Thank you for sharing!

Your article was successfully shared with the contacts you provided.
Ransomware Yanawut Suntornkij / Shutterstock.com

You are chief counsel of XYZ Corporation. It’s early Monday morning, and as you pour your coffee, you reach for your phone to check email and notice that your inbox hasn’t updated since the prior evening. In normal COVID-business fashion, you attempt to login to your computer using VPN, but you are still unable to connect. You text a colleague and discover they’re experiencing similar issues. You try to locate your Chief Information Officer’s phone number in your contacts list, but your contacts are not populating appropriately. Later that morning, you receive a frantic call from the CIO, who explains that the company’s IT infrastructure is locked down with ransomware and that a threat actor (TA) left a note demanding payment within three days or company data would be published on the internet, accessible to all.

Want to continue reading?
Become a Free ALM Digital Reader.

Benefits of a Digital Membership:

  • Free access to 1 article* every 30 days
  • Access to the entire ALM network of websites
  • Unlimited access to the ALM suite of newsletters
  • Build custom alerts on any search topic of your choosing
  • Search by a wide range of topics

*May exclude premium content
Already have an account?

Law Firms Mentioned


ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2021 ALM Media Properties, LLC. All Rights Reserved.