money are faced with a very real dilemma and right, wrong, or indifferent, the option not to pay may not always be the best decision for the business. Sadly, there seem to be far fewer victims who are adequately protected and do not have to consider paying for anything. Ransomware is a reality and every organization needs to have a ransomware response plan at the ready. However, probably the most important thing to remember is don’t do it alone. When ransomware strikes, contact a credible ransomware response firm. Proceeding alone and/or without law enforcement involvement could lead to bigger problems, including violating anti-money laundering laws and financial penalties from the government. Ultimately it is best to pay (invest) to secure now, than it is to pay (extortion demands and then some) more to recover later. Read more at Mailguard

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 30, 2026)

Apr 30, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar