Menu

Ransomware Exposes Needs About Data

Incidents that have been made public about ransomware have garnered a great deal of attention – from the general public, company executives, and from those charged with protecting and recovering from attacks.  Products used in Information Technology have been improved or newly developed to address some different aspects regarding ransomware.  And, as would be expected, vendor marketing has highlighted characteristics for their products that would seem to be relevant.

Based on our experience at the Evaluator Group with our clients and other affected companies, one thing that has become very apparent with ransomware is that IT needs to understand the data they are responsible for protecting and making available for legitimate use.  Understanding of the data is more complicated than many would think.  Some of this understanding is a need to know:

  • What is the profile for the data (usage, owner, priorities)? This seems simple but it involves knowing where data is stored, what are the different pieces (related elements) that are considered to be a set, and whether there are successive generations of data as part of its usage.
  • Which applications use the data? This may be more than one application in some more complicated operational environments.
  • What is the value of the data? Not all data has the same value.  This can make a big difference in the sequence of the recovery of ransomware or even a disaster.  The valuable or crucial data gets recovered first – setting the Recovery Time Objective by the value of the data.
  • What attributes of the data determine the decisions about recovery? This could be related to how much does it change over time which would affect the recovery point and the sequence for recovery.  Other attributes might be in regard to some dependencies for use affecting the recovery and other specific cases.  There may be a number of factors to understand regarding use and availability of data.

Key individuals in IT who understand the data must be included in a ransomware response plan.  This understanding is typically learned from experience with applications and normal processes of storing, protecting, and making the data available.  These individuals:

  • Are highly valuable to organizations,
  • Really are information asset managers,
  • Must be included in any strategy for ransomware recovery,
  • Need tools to be more effective and to enable others to gain similar knowledge and proficiency.

Lessons learned from working through precipitous events are hard-earned.  Needing to understand the data is one of those lessons required for  recovering from ransomware in a timely manner.

Author Information

Randy Kerns

Randy has written numerous industry articles and papers as an educator and presenter, and he is the author of two books: Planning a Storage Strategy and Information Archiving – Economics and Compliance. The latter is the first book of its kind to explore information archiving in depth. Randy regularly teaches classes on Information Management technologies in the U.S. and Europe.

Related Insights
OpenAI Acquires Promptfoo, Gaining 25% Foothold in Fortune 500 Enterprises
March 11, 2026

OpenAI Acquires Promptfoo, Gaining 25% Foothold in Fortune 500 Enterprises

Mitch Ashley, VP Practice Lead at Futurum, examines OpenAI's acquisition of Promptfoo and what it signals about the security and governance requirements blocking AI agents from enterprise production....
Can Microsoft's Frontier Suite Deliver AI Excellence at Scale
March 10, 2026

Can Microsoft’s Frontier Suite Deliver AI Excellence at Scale?

Futurum analysts Keith Kirkpatrick and Fernando Montenegro share their insights on Microsoft’s Frontier Suite, and discuss the implications for both enterprise buyers and the company’s competitors....
Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning
March 6, 2026

Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning

Dion Hinchcliffe is Vice President & Practice Lead, CIO & Technology Buyers reviews Okta’s Q4 FY 2026 earnings, focusing on agentic identity positioning, evolving pricing models, and how large-customer platform...
Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience
March 6, 2026

Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience

Fernando Montenegro, VP and Practice Lead, Cybersecurity at Futurum, examines how Commvault’s bi-directional integration with CrowdStrike Falcon Next-Gen SIEM enables shared backup-integrity telemetry to fasten recovery after cyberattacks....
CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus
March 6, 2026

CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus

Fernando Montenegro, VP Cybersecurity at Futurum, highlights CrowdStrike’s Q4 FY26 earnings: Falcon expands into AI security, identity, and browser runtime, underscoring consolidation-driven cybersecurity strategies....
S3NS & Sovereignty Can Thales-Google Venture Make AI Sovereignty Work at Scale
March 5, 2026

S3NS & Sovereignty: Can Thales-Google Venture Make AI Sovereignty Work at Scale?

Nick Patience, VP & Practice Lead for AI Platforms at Futurum Research, assesses S3NS’s progress following its SecNumCloud qualification, evaluates the sovereign AI roadmap, and examines what the Thales-Google Cloud...

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.