Security Awareness Training – Ransomware

June 26, 2025

One Click Is All It Takes

 

A single click on a phishing link. A password change request that didn’t feel quite right. A forgotten remote desktop login. That’s all it takes for ransomware to slip in and start locking down systems—and businesses.

 

Why Ransomware Is Still a Threat

 

Despite increased awareness, ransomware attacks are more sophisticated than ever. Attackers no longer just encrypt data—they steal it, threaten to leak it, and often return for a second round once they know a company is willing to pay. The targets are often smaller organizations, schools, hospitals, and infrastructure providers—groups that can’t afford extended downtime and are more likely to pay.

 

From the Colonial Pipeline to a rural Illinois hospital that shut its doors, the consequences are severe. And with ransomware-as-a-service models now in play, the barrier to entry for attackers is frighteningly low.

 

How It Gets In

 

Ransomware typically enters through familiar doors:

  • Phishing emails
  • Malicious websites and drive-by downloads
  • Exposed remote desktop (RDP) connections with weak credentials
  • Vulnerabilities in third-party software or supply chains

 

Even well-meaning employees can accidentally open the door by responding to convincing messages that appear to come from internal systems, like password reset requests over Teams.

 

What Organizations Can Do

 

The good news is there’s a lot we can do to stay ahead of these attacks. In our recent security training, Paula Biggs emphasized some key protective steps:

 

  • Think before you click—especially on unexpected links or login prompts
  • Use strong, unique passwords (and a password manager)
  • Keep software patched across all devices and platforms
  • Back up data in multiple places, including offsite backups
  • Segment your network to limit access and damage
  • Invest in endpoint protection and monitor your network 24/7
  • Train your team regularly—awareness is still your first line of defense

 

Be Ready Before It Happens

 

If you’re not sure how your organization would respond to a ransomware incident, now is the time to create or revisit your incident response plan. CISA.gov offers a helpful outline, but your plan should include clear steps for isolating systems, preserving forensic evidence, notifying internal stakeholders, and communicating with law enforcement.

And while it’s tempting to think of paying the ransom as a shortcut to recovery, the reality is more complicated. You may not get your data back, and you may unknowingly be paying an entity that puts your organization at legal risk. Even worse, paying once can make you a target again.

 

Final Thoughts

 

Ransomware isn’t going away, but it doesn’t have to shut you down. With smart planning, consistent training, and a few basic controls, you can significantly reduce your risk—and your downtime.

 

If you’d like support evaluating your organization’s readiness or building a practical prevention plan, we’re here to help. Reach out any time.

 

You May Like These Posts

Why Cybersecurity is as much Art as Science

In this kickoff episode of The Art of Cybersecurity, host Cheri Hotman shares why this podcast exists and what listeners can expect. Cyber isn’t just science or technology — it’s art. It’s messy, constrained, people-driven, and ultimately about mitigating risk to protect people and data. Cheri cuts through the noise of “easy button” tools, audit-passing […]

People, Process, Technology: It Takes All 3

When it comes to navigating the maze of Governance, Risk, and Compliance, there's one simple rule: finding perfect harmony between cutting-edge tech and good, old-fashioned human know-how.   Picture this: a Chief Information Security Officer (CISO) paints a vision of the future where compliance is seamlessly automated. "In two to three years, we'll have everything […]

A Practical Approach to Choosing the Right GRC Tool

With countless GRC tools on the market, how do you know which one is the right fit for your organization? The wrong choice can lead to wasted resources and unmet security goals. In this session, we’ll walk through real-world cases, breaking down why specific tools were chosen and how they were successfully implemented. You’ll learn […]

The Difficulties of People Taking Ownership

So, you've got an amazing team of tech savvy folks who love the tech side of things.     They excel in implementing the latest tools and systems, but when it comes to the less glamorous side - like making sure tasks are completed and nobody drops the ball - things start to get a bit […]

Why Maturity Matters: Overcoming GRC Cognitive Overload with the Maturity Model

Please join Kayne McGladrey, author of the GRC Maturity Model and Cheri Hotman as they explore the GRC (Governance, Risk, and Compliance) Maturity Model, a powerful tool for organizations to assess and enhance their cybersecurity practices. Achieving maturity in GRC is crucial for navigating complex regulatory landscapes and boosting overall effectiveness. Through self-assessments, organizations can […]

The ROI of GRC: Turning Compliance Into Competitive Advantage

Too often, compliance is seen as an expense instead of an investment. But when done right, Governance, Risk, and Compliance can become a competitive advantage that drives trust, growth, and resilience. In this session, we’ll share how forward-thinking organizations are proving the ROI of GRC—quantifying risk reduction, accelerating sales, and strengthening customer confidence. Join us […]

Bridging the Gap: Why Cybersecurity Tools Alone Aren’t Enough

Investing in the latest cybersecurity tools doesn’t automatically mean you’re secure. Many leaders feel the initial promise of a new solution—only to realize it’s not delivering the protection they expected. So, what’s missing? In this session, we’ll break down where the responsibility of the tool ends and where your team’s role begins. We’ll uncover why […]

Choosing the Right Cybersecurity Framework: A Practical Guide for Leaders

Speakers: Cheri Hotman and Tanya WadeHosted by: Hotman Group   Why Choosing the Right Framework Matters   Passing an audit is no longer enough. Many organizations still treat cybersecurity as a one-time project, something to "check off" rather than an integrated, living part of their business operations.   During this session, Cheri Hotman and Tanya […]

Security Awareness Training – Verizon 2025 Data Breach Investigations Report

In this 15-minute training, the HG team breaks down the most critical findings from Verizon’s 2025 Data Breach Investigations Report (DBIR)—and what they mean for real-world security programs. We cover the sharp rise in third-party breaches, the growing threat of GenAI misuse, and the continued dominance of ransomware and credential-based attacks. You’ll walk away with […]

Post A Comment

Leave a Reply

Your email address will not be published.

{{brizy_dc_image_alt imageSrc=
Endless audits and customer demands were never supposed to replace real security.
We build, implement, and run Cyber GRC programs that reduce risk, protect the business, and still pass audits.

Hotman Group is a certified

woman-owned business (WOSB)

Hotman Group, LLC

Fort Worth, TX

Privacy Policy | Terms of Service | All Rights Reserved © Hotman Group, LLC