Ransomware & Resilience: A Strategic Briefing for the Board

Ransomware is no longer just an IT issue—it directly threatens the systems, services, and board-level processes critical to running your business. Whether it’s finance, logistics, operations, customer service, or manufacturing, an attack on a core business system can halt productivity, drive significant financial loss, and irreparably damage reputation.

This briefing outlines why ransomware should be a board-level concern, shares current threat data, and presents a roadmap to safeguard your critical business functions.

1. Ransomware: A Direct Threat to Operational Continuity

· Ransomware accounts for ~28% of malware incident response cases:

o   According to IBM’s X‑Force Threat Intelligence Index 2025, ransomware comprises nearly one‑third (28%) of malware incident response cases and 11% of overall security cases IBM.

· 47% year‑on‑year increase in reported ransomware incidents in H1 2025, with average ransom demands over $1.6 M

o 3,627 ransomware attacks were recorded globally in the first half of 2025—an increase of 47% compared to 2,472 in H1 2024 comparitech.com.

o   The average ransom demand in confirmed incidents exceeded $1.6 million, with additional recovery costs often much higher comparitech.com.

Why it matters to you: Most ransomware incidents today target systems that underpin operations—not just data storage. Attacks are increasingly designed to cripple ERP systems, customer platforms, finance, logistics, and production environments. A disruption in these areas causes direct commercial harm and loss of control at the executive level.

2. Real-World Business Impact

  • Marks & Spencer reportedly suffered losses of ~£300 million due to a cyberattack in 2025, with operational and supply chain systems offline for days, affecting customers and investors alike.
  • Small and mid-sized companies are no longer spared—83% of ransomware victims in 2024–2025 had under 1,000 employees. But the consequences are equally severe, often threatening the company’s viability.

These attacks don’t just encrypt files—they halt payroll, stop shipments, close online stores, lock executives out of dashboards, and force boardrooms into firefighting mode.

3. What Makes a System ‘Business-Critical’?

For most organisations, critical systems include:

  • ERP & Financial platforms (e.g., SAP, Oracle, Dynamics)
  • Customer order processing, CRM, and support platforms
  • Core communications or scheduling platforms
  • Logistics, inventory and warehousing systems
  • HR, payroll and legal systems
  • Executive dashboards, BI tools, and risk registers
  • Active Directory or other critical access control systems

When any of these are taken offline—even for a few hours—the result is organisational paralysis, missed obligations, compliance breaches, and customer dissatisfaction.

4. Metrics That Matter to the Board

Metric: System Recovery Time (MTTR)

  • What to Track: How quickly can your core business systems be restored after an incident?
  • Target: < 48 hours

Metric: Incident Detection Time (MTTD)

  • What to Track: How long does it take to detect unusual activity or intrusion?
  • Target: < 24 hours

Metric: Backup Validity Testing Frequency

  • What to Track: Are backups for critical systems regularly tested and secure?
  • Target: Monthly

Metric: Immutable Backup Coverage

  • What to Track: % of systems with protected, tamper-proof backup
  • Target: >90%

Metric: Board-Reviewed Risk Register

  • What to Track: Are critical systems risk-assessed quarterly?
  • Target: Yes

Metric: Third-Party Risk Ratings

  • What to Track: Are your vendors exposing you to ransomware risk?
  • Target: All vendors rated “low” or better

5. A Resilience Framework for Business Continuity

A. Assess Your Posture

  • Use capability maturity assessments (e.g., CMMI-based frameworks) to evaluate where your critical systems are vulnerable—beyond just technology.

B. Governance & Accountability

  • Ensure board-level cyber responsibility is clearly defined.
  • Integrate cyber risk into the corporate risk register and review it quarterly.

C. Prepare for Failure

  • Run annual simulation exercises: “What happens if our finance system is encrypted for 72 hours?”
  • Ensure legal, comms, ops, and suppliers are part of the crisis response plan.

D. Invest in Recovery

  • Deploy immutable backups for all critical systems—these are backups that cannot be altered or deleted by attackers.
  • Implement “restore-in-hours” solutions for key business platforms, ideally in the cloud.

E. Embed a Risk Culture

  • Train leadership and key staff on recognising phishing, shadow IT, and insider risk.
  • Keep cyber on the board agenda—treat it as a standing item, not a technical briefing.

Final Thought: Resilience is the New ROI

Your business-critical systems don’t just support operations—they are your operations.

Ransomware should no longer be treated as a “technology issue” but as a strategic risk to continuity, performance, and trust. The board’s role is to ensure not just that defences exist, but that your organisation can withstand and recover from an attack without jeopardising what makes the business run.