Expert Commentary for International Anti-Ransomware Day 2025
May 2025 by cyber security experts
Reaching out ahead of International Anti-Ransomware Day, which is coming up next Monday, May 12. The comments from several cybersecurity industry experts who have provided their insight on the current state of ransomware and best practices for organizations to keep in mind while combatting these increasingly sophisticated attacks.
Kern Smith, VP of Global Solutions at Zimperium
As ransomware threats evolve, mobile devices have become the next frontier. Cybercriminals are increasingly targeting smartphones and tablets with mishing (mobile-targeted phishing) attacks, and exploiting vulnerabilities in apps and operating systems. Yet, many organizations still overlook mobile as a critical attack vector.
Traditional security tools aren’t enough. Real-time, on-device protection designed for mobile threats is essential. It’s no longer just about protecting desktops—securing mobile environments is key to staying ahead of today’s ransomware tactics.
Saeed Abassi, Manager, Vulnerability Research at Qualys Threat Research Unit
In this rapidly evolving cybersecurity environment, understanding the nuances of ransomware attacks and the underlying vulnerabilities they exploit is crucial for building robust defense strategies. Anti-Ransomware Day is an important reminder of the urgent need to stay ahead of these advancing threats. Today’s ransomware attacks are more diverse than ever, impacting everything from operating systems to web applications and networking infrastructure. In recent years, genAI has accelerated this shift, lowering technical barriers and enabling cybercriminals to discover and exploit vulnerabilities more easily, leading to more frequent and sophisticated attacks.
The recent leak of internal communications from the ransomware group Black Basta provided a rare inside look at the layered techniques these actors employ, from credential theft and exploitation of exposed services to the use of legitimate platforms for payload hosting and voice phishing. Ransomware groups are moving faster than ever, often escalating from initial access to full network compromise within hours, leaving defenders little time to respond.
To defend against these accelerating threats, organizations must adopt a proactive and informed cybersecurity strategy. Immediate patching of known exploited vulnerabilities is critical. Patch management must be treated not just as a maintenance function but as a frontline defense mechanism that closes vulnerabilities before attackers can gain a foothold. A high patch rate ensures quick and efficient response, significantly reducing the risk of breach, while a low patch rate leaves organizations exposed. Beyond routine patching, organizations should adopt risk-based prioritization, proactively address vulnerabilities with known exploitation histories, eliminate common misconfigurations, and maintain continuous visibility into all internet-facing assets. Implementing multi-layered defense strategies that address each stage of an attack, from initial access to data exfiltration, is now essential for building resilience against ransomware.
In summary, ransomware is a digital pandemic—traditional defenses are just masks, not armor. To fight back, we need to be proactive and utilize risk-based prioritization; it isn’t a defense—it’s a counterstrike. By embracing this mindset and implementing the above mentioned strategies, organizations can strengthen their defenses and stay ahead of the ever-evolving ransomware threat.
Heath Renfrow, Co-founder and CISO at Fenix24
While encryption algorithms and file recovery often steal the spotlight in ransomware discussions, the real impact goes far deeper. Ransomware is not just a data issue—it’s a full-scale business operations crisis with consequences that extend well beyond the digital domain.
If your backup system isn’t isolated, monitored, and tested against ransomware, it’s not a backup—it’s a liability. Ransomware exploits operational silos, making rapid detection, coordinated response, and intelligent recovery essential. Only through integrated cybersecurity frameworks and real-time threat intelligence can organizations truly defend and recover.
Anti-Ransomware Day is a powerful reminder: the focus must shift from prevention alone to resilience. Modern recovery requires more than incident response—it demands resilient infrastructure, automated failover, strong restoration capabilities, and speed. The goal isn’t just avoiding ransom payments—it’s minimizing downtime, protecting reputation, and ensuring operational continuity.
John Anthony Smith, Founder and CSO at Fenix24
On Anti-Ransomware Day, it’s crucial for organizational leadership to recognize that traditional disaster recovery plans, procedures, and technical measures often fail in the face of ransomware attacks. Fenix24’s research has found that 84% of critical backups do not survive threat actors’ behavior. Why? Because these systems and plans are frequently destroyed by the mass destructive behaviors of threat actors.
While there are practice environments security teams can administer, like tabletop exercises, they typically do not prepare organizations for the realities of mass destruction. These exercises often make flawed assumptions about the survivability of recovery systems and are based on limited contexts, leaving organizations unprepared for the complete destruction of all systems.
Without understanding the breach context, specifically what and how threat actors operate, it is impossible to harden, manage, and maintain backup systems that are both survivable and timely recoverable. While most organizations are over-investing in prevention, they largely ignore recovery. The ultimate determinant of survival hinges not on avoiding the initial breach but on the speed and efficacy of restoring operations. The chosen recovery strategy, assuming backup and recovery methods survive, is the single most important decision leadership will make during a mass destruction event.
Let Anti-Ransomware Day serve as an urgent reminder for leaders to prioritize the development and implementation of robust recovery strategies. Ensuring our organizations are thoroughly prepared is paramount in mitigating the potentially devastating impacts of ransomware attacks.
Chad Cragle, CISO at Deepwatch
Ransomware remains one of the most disruptive threats to modern institutions, whether you’re running a business, a hospital, a school, city infrastructure or anything in between. Anti-Ransomware Day reminds us of past crises like WannaCry, but the stakes have only grown. Today’s attacks are faster, more calculated, and built to cause maximum disruption. It’s not just about encrypting data, it’s about shutting down operations and exploiting any opportunities. That’s why modern defense strategies must include always-on visibility, rapid containment, and tested recovery protocols. Services like Managed Detection and Response play a central role in that strategy, providing 24/7 threat monitoring and expert-led action when every second counts.
This isn’t just about awareness; it’s about readiness. Ransomware is a business risk, a public safety issue, and a critical infrastructure threat all rolled into one. And it doesn’t care if you’re understaffed, underfunded, or still waiting on that “next quarter” security upgrade. Anti-Ransomware Day should serve as more than a reminder, it’s a prompt to ask whether your organization is ready to respond today, not someday.
Stephen Kowski, Field CTO at SlashNext Email+ Security
Ransomware attacks almost always start with a sneaky message-like a fake email, text, or even a voice call-that tricks someone into clicking a link or opening an attachment. Today’s scammers use advanced tricks, including AI-generated messages and deepfakes, to make these scams look and sound real. That’s why it’s so important to stop these threats before they ever reach your team. Using security that can spot and block phishing across email, mobile apps, and even messaging platforms is one of the smartest moves you can make.
On top of that, teaching everyone what these scams look like helps people think twice before clicking. If you combine smart technology with good training, you can stop most ransomware attacks before they even start. In the end, it’s about making sure your defenses work where the attacks begin-right at the first message. That way, you can spend less time worrying and more time getting things done.