Ransomware Doesn't Care About Your Compliance Certificates
Last year, I worked with a financial services firm that had invested heavily in compliance. ISO 27001 certified. SOC 2 Type II audited. All the frameworks, all the checklists, all the certificates on the wall.
They got hit with ransomware anyway.
Not because they were negligent. Not because they didn't care about security. But because compliance isn't security, and ransomware protection strategy requires more than checking boxes. This is why a solid ransomware protection strategy matters—it keeps attackers from turning compliance theatre into real consequences.
The attackers didn't care about their ISO certificate. They didn't ask for their audit reports. They just encrypted everything and demanded payment.
Here's what actually works against ransomware—and why your compliance program might be giving you a false sense of security.
The Compliance Trap
There's a dangerous belief in business that compliance equals security. If we get certified, we're secure. If we pass the audit, we're safe.
But compliance frameworks are minimum viable security. They're designed to:
- Provide a baseline standard
- Satisfy regulatory requirements
- Demonstrate due diligence
They're not designed to:
- Stop determined attackers
- Protect against emerging threats
- Adapt to your specific risks
A compliant organisation can absolutely be breached. I've seen it happen.
How Ransomware Actually Works
To defend against ransomware, you need to understand how it works. Not the technical details (though those matter), but the operational reality.
Here's the typical attack chain:
Step 1: Initial Access
The attackers get in somehow:
- Phishing email with a malicious attachment
- Exploited vulnerability in public-facing software
- Compromised credentials (often from a previous breach)
- Remote access tool left exposed
Compliance frameworks tell you to patch systems and train users. Good advice. But patches take time, and users click things.
Step 2: Reconnaissance
Once inside, the attackers look around. They map your network. They identify:
- Domain controllers
- Backup systems
- Critical file servers
- Security tools they need to disable
They take their time. Weeks, sometimes months. They want to understand your environment before they strike.
Most compliance programs don't test for "attacker dwell time detection." Can you spot an intruder who's been quiet for 60 days?
Step 3: Privilege Escalation
The attackers need admin rights to deploy ransomware effectively. They:
- Exploit unpatched vulnerabilities
- Use credential dumping tools
- Move laterally to find admin accounts
- Compromise backup admin accounts specifically
This is where many compliance programs fall short. They check that you have privileged access management, but don't test whether it actually stops an determined attacker.
Step 4: Deployment
When they're ready, the attackers:
- Disable or delete backups
- Deploy ransomware to as many systems as possible
- Leave ransom notes
- Sometimes exfiltrate data first (double extortion)
This happens fast—often overnight. By the time you notice, it's too late.
ransomware protection strategy: What Actually Works in Practice
If compliance checklists aren't enough, what is? Here's the ransomware protection strategy I recommend based on incident response work:
Layer 1: Prevent Initial Access
Yes, prevention matters—even if it's not perfect.
Email security:
- Advanced threat protection that catches malicious attachments
- Link protection and sandboxing
- User reporting tools (make it easy to report suspicious emails)
Vulnerability management:
- Patch critical vulnerabilities quickly (days, not weeks)
- Asset inventory (you can't patch what you don't know about)
- Attack surface reduction (remove unnecessary services)
Identity protection:
- MFA on everything (I know I sound like a broken record, but this stops most credential attacks)
- Leaked credential monitoring
- Privileged account protection
Layer 2: Detect Intrusions Early
Assume they'll get in. Can you catch them before they deploy ransomware?
Endpoint detection and response (EDR):
- Behavioural analysis (not just signatures)
- 24/7 monitoring (in-house or outsourced)
- Automated response capabilities
Network monitoring:
- Anomaly detection
- Lateral movement detection
- Command and control communication detection
Log analysis:
- Centralised logging
- Regular review (not just automated alerts)
- Retention for at least 90 days
The key metric: mean time to detect (MTTD). Most businesses take months to detect intrusions. You need to get that down to days or hours.
Layer 3: Limit Blast Radius
When ransomware hits, how much damage can it do?
Network segmentation:
- Separate critical systems
- Restrict lateral movement
- Micro-segmentation where possible
Least privilege:
- Users only have access to what they need
- Admin accounts are separate and limited
- Service accounts have minimal permissions
Application control:
- Whitelist allowed applications
- Block unknown executables
- Prevent macro execution from untrusted sources
Layer 4: Recovery Capability
This is the big one. Can you recover without paying the ransom?
Immutable backups:
- Backups that can't be deleted or modified by attackers
- Air-gapped or offline copies
- Regular testing (a backup you can't restore is worthless)
Incident response plan:
- Documented procedures
- Pre-established relationships with IR firms
- Communication templates
- Legal and regulatory notification procedures
Recovery testing:
- Regular restore drills
- Documentation of recovery time
- Identification of critical systems (restore these first)
Securing your workplace? You're probably your family's IT person too.
The same principles that protect enterprise data—backups, access control, detection—work just as well at home. But most families have none of it.
Get my Personal Security Quick-Start Guide — the 193-page practical handbook for busy people who want to protect their families without becoming cybersecurity experts.
Plus: Join 158+ Australians getting one 5-minute security briefing every Friday.
The Backup Mistake That Kills Businesses
I need to talk about backups specifically, because this is where businesses fail most often.
Mistake 1: Online-Only Backups
Your backups are stored in the cloud. That's great! Except your admin credentials can log into that cloud console. And if attackers have those credentials, they can delete your backups.
Solution: Immutable backups. Once written, they can't be modified or deleted—not even by admins.
Mistake 2: No Offline/Air-Gapped Copies
All your backups are connected to your network. When ransomware spreads, it finds and encrypts your backup servers too.
Solution: Regular offline backups. Tape. Disconnected drives. Something the attackers can't reach from your network.
Mistake 3: Never Testing Restores
You assume your backups work. You've never actually tried to restore from them.
When ransomware hits, you discover:
- The backup has been failing for 3 months
- The restore process takes 5 days, not 5 hours
- Critical data wasn't included in the backup scope
- The backup is corrupted
Solution: Regular restore testing. Documented procedures. Time your recoveries so you know how long it actually takes.
Mistake 4: Slow Recovery Times
You have 50TB of data backed up. Great! Your internet connection can restore it at 100Mbps. That's... 46 days.
Solution: Understand your recovery time objective (RTO). If you need to be back online in 24 hours, you need a restore method that can achieve that. This might mean local copies, faster connections, or priority restoration of critical systems first.
The Pay-or-Don't-Pay Question
When ransomware hits, you'll face a terrible decision: pay the ransom or try to recover without it.
I can't make that decision for you. But I can tell you what to consider:
Reasons to pay:
- No viable backups exist
- Business would fail without rapid recovery
- Cyber insurance covers it (check your policy)
- Decryption is guaranteed (rarely true)
Reasons not to pay:
- No guarantee you'll get your data back
- You're funding criminal organisations
- You become a target for future attacks
- Legal and regulatory complications
- Moral/ethical concerns
The only good answer: Have backups that work, so you don't have to make this choice under pressure.
Compliance Has Its Place (But Know Its Limits)
I'm not saying compliance is worthless. It serves important purposes:
- Demonstrates due diligence to regulators
- Provides a baseline security framework
- Helps with cyber insurance
- Gives customers confidence
But don't confuse the certificate with actual security. You can be compliant and vulnerable. You can pass an audit and still get ransomwared.
Real security requires:
- Going beyond compliance minimums
- Testing your defences (penetration testing, red teaming)
- Continuous monitoring and improvement
- Incident response preparation
- Regular backup testing
What Small Businesses Can Do Today
You don't need enterprise budgets for effective ransomware protection strategy. Here's what I'd do with limited resources:
Today:
- Enable MFA on everything
- Check your backup status (are they actually running?)
- Patch critical vulnerabilities
This week:
- Test a restore from backup
- Document your critical systems
- Set up a password manager if you don't have one
This month:
- Implement EDR on all endpoints
- Review and restrict admin privileges
- Create a basic incident response plan
This quarter:
- Conduct a tabletop exercise (practice your response)
- Get cyber insurance (and read the policy)
- Consider immutable backup solutions
- Train staff on phishing recognition
The Human Element
Technical controls matter. But ransomware often succeeds because of human factors:
- Someone clicks a phishing link
- An admin account has a weak password
- A vendor's credentials are compromised
- Someone disables security tools because they're "annoying"
Technical controls can only do so much. You need:
- Security-aware culture
- Easy ways to do the right thing
- Quick reporting of suspicious activity
- No-blame post-incident reviews
If people are afraid to report mistakes, you'll never hear about problems until it's too late.
The Bottom Line
Your compliance certificates look nice on the wall. They might help with regulators and customers. But they won't stop ransomware.
What stops ransomware:
- MFA on every account
- Working, tested, immutable backups
- Early detection and response
- Network segmentation
- Least privilege access
- Security-aware culture
If you only remember one thing from this article: Test your backups. A backup you can't restore is just false hope.
And if you want to learn more about building a proper incident response capability, check out our guide to incident response planning. Because when ransomware hits, you'll be glad you prepared.
Mathew Clark
Founder, SecureInSeconds
Currently: Running backup restore tests and timing them (4 hours 23 minutes for critical systems—not bad)
Further Reading:
- ACSC ransomware guidance
- CISA Stop Ransomware
- Our guide to incident response planning — prepare before you need it
