The Real Cost of a Ransomware Attack: The Ransom Is the Least of Your Problems

The cost of a ransomware attack goes way beyond the ransom itself — and most organizations don't find that out until it's too late. In this episode of The Backup Wrap-up, W. Curtis Preston (Mr. Backup) and co-host Prasanna Malaiyandi sit down with Dr. Mike Saylor of Black Swan Cybersecurity to walk through every category of cost that hits when ransomware strikes.
The case that kicks everything off: UVM Health Network, October 2020. Over 1,300 servers encrypted, staff forced back to paper records, patient care disrupted for weeks. Total tab? Over $63 million — and they never paid the ransom.
From there, we go category by category: people costs (overtime, third-party IR firms, emergency hardware), lost business revenue, regulatory fines, reputational damage that doesn't wash off, staff burnout and resignations, supply chain chaos, payment processor shutdowns, and cyber insurance fine print that can leave you holding the bag even when you think you're covered.
We also cover what you should be doing right now — before any of this happens to you. Starting with a Business Impact Analysis, which Mike argues most small-to-medium businesses can knock out in one to three weeks. Knowing what a downed system costs you per hour is exactly the information that gets you budget from leadership and a plan that actually works when the feces hits the rotary oscillator.
Chapters:
00:01:44 - Intro & Welcome
00:03:45 - Case Study: UVM Health Network ($63M, 1,300 Servers Down)
00:07:12 - People Costs: Overtime, Staffing & Third-Party IR Firms
00:10:01 - The Odds Are Damn Near 100% — Set Up Your IR Relationship Now
00:13:00 - Hardware Costs & Emergency Spending
00:14:05 - Lost Business Revenue (Current and Future)
00:15:14 - The Stat That Should Scare You: Over 50% Don't Survive
00:16:38 - Regulatory Fines (GDPR, California & More)
00:19:32 - Reputational Damage: Your Customers Never Forget
00:21:28 - Staff Burnout, Exhaustion & Resignations
00:22:40 - Supply Chain Disruption & Credit Rating Impact
00:24:07 - Payment Processor Shutdown (Real Case: Dental Practice)
00:26:00 - Cyber Insurance: Fine Print, Claim Denials & Premium Spikes
00:27:52 - Post-Attack Process Remediation Costs
00:29:36 - Business Impact Analysis: Why You Need One Before It Happens
00:35:00 - Action Items
00:39:41 - Recovery Prioritization & Recovery Point Objectives
00:44:43 - Wrap
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we look at something that most people completely miss
Speaker:when they think about ransomware, and that's the cost of a ransomware attack.
Speaker:Is way beyond the cost of the ransom itself.
Speaker:Join me and my co-host persona as we talk to Dr.
Speaker:Mike Saylor, who's the co-author on my latest book Learning
Speaker:Ransomware Response and Recovery.
Speaker:We walked through real cases like the UVM Health Network attack that ran up a $63
Speaker:million tab without paying the ransom lost revenue, regulatory fines, staff burnout,
Speaker:reputational damage, supply chain chaos.
Speaker:And cyber insurance fine print that I think might surprise you if you think the
Speaker:ransom is the biggest part of the bill.
Speaker:Stick around.
Speaker:I think you ear in for shock.
Speaker:Just a quick note about me.
Speaker:I'm w Curtis Preston, AKA Mr. Backup, and I've been obsessing over backup
Speaker:recovery and now cyber recovery.
Speaker:For over 30 years.
Speaker:If that's your bag, then I'm your guy.
Speaker:You're not gonna find anybody that cares about it more than me.
Speaker:Ever since 1993 when I had to tell my boss that there were no backups
Speaker:of that database that we just lost.
Speaker:Now I've written five books, a blog and a podcast.
Speaker:Here we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Hi, and welcome to the backup wrap up.
Speaker:I'm your host, w Curtis Preston, AKA, Mr. Backup, and I have with me a guy
Speaker:who just confessed his love for me.
Speaker:Prasanna, Molly.
Speaker:Andy, how's it going?
Speaker:Prasanna.
Speaker:Why do you sound so shocked?
Speaker:That's what I wanna know.
Speaker:The, the mutual, it's a mutual admiration society.
Speaker:You doing all right over there
Speaker:with your branded shirt, which I still can't find.
Speaker:I, swear I've looked everywhere.
Speaker:if you're doing swag
Speaker:or doing things, you need to buy four for yourself.
Speaker:Well, clearly more than one.
Speaker:Yes.
Speaker:looked all over this house.
Speaker:I've
Speaker:And honest.
Speaker:to clean.
Speaker:Yeah.
Speaker:And two is not enough for you Curtis, I
Speaker:have to say.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Well, you know, what are we gonna do?
Speaker:Uh, and then also with us, we have somebody who I swear I'm,
Speaker:I'm sure would not lose a branded piece of swag if I send it to him.
Speaker:Doctor Mike Sailor, how's it going, Mike?
Speaker:It is going great guys, and just to be, uh, upfront, I will probably ask for four.
Speaker:So you, you got CRS as well, can't remember stuff.
Speaker:Um,
Speaker:I would, I would probably wear one each day and,
Speaker:uh, you know, uh, it,
Speaker:it's, uh,
Speaker:the Einstein, the Einstein, uh, approach.
Speaker:Right.
Speaker:yep.
Speaker:It simplify my wardrobe.
Speaker:That's right.
Speaker:Right.
Speaker:Right.
Speaker:but if you are wearing the same thing every day, do you technically need
Speaker:for, can you just wear one and wear it four days and no one will ever notice?
Speaker:As
Speaker:long as it doesn't smell.
Speaker:well, and there there's more to it.
Speaker:In my, in my thinking, I, it's, it's, it's about efficiency and economy.
Speaker:And so if I, if I only had one, then I would have to wash it the next day.
Speaker:Well, I'm not just gonna wash one shirt, so
Speaker:after four days, I've probably got a decent amount of laundry to do,
Speaker:Hmm.
Speaker:days,
Speaker:smart man.
Speaker:Smart man.
Speaker:Yeah.
Speaker:All right.
Speaker:Well, we are not gonna be talking about wardrobes anymore
Speaker:Can
Speaker:we talk about laundry?
Speaker:Uh, we're gonna talk about the hidden cost of a breach and, uh, I, you know,
Speaker:I was looking around for some stories.
Speaker:terms of, you know, ones that talk about that show how much more cost of
Speaker:a breach, how much more of it has to do with things that aren't the ransom.
Speaker:We, we, when we talk about ransomware, we talk about how
Speaker:expensive that ransom can be.
Speaker:But this episode we want you to think about what else might, uh,
Speaker:a ransomware attack cost you.
Speaker:And I'm gonna start with this attack from the UVM Health Network in October of 2020.
Speaker:It crippled their IT systems for nearly a month, costing over $63 million.
Speaker:Started from, uh, initially via a phishing email.
Speaker:And, uh, they had to use, if you can get this, I, by the way, I, I'm a fan.
Speaker:Um, what, shoot, I did it again.
Speaker:Alright.
Speaker:The, so it forced the staff to use paper records.
Speaker:Uh, obviously delayed patient care, uh, shutting down over 1300 servers.
Speaker:I'm a fan of this TV show called The Pit.
Speaker:And In the Pit they are currently experiencing this exact, uh, outage
Speaker:and they are, uh, switching to.
Speaker:Paper records and, uh, you know, it, it, if you're not a fan of the
Speaker:show, it's a huge, huge, uh, uh, hit.
Speaker:And, um, if, if you're arf fan, make sure that you watch it and you look at this
Speaker:because it really gives you an idea of the impact to the rest of the business.
Speaker:You're, we're so.
Speaker:Tied to, uh, technology that we don't know.
Speaker:And imagine when you think about the degree to which technology
Speaker:has impacted healthcare, right?
Speaker:So they talked about how it impacted radiology, uh, laboratory services,
Speaker:and they used something called the MyChart portal, with, uh, imagine if
Speaker:My, my, my, my healthcare provider uses that.
Speaker:Do they MyChart?
Speaker:Um, imagine if that's how everybody finds out about their
Speaker:healthcare then suddenly it's gone.
Speaker:Right?
Speaker:Um, and, um, um, so they're
Speaker:Wait,
Speaker:computers and 1300 servers were encrypted.
Speaker:Uh, you have any other, uh, details on this story, Mike?
Speaker:Uh, just a few.
Speaker:I mean, I think it was, uh, it's interesting how it actually happened.
Speaker:Uh, the, uh, an employee took their work laptop with 'em on vacation,
Speaker:opened a phishing email, laptop, got compromised, brought it back into the
Speaker:environment, and then, uh, the, the malware spread once, uh, it reconnected
Speaker:to the, the company's network.
Speaker:So that was interesting.
Speaker:Um, and then the, the other part about that is it's not very
Speaker:often that we catch the bad guys.
Speaker:Um, not that it, it, it offered any, um, any latitude here other than, you know,
Speaker:you've got, uh, from a, from a victim perspective, you've got some damages you
Speaker:could probably collect from this guy.
Speaker:Pounding rocks in jail.
Speaker:Uh, but they did catch him.
Speaker:Uh, it was a Ukrainian, uh, hacker.
Speaker:Um.
Speaker:But, you know, we'll, we'll jump into some of the, the other things to think
Speaker:about from a damages perspective.
Speaker:It's not just financial, uh, you know, directly related to
Speaker:ransom or directly even related to, uh, your recovery efforts.
Speaker:There's a lot of other things to think about.
Speaker:Yeah.
Speaker:Um.
Speaker:Uh, Prasanna, you think about like, what would be, like, what would be
Speaker:like the first thing that you would think to, obviously the ransom, right?
Speaker:What would you think would be like the first thing that we would talk about when
Speaker:Well,
Speaker:we lost revenue or, uh,
Speaker:yeah.
Speaker:Well, well, even with the, the,
Speaker:the question, but,
Speaker:no, I'm not, I'm, I'm not even thinking about that stuff.
Speaker:Right.
Speaker:What I, what went to my mind, right.
Speaker:You pay a ransom.
Speaker:Great.
Speaker:There's a cost of sort of like recovering your environment.
Speaker:Mm-hmm.
Speaker:Mm-hmm.
Speaker:Be it people going around re-imaging systems, trying to recover data,
Speaker:getting things back up and running in.
Speaker:Probably, it's all the stuff that Mike, we've talked about
Speaker:on the podcast before, right?
Speaker:It's like that process of just recovering your environment,
Speaker:Right.
Speaker:right?
Speaker:Which might take weeks or months, and there is a cost associated
Speaker:with that beyond just sort of the, Hey, I paid the ransom.
Speaker:Let's talk about that.
Speaker:Like what type of costs are we talking about?
Speaker:Like, um, are we talking about like, we talking about overtime?
Speaker:Um,
Speaker:Well, it's like people,
Speaker:well yeah.
Speaker:People, right?
Speaker:yeah.
Speaker:Mike, I, I, uh, I was just thinking about whether or not
Speaker:overtime would, would happen.
Speaker:That's probably not, not a lot of it.
Speaker:People, they're, they're, they're generally staffed, right?
Speaker:They're generally sorry, exempt IT people.
Speaker:Um, it, it depends on their role.
Speaker:Uh,
Speaker:so to, in order to be exempt, you have to be in a leadership,
Speaker:you know, independent role.
Speaker:A
Speaker:lot of lower level IT and cyber people are not.
Speaker:So they
Speaker:would be eligible for, for overtime.
Speaker:So that'd be, that'd be a big cost.
Speaker:Right?
Speaker:So,
Speaker:or hiring people like Mike to come in to help them.
Speaker:Well, yeah, that's, that was definitely the next, right?
Speaker:So, so.
Speaker:So hopefully you are going, you know, one of the things that we make in, uh,
Speaker:one of the points that I know we make in this lovely book here, uh, learning
Speaker:Ransomware Response and Recovery.
Speaker:Yeah.
Speaker:For people who don't know, we have video you can watch us describe things.
Speaker:You can see Curtis Point at the book right behind him.
Speaker:If you go to YouTube and search for this channel, we are there.
Speaker:By the way, none of us have the actual book Do.
Speaker:Have you ever received your books yet, Mike?
Speaker:I have
Speaker:not.
Speaker:Yep.
Speaker:it's gonna happen.
Speaker:Just at some point then you'd be able to like hold it up.
Speaker:You know, I was looking at some of my, my other books up there on the shelf.
Speaker:It's very, it's very cool once you finally have it in your hot little hands.
Speaker:But yeah.
Speaker:So one of the things that we recommend is that before all of this happens,
Speaker:because Mike, what, what, what position did we take in the book
Speaker:as to whether or not the odds that this would eventually happen to you?
Speaker:It is pretty high.
Speaker:Pretty high.
Speaker:Pretty
Speaker:An understatement.
Speaker:Damn near a hundred percent right?
Speaker:Uh, so before this happens to you, one of the things we talk about is to establish
Speaker:a relationship with a company like Mike's.
Speaker:Uh, Mike, you wanna talk about, like, when we say a company like
Speaker:yours, what, what do we mean?
Speaker:A company like Black Swan Cybersecurity, uh, you know, we're not just a security
Speaker:managed security services firm from a protection, monitoring perspective.
Speaker:We're also an incident response and litigation support firm.
Speaker:So, uh, kind of that trusted advisor that you can call for, you
Speaker:know, the entire spectrum of it.
Speaker:Cyber issues or, or questions or, or services.
Speaker:Um, and, and that perspective that we bring to the table
Speaker:regarding, regardless of where we.
Speaker:Or how we work with a particular organization, we're able to, to expand
Speaker:the, the value of that conversation based on all the other things we do.
Speaker:Uh, so we're not just talking about, uh, keeping you from, uh,
Speaker:getting attacked or mitigating what that attack might look like.
Speaker:We can also talk about, well, if you do get attacked, uh, depending on what
Speaker:controls or services or capabilities you have, this is what you can expect.
Speaker:Uh, on the back end of, of an attack and, and how that's gonna go.
Speaker:Um, and so even if you have all the great, you know, greatest tools and, and brand
Speaker:names, uh, deployed in your environment, uh, odds are it's gonna happen.
Speaker:Uh, and we saw that with CrowdStrike, right?
Speaker:It, it wasn't a cyber attack on you, it was an outage on CrowdStrike.
Speaker:With that left your environment vulnerable and then you get attacked.
Speaker:'cause bad guys watch the news also.
Speaker:Um, alright, so now what, uh, I had CrowdStrike, but I got attacked.
Speaker:Who do I call now?
Speaker:I'm probably not gonna call CrowdStrike 'cause they're busy putting out their own
Speaker:fire and I'm a little upset at them now.
Speaker:Uh, so, so who am I gonna call instead?
Speaker:Um, and so having those, uh, those resources in your pocket and,
Speaker:and having gotten to know them.
Speaker:Before an incident, you know, call 'em today, uh, when things are nice
Speaker:and calm and you can have a good conversation or cup of coffee, um,
Speaker:and not when the house is on fire and you're emotional and you're not sure
Speaker:what to say or, or what to do next.
Speaker:Yeah, so I like that idea of having basically, you know, you, the thing is
Speaker:that the good news is that most people.
Speaker:Uh, don't have a lot of experience in cyber recovery.
Speaker:And, and by that I mean, if they did, then that would really suck, because that
Speaker:means that they're doing it all the time.
Speaker:And so this is definitely one of those things where I think a professional
Speaker:can come in, uh, you know, uh, come in handy, uh, quite a bit, right?
Speaker:Um, I, I did, while you were talking, I, I, I got this image
Speaker:of you standing between, uh, the fan and the feces, um, uh,
Speaker:and fighting it off.
Speaker:Um, so, we talked about lost revenue, or we didn't talk about we, so
Speaker:the first thing we talked about lost wages, and we talked about
Speaker:bringing in third party services.
Speaker:What were you about to say?
Speaker:Prasanna?
Speaker:But also along the recovery aspect before we get to the
Speaker:revenue piece, right?
Speaker:It's, you might need hardware.
Speaker:Right.
Speaker:Maybe you need to buy more servers or maybe you need to spin up services
Speaker:in AWS or pick your cloud service in order to recover or start to recover
Speaker:while you're still remediating other systems in the environment.
Speaker:Maybe you're gonna need all of those things, right?
Speaker:Yeah.
Speaker:you know, and it's gonna be in this category of spare no expense, right?
Speaker:Um, you know, you're not gonna be able to, uh.
Speaker:You know, order your servers on Amazon Prime away for free two day delivery.
Speaker:Uh, you know, you're, you're gonna be, you're gonna be calling your
Speaker:server company of choice and going, I need 1300 new, you know, Dell, 9,500.
Speaker:I don't know, I don't, I don't know any server volume numbers or uh,
Speaker:And, and really I'll, I'll tell you, even even the US government
Speaker:would have trouble getting a one day turnaround on 1300 servers.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um.
Speaker:The, uh, and, and then the, I think the, perhaps the thing that we're getting to
Speaker:Atlas in terms of some of these costs is the lost business revenue, right?
Speaker:So we live in a very connected world, and when, uh, you go to do business
Speaker:with some sort of entity, right?
Speaker:Obviously this is.
Speaker:speaks more to commercial businesses rather than governmental entities.
Speaker:it's not like we can go, oh well the city of San Diego is down.
Speaker:I will go give my money to Irvine.
Speaker:Uh, it doesn't quite work like that.
Speaker:But, um, but with a business, when you go to interact with that
Speaker:business and you see that it is down.
Speaker:It's not like your need goes away, so you as a consumer goes and spends
Speaker:your money elsewhere, and that's money that you're never gonna get back.
Speaker:And your reputation.
Speaker:So it, it's not just that direct client that you lost, it's everybody
Speaker:they know also, uh, that might have potentially, either, either
Speaker:they were or could potentially be a client of yours in the future.
Speaker:It.
Speaker:Do you know Mike?
Speaker:Just, sorry.
Speaker:I like to ask stats questions 'cause you seem to have so many of them.
Speaker:Do you know what percentage of businesses that get hit with ransomware go under?
Speaker:Oh, it's over half.
Speaker:So if,
Speaker:if you don't have, if you don't have a solid, well, it's over half.
Speaker:For those that don't have a solid response plan.
Speaker:Hmm.
Speaker:So more than 50% of the companies that get hit with ransomware or any significant
Speaker:cyber incident and they don't have an incident response plan can't survive.
Speaker:But incident, uh, ransomware, especially the double extortion one, very hard
Speaker:on on businesses that, that aren't prepared for that for two reasons.
Speaker:One, they've gotta pay for the, the recovery, uh, from the event itself.
Speaker:And then because it's double extortion, a lot of those, uh, organizations
Speaker:can't afford the regulatory fines.
Speaker:Uh, for the, uh, PII or consumer related data that they're gonna get
Speaker:fined, especially if it's California with, what is it, $25 a record?
Speaker:Uh, yeah.
Speaker:It's, it's, it's crazy.
Speaker:I think we should get that money, don't you think?
Speaker:Prasanna, you and I live in California, why don't we get this money when our
Speaker:records, why do they get more money?
Speaker:Because our data was, was hurt.
Speaker:That's all I'm saying.
Speaker:Um, $25
Speaker:Yeah.
Speaker:$25 is not gonna be, um,
Speaker:I.
Speaker:not gonna be much.
Speaker:But um,
Speaker:And I guess that's a third category, right?
Speaker:We talked about revenue, but then there are the fines.
Speaker:Yeah, the re the Reg regulatory fines.
Speaker:It is true.
Speaker:Uh, GDPR is huge, right?
Speaker:If you're, if you're in that world, because that's, they start talking about
Speaker:a percentage of annual turnover, right?
Speaker:Which is, and that semi analogous to revenue, it's a different term, but
Speaker:I've never quite fully understood the difference between annual.
Speaker:Do you know, Mike?
Speaker:Are you a revenue annual turnover person?
Speaker:Yeah, just stick with US terms,
Speaker:Yeah.
Speaker:Okay.
Speaker:Okay.
Speaker:It is like 4% though, I believe right
Speaker:up to 4%
Speaker:of the annual turnover.
Speaker:Yeah.
Speaker:Um, the, um, so yeah, so we talked about lost revenue.
Speaker:And Mike, you talked about the reputation effect because it's.
Speaker:I can, I can think back companies that have lost my data, a company that have
Speaker:had in, you know, incidents with my data and I haven't forgotten that.
Speaker:Right.
Speaker:Uh, you know, I can think literally, um.
Speaker:Of like the first cyber incident that I remember that had that involved my data.
Speaker:Um, it goes, you know, all the way back to 2005 and I remember that incident
Speaker:and I know exactly which company that was and I will never forget it.
Speaker:Right now in, now in that particular company, I don't get a
Speaker:choice of not working with them.
Speaker:Right.
Speaker:It's, uh, it's, um, the, um, regulatory, I'm not regulatory,
Speaker:um, credit reporting agency.
Speaker:Right.
Speaker:Um, but the, I, I wish we had the choice of not working with, with
Speaker:But,
Speaker:but here's a question though, Curtis, do you remember that first one
Speaker:clearly?
Speaker:Do you remember the next 25 or 50 that have come up?
Speaker:Just given how many of those notices that you get every
Speaker:month?
Speaker:I mean there, there is a, that is a good point, right?
Speaker:That, that we are starting to get, um, somewhat, it's sort of like, um, Mike, you
Speaker:don't live in California, but you know, in California, we, um, um, of, uh, over
Speaker:here we have this like thing about, um, this thing has been shown to cause cancer.
Speaker:Literally everywhere
Speaker:I see them on all the labels, but I tear.
Speaker:I'm able to tear that one off.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, but, uh, with every, every business that you go in there, it's
Speaker:like, uh, so it's like, there is, there's certainly, uh, alert fatigue.
Speaker:That's a good point, Prasanna.
Speaker:Um, but I will say that I definitely remember the ones that
Speaker:definitely inconvenienced me.
Speaker:Definitely.
Speaker:I definitely do.
Speaker:Um, you know, where if, if, if I was significantly inconvenienced,
Speaker:I definitely remember that.
Speaker:And my point, my point is that I, I will never forgive that.
Speaker:I will never forget that.
Speaker:I can also remember, and again, I'm not gonna throw their name out because
Speaker:I don't want to get sued, but I also know the, the one backup company that
Speaker:I know lost people's data, right.
Speaker:and I, I won't ever forget that, right?
Speaker:So the, the, the damage to your reputation, I don't
Speaker:think you can ever get back.
Speaker:And another thing that you're never gonna get back, we talked about lost revenue.
Speaker:There's lost revenue of what happens during the outage.
Speaker:But what happens if during the outage your, your customer goes to your
Speaker:competitor and they go, oh, this company's not as bad as I thought it was.
Speaker:You know, I, I guess we could, we could continue doing
Speaker:business with them over here.
Speaker:Now, not only did you lose.
Speaker:Revenue during that outage.
Speaker:You have lost the future revenue from that customer.
Speaker:Um, and the, you know, the reputational damage that you talked about
Speaker:Mike, that does damage to future revenue from future customers.
Speaker:They're going around, Googling whether or not they should do business with
Speaker:you, and this is the story that pops up.
Speaker:Yeah.
Speaker:And,
Speaker:and Curtis, I know we've done podcast episodes last
Speaker:year, right?
Speaker:If I look at Rackspace
Speaker:and their exchange outage,
Speaker:which caused them to shut down a huge business for them, right?
Speaker:Hosted exchange, we also talked about LastPass.
Speaker:Yep.
Speaker:And their breach.
Speaker:And you could just imagine like all those fines and penalties.
Speaker:I think they even started getting sued like years later, right
Speaker:after the incident happened.
Speaker:Because sometimes it takes that long before activities, criminal
Speaker:activities start to show up based on, uh, the data that was stolen.
Speaker:Yeah, you know, I actually know somebody, by the way, that went to go do marketing
Speaker:at LastPass, and I was like, Good
Speaker:Hmm.
Speaker:with that.
Speaker:Well, there's a couple other things to consider too.
Speaker:Uh, we talked about overtime and, and the staff, internal staff that
Speaker:are addressing a particular incident.
Speaker:You may actually lose that staff.
Speaker:You know, they, they, they're used to their eight to five or shift job,
Speaker:and now you've got 'em working three hour, you know, three days straight
Speaker:with, with, you know, sleeping on the floor at their desk and eating.
Speaker:You know, carry out food or pizza, which, you know, I wouldn't mind for three days.
Speaker:But, uh, at the end of that, you know, they're exhausted and that's,
Speaker:that's not what they signed up for.
Speaker:Or maybe even they were getting, you know, a little bit of attitude
Speaker:from, from other employees or executives and they, they quit.
Speaker:Uh, and, and it's probably the ones that quit are probably the ones that have been
Speaker:telling you that there's this problem that hasn't been addressed for some period of
Speaker:time.
Speaker:And that's what led to this breach.
Speaker:And
Speaker:they're like, I told you so, and you know, I'll help you get through this, but
Speaker:I'm gonna, uh, I'll be out after that.
Speaker:The other thing, uh, so the, the human impact, um, and whether
Speaker:they quit or not, they, they're not gonna be the same person.
Speaker:It's like going into war, like you, you come out the other side
Speaker:and, and, and you're just, you don't see things the same way.
Speaker:You're, you're not the same person.
Speaker:Uh, so people that have been through a significant incident are, are,
Speaker:uh, they're changed in a way.
Speaker:Alright?
Speaker:So there's the human person, uh, the human perspective or the impact supply
Speaker:chain and, um, supply chain's one.
Speaker:So now you're going to, you're probably gonna burn some bridges trying to get,
Speaker:you know, equipment or, or, or support.
Speaker:Uh, and by that I mean you're, you're gonna approach this, uh, this
Speaker:incident with a little bit of, uh.
Speaker:Um, uh, emotion and, and, um, aggressiveness that some
Speaker:people may not appreciate.
Speaker:Uh, and then the other part of that is, uh, if, if you are heavily
Speaker:involved in financing stuff, right?
Speaker:Like maybe you're building a new facility or you need, you need, you need credit
Speaker:to buy equipment that you then resell.
Speaker:Uh, this incident could, could impact your credit rating as a company, uh, your
Speaker:bond rating, uh, things like that, that may, so maybe you're a
Speaker:construction company and you build hospitals and military bases, and
Speaker:now all of a sudden you've got this cyber attack that puts you down.
Speaker:Uh, those, those, uh, financial funding vehicles may, may have
Speaker:a different perspective of working with you in the future.
Speaker:Also.
Speaker:Yeah, no.
Speaker:When you were talking about that, Mike, I was thinking about the reputation comment
Speaker:you made earlier where you've now impacted not only the reputation of your customers,
Speaker:but even your vendors and suppliers too, who are like, Nope, we don't quite trust
Speaker:what you're doing, or maybe you don't get preferred rates or other things like
Speaker:that
Speaker:Mm-hmm.
Speaker:potentially as well.
Speaker:And, and, and it's weird.
Speaker:Uh, it's not just the inputs, it's also the outputs, uh, from a, from a vendor
Speaker:or relationship or system perspective.
Speaker:Um.
Speaker:We worked with a company.
Speaker:It was a, it was a dental, a dental practice.
Speaker:Their payment processor shut off when, when they had an incident,
Speaker:they notified everybody, uh, very diligent and responsible.
Speaker:The payment processor shut off access, and even after they said we fixed
Speaker:all the problems, uh, the payment processor required a third party
Speaker:objective review of that environment before they turned that access back on.
Speaker:So this, it wasn't just.
Speaker:You know, paper records and, and operating the way we used to, they were, they
Speaker:were literally also taking, having to take, uh, credit card, you know, the
Speaker:carbon copy swipes of credit cards to, to, uh, to take payment so that
Speaker:they could process it later when their payment processor came back online.
Speaker:That's crazy.
Speaker:I don't even remember the last time I had to do that,
Speaker:Well, and, and to that point, I mean, these are, these are all things
Speaker:you've gotta think about today.
Speaker:All right?
Speaker:So if our payment, whatever, all our critical things, well payment
Speaker:processing's a critical thing.
Speaker:Well, what happens if that goes away?
Speaker:How are we gonna process
Speaker:our.
Speaker:yeah, that's interesting that you mention that because I just, just, uh, I don't
Speaker:know, a week or two, a week or two ago, I set up a new, um, you know, a new minute,
Speaker:my new, uh, LLCI set it up in, uh, Stripe to be able to accept, you know, to be
Speaker:able to send a, a payment leak that took.
Speaker:A few days, Because there's, there's an authentication process.
Speaker:And, um, so e even if you let, let's say if you're able to quickly go over to
Speaker:another payment processor, it, it's not like that's gonna just start processing
Speaker:payments, uh, immediately for you.
Speaker:They,
Speaker:they did not pay the ransom.
Speaker:So even, even with $30 million in, in insurance coverage,
Speaker:not even paying the ransom.
Speaker:Their, Their, recovery cost was almost 65
Speaker:million.
Speaker:right.
Speaker:Um, and then of course they're gonna end up with, uh, probably increased,
Speaker:um, insurance rates after this and possible cancellation of the policy.
Speaker:Right.
Speaker:I wonder, Mike, have you ever seen that?
Speaker:Where that, where people file a claim and then they get their
Speaker:cyber insurance policy canceled?
Speaker:It.
Speaker:Yes.
Speaker:Uh, but it's, it's less common than the insurance company giving
Speaker:them a very long list of things.
Speaker:They've gotta remediate and prove that they've remediated that, uh, to keep
Speaker:their policy, their premium will go up.
Speaker:'cause their risk went up.
Speaker:Uh, but that's usually just in the following year.
Speaker:So let's say, you know, every year there's a 3% increase
Speaker:after an incident, having, having satisfied the insurance company's
Speaker:remediation list, if you do all that, you may get a five and a
Speaker:half percent or 6% increase in your premium for the next year.
Speaker:Well then subsequent years, uh, you know, that may go back down to just
Speaker:the, the standard 3% or whatever it is.
Speaker:Uh, if you maintain your.
Speaker:Your, uh, hygiene and, and, and control effectiveness according to,
Speaker:and, and that insurance company may ask for, you know, multiple years
Speaker:of, of, of third party assessments
Speaker:to, to keep your policy.
Speaker:And, and we're gonna cover this on a later episode, but that's definitely something
Speaker:you should be doing upfront, again, where you can talk to your insurance company,
Speaker:uh, you know, what are the things that we should be doing already, right?
Speaker:Again, talk to a company like yours, right?
Speaker:A blue team company, uh, that, that will help you defend yourself.
Speaker:So let's talk about, um,
Speaker:I have one.
Speaker:Yep.
Speaker:So as Mike was talking about that, uh, one thing popped to my mind, which was,
Speaker:so you get hit with ransomware.
Speaker:You're like, okay, X, Y, and Z all needs to change.
Speaker:There's the cost of updating and changing processes
Speaker:that may be significant depending on how you are operating today.
Speaker:I think, and I don't know how to quantify that.
Speaker:I'm sure it depends on what the risk is, or like Mike, what you were saying.
Speaker:If your insurance company tells you to remediate a bunch of issues that
Speaker:might involve significant restructuring of your organization processes in
Speaker:order to be able to handle this.
Speaker:Here's a good example.
Speaker:Let's say, let's say you're a, a, a, a medium sized company.
Speaker:You probably have some things documented like, how do I restore a computer?
Speaker:How do we revert to a, a manual process in the absence of
Speaker:our systems being available?
Speaker:You probably have some of that documented.
Speaker:It's probably old.
Speaker:Uh, it maybe some of it's tribal knowledge, uh, but at, as a result
Speaker:of an incident, the insurance company may come and do an audit and they
Speaker:may say, you've, you've got some or nothing, but this is what we expect.
Speaker:And
Speaker:so in a lot of cases, you can't just update something that's been
Speaker:in place for a long time because it's obviously not effective.
Speaker:And in order for a control to be effective, it has to be designed well.
Speaker:In order to design well, you've gotta.
Speaker:Get good information, current information from all the stakeholders.
Speaker:Uh, and so a control is this thing that operates, and most controls
Speaker:have inputs and outputs and so those are other stakeholders and controls.
Speaker:So you've got this kind of enterprise exercise that you have to go through.
Speaker:Um, and if you haven't gone through a business impact analysis, this
Speaker:exercise would be very similar.
Speaker:So you essentially go and look for all the critical things in our company that,
Speaker:that keep the lights on and pay the bills, and, you know, sustain our, our
Speaker:revenue and our reputation and our client base and whatever those things are.
Speaker:And in that assessment, you then determine what are the, the
Speaker:critical people, processes, and technologies required to function,
Speaker:and then what are the alternatives?
Speaker:So if that thing goes away, I can do it, I can do it this
Speaker:other way for a period of time.
Speaker:But what is that?
Speaker:What's that pain point?
Speaker:Is it an hour?
Speaker:Is it a day?
Speaker:And, and what's, how do I quantify that?
Speaker:Is that a million dollars an hour?
Speaker:Is it a million dollars a day?
Speaker:Is it a million dollars a week?
Speaker:Uh, and so now we we're, we've got all of this stuff laid out and current
Speaker:so that I know if that department or that process breaks, this is how much
Speaker:time and what is required to recover.
Speaker:And in that time, this is my financial impact or these other impacts.
Speaker:It could be, you know, if it's a hospital and the intensive care
Speaker:unit goes down, that could be human life, it could be regulatory,
Speaker:you know, whatever the case is.
Speaker:But I have all this stuff lined out now and then from this body of knowledge
Speaker:that I've, I've just created, that translates directly into business
Speaker:continuity, disaster recovery, incident response, and how I categorize all
Speaker:my, you know, the criticality of all these things that could happen.
Speaker:You know, ransomware on a print server, probably not really high unless
Speaker:that print server is what's creating checks, uh, or, or shipping orders.
Speaker:And I, you know, and I'm, I'm, I'm shipping million dollar things.
Speaker:Uh, and so that's, that's a perspective a lot of people think, well, ransomware
Speaker:on a print server, that's nothing.
Speaker:Well, it is if that's how you make money.
Speaker:Uh, and so going through an exercise like that really puts some
Speaker:gravity, uh, and awareness in your environment that you can share with.
Speaker:Leadership.
Speaker:Executive leadership.
Speaker:And that's very important because when we go to leadership and say, I need
Speaker:budget to keep the lights on to make sure this stuff doesn't happen, and they're
Speaker:like, yeah, we're not gonna pay that.
Speaker:'cause we we're, we've got this new marketing advertising campaign
Speaker:to, you know, for whatever.
Speaker:And, and they don't, they don't always realize that where they're focused, um.
Speaker:Oftentimes leaves a huge gap in, in risk.
Speaker:Uh, and, and maybe there's some kind of middle ground that we can come
Speaker:to, uh, or roadmap we can build.
Speaker:Maybe we don't have to do it all at the same time, uh, but you know, this month
Speaker:we need to do something and six months we need to do something and so on.
Speaker:Um, but that business impact analysis and that that huge analysis of all
Speaker:those different criticalities and risks will help you have that conversation.
Speaker:Um, and by the way, leadership, uh, executive leadership is often
Speaker:included in those, those workshops, in that process, that exercise.
Speaker:Uh, so they get to, uh, they get to participate in and have some, some
Speaker:introspection, uh, of their, of their business and their, and their
Speaker:responsibility during that exercise, so that sometimes that, that helps
Speaker:facilitate a better discussion.
Speaker:Well, that, that whole thing that you just described, it's one of those things where.
Speaker:It's the, you know, the phrase, you know, uh, never time to do it, right.
Speaker:Always time to do it over, right.
Speaker:It falls into that category of like, it's, it's activities that you need
Speaker:to do that are best done upfront, and they're kind of a pain, like everything
Speaker:you just described sounds really, really important, but it's a pain right?
Speaker:To,
Speaker:But you know what?
Speaker:I think there's, there's some misconception there.
Speaker:Yeah, there's, it's gonna take time away from your, your job.
Speaker:But to your point, you know, if, if I'm, if I'm busy doing something and,
Speaker:and my daughter calls me, I'm gonna stop what I'm doing and I may have
Speaker:an hour phone call with my daughter,
Speaker:30 minutes, whatever the case is, because I can prioritize that
Speaker:over this spreadsheet I'm created.
Speaker:Yeah.
Speaker:If, if you can.
Speaker:Set aside an hour to talk to an advisor or a consultant about
Speaker:this business impact analysis.
Speaker:You, you, sometimes you just have to have it on your calendar
Speaker:and you're just gonna do it.
Speaker:And I think the mis, there's a misconception that this business impact
Speaker:analysis is this huge, cumbersome, you know, 90 day, 120 day thing.
Speaker:And yeah, I'm sure there's some large enterprises where it, it would take
Speaker:that long, but for the most part, small to medium sized businesses can
Speaker:get a BIA done in one to three weeks.
Speaker:And
Speaker:that's like one person talking with, you know, one-on-one with
Speaker:different, we did a city government, um, 14, 15 different departments.
Speaker:We did it in two weeks.
Speaker:Yeah.
Speaker:Uh, well, I, I think that that's a really good point, Mike.
Speaker:I, I like, I, I, the point, I, you made a different point, which is a great point.
Speaker:The point I was making was whatever level of pain it is, whether
Speaker:it's a day, weeks, or months.
Speaker:The point is that by doing this work upfront, it gives you the power
Speaker:that you need to make, the changes that you need to your environment
Speaker:from a recovery perspective, from a cybersecurity perspective.
Speaker:And also when the feces sits, the rotary oscillator, you know where you need to be.
Speaker:Right.
Speaker:You know, like you said, you, you, you know that your daughter
Speaker:calling is, is important.
Speaker:Right.
Speaker:You will know.
Speaker:Well, I know that this thing, like, you know, you, you
Speaker:talked about the print server.
Speaker:know, we're, let, let's say I immediately thought of, uh,
Speaker:what we used to call Kinko's.
Speaker:You remember Kinko's?
Speaker:Uh, now it's called the FedEx Print Center, uh, which I was, I was in a
Speaker:FedEx Print Center just a few days ago.
Speaker:In
Speaker:the middle there, it was called FedEx Kinkos.
Speaker:Yes, it wa There was, there was, that was a FedEx Kinko's.
Speaker:Yeah.
Speaker:Uh, but in the, their print server going down, that is a direct, um,
Speaker:you know, revenue generator, right?
Speaker:So if you know that, you know the different parts of your business and you
Speaker:know the, the cost that your business is going to experience when a ransomware
Speaker:attack hits, it just empowers you with the ability to make the right decisions.
Speaker:To minimize the impact on your, on your business.
Speaker:So
Speaker:Knowledge is power.
Speaker:And my other favorite saying from GI Joe is knowing is half the battle.
Speaker:Love it.
Speaker:is that from GI Joe?
Speaker:The movie?
Speaker:It's GI Joe.
Speaker:Well, it
Speaker:the TV
Speaker:cartoons.
Speaker:It's like the, at the, very end it's uh, you know,
Speaker:knowing is
Speaker:half the battle.
Speaker:would always say that at the end.
Speaker:Uh, I, for the record, not familiar with GI I, Joe, beyond the
Speaker:Oh, it's amazing.
Speaker:Cobra and.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um, so the, the next thing, another, uh, action.
Speaker:I, so we talked about doing a BIA, right?
Speaker:The next thing that we have is action items, is to review again,
Speaker:now review your insurance coverage.
Speaker:You, you want to talk about that, Mike?
Speaker:Like what kind of, what kind of stuff?
Speaker:Well, it's, it's critical because a lot there, I think there's a lot of companies
Speaker:that, that just Google cyber insurance and they get quotes and they go with the
Speaker:lowest quote and they figure they're, you know, they're the lowest premium
Speaker:and they, they figure they're covered.
Speaker:Well, you're covered based on all that fine print, and I've got
Speaker:a, a pretty interesting example.
Speaker:Uh, so in addition to, to helping companies, uh, on the defensive side.
Speaker:Uh, we also do litigation support.
Speaker:And, and in one case we were, we were working for the insurance company,
Speaker:uh, who didn't wanna pay a claim.
Speaker:And so they sent us all this data and our, our objective was to determine if,
Speaker:where, where did the attack originate?
Speaker:Was it a domestic attack?
Speaker:Was it, was it international?
Speaker:It turned out to be international.
Speaker:And they declined the, they, they declined the claim because the
Speaker:policy only covered domestic attacks.
Speaker:Wow.
Speaker:So
Speaker:it is important, uh, you know, go with a reputable insurance carrier,
Speaker:make sure you read the fine print, get an advisor or a broker to help you.
Speaker:Um, and then, you know, a lot of those, uh, a lot of that process
Speaker:stems from a questionnaire that the insurance company is gonna send you.
Speaker:And a lot of organizations, especially the small ones, don't know how to.
Speaker:Fill out that questionnaire.
Speaker:A lot of times
Speaker:it's yes, no, they don't give you the opportunity to add context.
Speaker:Uh, like there's no maybe, uh, it's either yes or no.
Speaker:Uh, and so I think a lot of organizations on in the maybe category
Speaker:will still say yes, even though they're not sure, or maybe it's not
Speaker:fully implemented.
Speaker:Well, the insurance company's gonna hold you to those answers if
Speaker:there's an incident or a breach.
Speaker:And they're gonna go, well, you said yes and you, it's actually no.
Speaker:So we're not gonna cover your claim 'cause you lied to us.
Speaker:Uh, when,
Speaker:when we establish this, this policy.
Speaker:The other thing to think about too is you can have more than one policy, uh,
Speaker:just make sure that you maintain and are fully aware of, of both of them and, you
Speaker:know, any, any attributes or requirements or stipulations in either one.
Speaker:Um.
Speaker:You know, that brings up a story.
Speaker:Do you remember Tony Curtis from Spectral Logic when he
Speaker:came on the podcast?
Speaker:Yeah.
Speaker:And so this was a company Mike that got hit with, uh, ransomware, shut down
Speaker:their entire environment.
Speaker:be in the backup industry.
Speaker:By the way,
Speaker:Yeah.
Speaker:tape library manufacturer, right?
Speaker:And he was, I think he was like head of it or something, some position like that.
Speaker:And he found out that just a week before they had signed up
Speaker:for a cyber insurance policy.
Speaker:Yeah,
Speaker:Yeah.
Speaker:was like a week or two before he was like, oh my gosh, thank God.
Speaker:well.
Speaker:they brought in all the experts and all the rest.
Speaker:I am glad it worked out for him because a lot of those, uh, a
Speaker:lot of a, a lot of policies will have a, a cooling off period.
Speaker:So you sign up today, but it's really not effective for 30 days.
Speaker:Yeah.
Speaker:So I guess the last action item is you've sort of gone
Speaker:through, you've created a BIA.
Speaker:You've done all these things and making sure that you understand
Speaker:what needs to be recovered first.
Speaker:It's kinda like Mike was talking about the prioritization.
Speaker:Right.
Speaker:So making sure you understand what is critical to your
Speaker:business, have that listed down.
Speaker:So those are the things that you focus on first, rather than say,
Speaker:Curtis's home directory, which isn't the highest priority to recover from
Speaker:a ransomware attack.
Speaker:it is to me,
Speaker:Well, it's not the first thing.
Speaker:I know it's important to you, Curtis, all the cat videos that you have, but.
Speaker:cat fitting.
Speaker:I think that those are great points.
Speaker:And so in your BIA one of the, one of the outputs of your BIA as far as
Speaker:prioritization goes, it's not just the criticality of a particular system.
Speaker:But it's also the recovery point objective.
Speaker:So is is the, does that system have a lot of journaling that
Speaker:would allow us to do manual input or manual uh, uh, transactions?
Speaker:Uh, and so
Speaker:just as an example, we had a, a, a ransomware incident with a client who got
Speaker:hit on a Thursday night, uh, 10 o'clock.
Speaker:And we knew exactly what servers they hit and how it happened.
Speaker:Um.
Speaker:We were comf, we were comfortable thinking that Thursday night
Speaker:is when the attack happened.
Speaker:It wasn't some time in the past.
Speaker:Well, we still needed to have that conversation with the client.
Speaker:Well, how far back, how many days or weeks back should we target to recover from?
Speaker:Because we don't wanna just do earlier today or yesterday.
Speaker:'cause that may also have.
Speaker:The, you know, the attack, uh, artifacts in it, malware, whatever it was.
Speaker:And so having a good understanding of, of their backup strategy and
Speaker:their capabilities, we were able to say, all right, well, let's,
Speaker:because of, and in this case, it was a heavily virtualized environment.
Speaker:Well, let's go with Tuesday.
Speaker:And let's, let's run all our, all, all of our analysis against
Speaker:Tuesday's, uh, restored systems before they, we put 'em back online.
Speaker:If they're clean, then we'll go with Tuesday.
Speaker:If not, then we can go with Monday or whatever.
Speaker:Uh, a lot of organizations, uh, still have this full incremental,
Speaker:you know, weekly that kind of, uh, backup schedule because they're, they,
Speaker:they haven't adopted virtualization or whatever the case might be.
Speaker:Uh, and so if, if a, a system was compromised between those fulls.
Speaker:Then you've gotta do fulls plus the incrementals to get you
Speaker:back to some restore point.
Speaker:Well, your BIA is going to help you determine how far back can I go before it
Speaker:hurts, and if I have to go back further, do I have transaction, you know, logs,
Speaker:journaling to help me fill in the gaps?
Speaker:Uh, and if not, then, you know, here's the impact, uh, that I can expect.
Speaker:Um, one of the other things I was gonna add, uh, and I, I
Speaker:lost my train of thought a bit.
Speaker:Um.
Speaker:And what was it?
Speaker:Let's see.
Speaker:You were,
Speaker:Uh, it was a good point.
Speaker:It's a good point.
Speaker:Oh, here's a, here's another funny example.
Speaker:Funny for now that it's, it's years later, but, uh,
Speaker:plus time equals comedy.
Speaker:it was a telecom, $5 billion telecom.
Speaker:Uh, and they had an outage, and the outage, uh, sat on top of a legacy server.
Speaker:That legacy server continued to be backed up every day, but it was backed up, uh,
Speaker:initially to nine track backup tape.
Speaker:Give,
Speaker:The backup, the backup technology was, was in, in current day was the, um, DLT tapes.
Speaker:Yep.
Speaker:But they didn't create a base system backup, a bare metal backup on DLT tape.
Speaker:It was the, the only bare metal backup was on nine track.
Speaker:So when they had to recover this server, they couldn't, because
Speaker:they couldn't find a nine track tape to recover the tape from.
Speaker:So yeah, they were down hard for over a month until we
Speaker:know what?
Speaker:on eBay.
Speaker:Yep.
Speaker:Not uncommon.
Speaker:yeah.
Speaker:You know what, uh, when you were talking about, um.
Speaker:Just like, you know, switching to alternative methods.
Speaker:Remind me there, I think it was a, a Xerox commercial.
Speaker:When they go, if your printers go down, do your people go, it's okay.
Speaker:We'll just use carbon paper.
Speaker:It's like, no, no, they're not gonna do.
Speaker:Well, yeah, I think, I think we've given, uh, people enough to think
Speaker:about and to, um, you know, some action items where they can go work.
Speaker:Uh, it sounds like, uh, they'll do their BIA in a day or two,
Speaker:and then, uh, they'll be good.
Speaker:So, uh,
Speaker:the way.
Speaker:knock it out.
Speaker:Just, you know, it's like a lot of things.
Speaker:Just, uh, do it sooner than later.
Speaker:Doesn't matter when.
Speaker:The only thing that I know is it doesn't matter when you invent a time machine.
Speaker:All right.
Speaker:And with that, uh, that is a wrap.







