{"id":76151,"date":"2025-11-13T16:27:26","date_gmt":"2025-11-13T16:27:26","guid":{"rendered":"https:\/\/www.cxtoday.com\/?p=76151"},"modified":"2025-11-17T11:16:38","modified_gmt":"2025-11-17T11:16:38","slug":"how-enterprises-can-fight-ransomware-and-defend-customer-data","status":"publish","type":"post","link":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/","title":{"rendered":"How Enterprises Can Fight Ransomware and Defend Customer Data"},"content":{"rendered":"<p>Ransomware attacks were considered an IT problem in the past, but they\u2019re increasingly a direct threat to customer trust. As enterprises face rising breaches that lock their systems and expose sensitive information, every moment of downtime or data loss affects the customer experience. Protecting customers\u2019 data has become as essential to brand reputation as product quality.<\/p>\n<p>That explains why 58 percent of organizations that suffered ransomware attacks in the past year <a href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/sjftg6wvk8v7ms294gbvnvh9\/sophos-state-of-ransomware-retail-2025.pdf\">paid the ransom<\/a> to get their data back, according to Sophos\u2019 State of Ransomware in Retail report. That was the second highest payment rate in five years. The median ransom demand doubled to $2 million from 2024, while the average payment increased by 5 percent to $1 million.<\/p>\n<p>Retailers especially have had a tough year, as several large brands have suffered high-profile cybersecurity attacks. The threats are growing as attackers are constantly looking to exploit vulnerabilities. As demands for ransom payments reach new highs, enterprises in all sectors need to put in place comprehensive security strategies. Sophos\u2019 research showed 46 percent of attacks began with an unknown security gap.<\/p>\n<p>The nature of ransomware threats is changing, as malicious actors hone in on phishing attacks as a way to gain entry into enterprise systems rather than attacking servers.<\/p>\n<p>\u201cWe&#8217;re very focused on server security and network security. But in reality, what&#8217;s happening is that\u2026 over the last two years, 70 percent of ransomware attacks originated with an individual, rather than the server,\u201d online privacy expert <strong>Ron Zayas, Founder CEO of Ironwall by Incogni<\/strong>, told <em>CX Today<\/em> in an interview. \u201cThat&#8217;s coming from using data to create better phishing attacks that are so good that you&#8217;re clicking on them\u201d<\/p>\n<p>These attacks have a direct impact on a company\u2019s reputation and sales. Major casinos and large retailers have seen their performance plunge in the aftermath of breaches, Zayas noted.<\/p>\n<blockquote><p>\u201cThis isn&#8217;t theoretical. You&#8217;re losing a lot of money when customers perceive that A, you&#8217;re asking for too much information. And B, when something happens to you because you&#8217;re careless, they&#8217;re going to go somewhere else because they understand the threat to them.\u201d<\/p><\/blockquote>\n<p>The challenge is escalating as hackers are using AI to create and automate more convincing phishing attacks, <strong>Chester Wisniewski, Director, Global Field CISO <\/strong>at security firm<strong> Sophos<\/strong>,\u00a0told <em>CX Today<\/em>.<\/p>\n<p>\u201cThe two most concerning aspects of AI are the higher quality of phishing attacks and the speed with which attacks can be conducted. AI doesn&#8217;t necessarily create new threats as much as it allows the existing techniques to be automated and executed more quickly,\u201d Wisniewski said.<\/p>\n<p>\u201cOne of the most important factors in defending networks isn&#8217;t just prevention, but also how quickly you can detect and breach and respond, ideally, before any data is stolen or encrypted.\u201d<\/p>\n<p>\u201cIf AI makes each malicious step easier, defenders will need to monitor 24\/7 for breaches and be prepared to react in minutes, not hours, to prevent harm to unprotected data,\u201d Wisniewski said.<\/p>\n<h2>Prevention Starts with Preparation<\/h2>\n<p>The key to avoiding ransomware attacks is preparedness. \u201cProperly protecting your information and backups insulates you from all types of data theft and ransom attacks,\u201d Wisniewski said.<\/p>\n<p>But this is where many companies are falling down. According to Sophos, 62 percent of retailers that experienced attacks restored their data using backups. That was the lowest rate in four years, indicating that some companies are not generating regular backups that they can restore data from if the worst happens.<\/p>\n<p>\u201cThe figures for retail in this year&#8217;s survey are very concerning,\u201d Wisniewski said. \u201cThe lack of backups makes organisations even more reliant on paying criminals and hoping for the best to regain access to business-critical information.\u201d<\/p>\n<p>Identifying where security weaknesses are and performing reliable backups indicates an organization is taking a proactive approach to data security. \u201cAs we all know, an ounce of prevention is worth a pound of cure and this lack of preparedness results in higher incident costs and more loss of sensitive information harming an organizations\u2019 reputation,\u201d Wisniewski said.<\/p>\n<p>As ransomware attacks evolve to target individuals, enterprises need to understand how employee data can be leveraged to launch highly targeted attacks.<\/p>\n<p>\u201cThat&#8217;s where it&#8217;s changed, and companies don&#8217;t fully understand even that the vector has changed, or how to protect themselves,\u201d Zayas said.<\/p>\n<blockquote><p>\u201cIt&#8217;s the data on your employees that&#8217;s killing you, so the way to protect yourself is to remove the amount of data that is available on your employees.\u201d<\/p><\/blockquote>\n<p>Enterprises are starting to realize that dark web monitoring tools can act as an early warning system against ransomware and data breaches. When attackers compromise a device, such as an employee\u2019s phone, they often advertise that access on the dark web for anyone willing to pay.<\/p>\n<p>In some cases, leaked credentials or access to infected devices can surface online weeks before a ransomware attack, and monitoring tools can send out alerts that give teams time to prepare.<\/p>\n<p>\u201cIt&#8217;s a great way for you to jump in front of that, because once it&#8217;s in circulation, you&#8217;re toast; it&#8217;s too late,\u201d Zayas said.<\/p>\n<p>Organizations also need to reconsider the level of detail in the data they hold on customers.<\/p>\n<p>For instance, recent <a href=\"https:\/\/www.cxtoday.com\/crm\/the-fbi-warns-salesforce-customers-of-increasing-cyber-attacks\/\">security breaches through the Salesforce platform<\/a> have succeeded because companies keep extensive customer records in the system, Zayas noted.<\/p>\n<blockquote><p>\u201cOne of the best practices for any company is to decide how much information you really need. Just because you can get more information and enrich it doesn&#8217;t mean it makes sense.\u201d<\/p><\/blockquote>\n<p>Any interaction with a third party opens up a potential vulnerability. That\u2019s why organizations need to think beyond protecting their servers.<\/p>\n<h2>Managing Vendor Risk to Prevent Data Breaches<\/h2>\n<p>\u201cEverybody wants to jump on the AI bandwagon, and AI isn&#8217;t something that a standard company can do on their own. You have to work with a third party\u2026 because of the complexities,\u201d Zayas said. \u201cThat becomes a huge attack vector for people going after ransomware.\u201d<\/p>\n<p>Several high-profile security breaches this year, such as <a href=\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/\">Stellantis, Jaguar Land Rover<\/a>, <a href=\"https:\/\/www.cxtoday.com\/crm\/harrods-customers-targeted-after-cyber-attack-on-third-party-vendor\/\">Harrods<\/a> and <a href=\"https:\/\/www.cxtoday.com\/crm\/discord-joins-list-of-companies-hit-by-crm-breaches-after-attack-on-its-zendesk-implementation\/\">Discord<\/a>, have involved attacks on their third-party customer data platforms, not the company\u2019s own servers.<\/p>\n<p>Zayas warned:<\/p>\n<blockquote><p>\u201cIf you are a private company and you are sharing information, if you are putting your information to a third party, it&#8217;s like the old saying, whoever you sleep with, you&#8217;re sleeping with everybody that they ever slept with.\u201d<\/p><\/blockquote>\n<p>\u201cWhen you partner with somebody and you&#8217;re transferring data, you have to be much more aware of how you&#8217;re identifying that data, because now you&#8217;re vulnerable to whatever attack happens to them.\u201d<\/p>\n<p>As enterprises adopt AI tools to streamline data management and enhance decision-making, they often overlook the critical risk created by the fact that AI systems rely on large volumes of data. They are opening up their data and feeding extensive amounts of sensitive information into AI platforms. While these systems are managed by major providers, no organization is immune to breaches, potentially exposing customer data, Zayas said.<\/p>\n<blockquote><p>\u201cLet&#8217;s go back in time a little bit to when there was a lot of cash\u2026 People didn&#8217;t come to rob your pizza place. They robbed the bank, because that&#8217;s where everybody was putting their money.\u201d<\/p><\/blockquote>\n<p>Users need to understand that \u201cdata is the currency\u201d that is now circulated, and this makes large AI providers and marketers more attractive to attackers than targeting a number of smaller companies, Zayas said. \u201cYou&#8217;re going to see the breaches being more and more related to the amount of information that&#8217;s coming out with AI, the amount of information that&#8217;s being enriched, and companies are going to suffer from this.\u201d<\/p>\n<p>Although enterprise teams want to collect as much information as possible to get richer AI outputs, \u201cyou need to be a lot smarter about what information you share to be able to get what you need,\u201d Zayas said.<\/p>\n<p>Removing personal information so that individuals are not identifiable will help to protect customers.<\/p>\n<blockquote><p>\u201cThe smart play is learn how to sanitize your data. You don&#8217;t have to share 100 pieces of information on one of your customers with an outside company. It&#8217;s stupid. Why are you sharing all that customer information when it becomes available?\u201d<\/p><\/blockquote>\n<p>\u201cIt&#8217;ll still give you the same result you have without the customer information being there.\u201d Zayas added.<\/p>\n<p>When signing contracts with third-party providers, buyers should look for vendors based on their data sensitivity and make sure that they include clear privacy clauses and audit rights.<\/p>\n<p>\u201cThird-party risk management is the frontline defence for customer data,\u201d <strong>Aben Pagar, Director<\/strong> at legal services firm<strong> Konexo<\/strong>, told CX Today. \u201cDue diligence cannot stop at onboarding\u2014continuous monitoring and assurance are vital. Embedding these controls creates a culture of accountability that protects data and strengthens trust.\u201d<\/p>\n<p>In the UK public sector, a proposed ban on organizations making ransom payments will require them to ensure their systems are resilient.<\/p>\n<p>\u201cThe ban on ransom payments changes the calculus for procurement,\u201d Pagar said. \u201cVetting suppliers for robust security and privacy practices is now non-negotiable.\u201d<\/p>\n<h2>Keeping Customers Informed When Ransomware Strikes<\/h2>\n<p>When enterprises do fall victim to ransomware attacks, communicating with customers as much as possible is essential to provide reassurance that leaders are actively working to recover and safeguard their data.<\/p>\n<p>\u201cCustomer communications are key during incidents to inspire confidence that you have capable experts handling the situation. Silence is very dangerous, as people&#8217;s imaginations are far worse than what your incident actually looks like,\u201d Wisniewski said.<\/p>\n<p>Although there are certain details that companies may not be able to provide because of legal constraints and law enforcement requests, \u201cbeing open and sharing what you can goes a long way toward demonstrating your commitment to your customers and their privacy and security,\u201d Wisniewski said.<\/p>\n<h2>Ransomware Recovery is a Team Sport<\/h2>\n<p>Given the proliferation of attacks, companies need to be prepared to bounce back quickly if a ransomware hit does happen. Testing backups regularly and knowing exactly how to restore systems if things go down are key. Staying on top of vulnerabilities, tightening access controls, and keeping a close eye on who has high-level permissions can make all the difference.<\/p>\n<p>\u201cRegular staff training reduces human error, and a robust incident response plan ensures clarity when seconds count,\u201d <strong>Richard Chudzynski, Partner at Konexo<\/strong>, told <em>CX Today<\/em>.<\/p>\n<p>Response plans must involve all teams. Ransomware and other cyberattacks are no longer just IT problems. Relying solely on IT managers to respond puts enterprises at greater risk because attacks now touch every aspect of the business.<\/p>\n<p>\u201cResilience is a team sport,\u201d Chudzynski said.<\/p>\n<blockquote><p>\u201cHR safeguards employee data, procurement manages supplier risk, and business units handle customer information, while IT and cyber teams enforce technical controls. Legal and privacy teams set the regulatory framework, and internal audit validates compliance.\u201d<\/p><\/blockquote>\n<p>When each team owns its role, organizations can communicate transparently during a crisis, helping to minimize disruption to the customer experience and reinforce trust, Chudzynski added.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks were considered an IT problem in the past, but they\u2019re increasingly a direct threat to customer trust. As enterprises face rising breaches that lock their systems and expose sensitive information, every moment of downtime or data loss affects the customer experience. Protecting customers\u2019 data has become as essential to brand reputation as product [&hellip;]<\/p>\n","protected":false},"author":11074,"featured_media":76167,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[62065],"class_list":["post-76151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-privacy-compliance","tag-artificial-intelligence","tag-security-and-compliance","brands_to_track-cx-today","brands_to_track-salesforce","editorial_type-feature","intent-loyalty","target_audience-dual"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware: A Direct Threat to Customer Trust - CX Today<\/title>\n<meta name=\"description\" content=\"Ransomware attacks are rising. How can enterprises protect customer data, strengthen defenses, and maintain trust during cyber incidents?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Enterprises Can Fight Ransomware and Defend Customer Data\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks are rising. How can enterprises protect customer data, strengthen defenses, and maintain trust during cyber incidents?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/\" \/>\n<meta property=\"og:site_name\" content=\"CX Today\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CXTodayNews\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T16:27:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T11:16:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nicole Willing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cxtodaynews\" \/>\n<meta name=\"twitter:site\" content=\"@cxtodaynews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicole Willing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/\"},\"author\":{\"name\":\"Nicole Willing\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc\"},\"headline\":\"How Enterprises Can Fight Ransomware and Defend Customer Data\",\"datePublished\":\"2025-11-13T16:27:26+00:00\",\"dateModified\":\"2025-11-17T11:16:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/\"},\"wordCount\":1842,\"publisher\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Security and Compliance\"],\"articleSection\":[\"Security, Privacy &amp; Compliance\"],\"inLanguage\":\"en-GB\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/\",\"url\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/\",\"name\":\"Ransomware: A Direct Threat to Customer Trust - CX Today\",\"isPartOf\":{\"@id\":\"https:\/\/www.cxtoday.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg\",\"datePublished\":\"2025-11-13T16:27:26+00:00\",\"dateModified\":\"2025-11-17T11:16:38+00:00\",\"description\":\"Ransomware attacks are rising. How can enterprises protect customer data, strengthen defenses, and maintain trust during cyber incidents?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#primaryimage\",\"url\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg\",\"contentUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg\",\"width\":850,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cxtoday.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security, Privacy &amp; Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cxtoday.com\/#website\",\"url\":\"https:\/\/www.cxtoday.com\/\",\"name\":\"CX Today\",\"description\":\"Customer Experience Technology News\",\"publisher\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cxtoday.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cxtoday.com\/#organization\",\"name\":\"CX Today\",\"url\":\"https:\/\/www.cxtoday.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png\",\"contentUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png\",\"width\":2606,\"height\":1154,\"caption\":\"CX Today\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CXTodayNews\/\",\"https:\/\/x.com\/cxtodaynews\",\"https:\/\/www.linkedin.com\/company\/69192959\/\",\"https:\/\/www.youtube.com\/channel\/UCZSpkvnZtjGc7UAP1r-MRoA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc\",\"name\":\"Nicole Willing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g\",\"caption\":\"Nicole Willing\"},\"description\":\"Nicole Willing is B2B journalist with expertise spanning the technology and financial industries. For more than 20 years, she has reported extensively on the key issues affecting business operations and supply chains, and she has developed a keen interest in how emerging technologies like AI are reshaping the way enterprises work. She has a passion for translating complex innovations into engaging stories that inform business decision-makers and inspire new ideas.\",\"url\":\"https:\/\/www.cxtoday.com\/author\/nicole-willingcxtoday-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware: A Direct Threat to Customer Trust - CX Today","description":"Ransomware attacks are rising. How can enterprises protect customer data, strengthen defenses, and maintain trust during cyber incidents?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/","og_locale":"en_GB","og_type":"article","og_title":"How Enterprises Can Fight Ransomware and Defend Customer Data","og_description":"Ransomware attacks are rising. How can enterprises protect customer data, strengthen defenses, and maintain trust during cyber incidents?","og_url":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/","og_site_name":"CX Today","article_publisher":"https:\/\/www.facebook.com\/CXTodayNews\/","article_published_time":"2025-11-13T16:27:26+00:00","article_modified_time":"2025-11-17T11:16:38+00:00","og_image":[{"width":850,"height":425,"url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg","type":"image\/jpeg"}],"author":"Nicole Willing","twitter_card":"summary_large_image","twitter_creator":"@cxtodaynews","twitter_site":"@cxtodaynews","twitter_misc":{"Written by":"Nicole Willing","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#article","isPartOf":{"@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/"},"author":{"name":"Nicole Willing","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc"},"headline":"How Enterprises Can Fight Ransomware and Defend Customer Data","datePublished":"2025-11-13T16:27:26+00:00","dateModified":"2025-11-17T11:16:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/"},"wordCount":1842,"publisher":{"@id":"https:\/\/www.cxtoday.com\/#organization"},"image":{"@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg","keywords":["Artificial Intelligence","Security and Compliance"],"articleSection":["Security, Privacy &amp; Compliance"],"inLanguage":"en-GB","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.cxtoday.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/","url":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/","name":"Ransomware: A Direct Threat to Customer Trust - CX Today","isPartOf":{"@id":"https:\/\/www.cxtoday.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#primaryimage"},"image":{"@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg","datePublished":"2025-11-13T16:27:26+00:00","dateModified":"2025-11-17T11:16:38+00:00","description":"Ransomware attacks are rising. How can enterprises protect customer data, strengthen defenses, and maintain trust during cyber incidents?","breadcrumb":{"@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#primaryimage","url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg","contentUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/11\/20251113-Ransomware.jpg","width":850,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.cxtoday.com\/security-privacy-compliance\/how-enterprises-can-fight-ransomware-and-defend-customer-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cxtoday.com\/"},{"@type":"ListItem","position":2,"name":"Security, Privacy &amp; Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.cxtoday.com\/#website","url":"https:\/\/www.cxtoday.com\/","name":"CX Today","description":"Customer Experience Technology News","publisher":{"@id":"https:\/\/www.cxtoday.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cxtoday.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cxtoday.com\/#organization","name":"CX Today","url":"https:\/\/www.cxtoday.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png","contentUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png","width":2606,"height":1154,"caption":"CX Today"},"image":{"@id":"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CXTodayNews\/","https:\/\/x.com\/cxtodaynews","https:\/\/www.linkedin.com\/company\/69192959\/","https:\/\/www.youtube.com\/channel\/UCZSpkvnZtjGc7UAP1r-MRoA"]},{"@type":"Person","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc","name":"Nicole Willing","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g","caption":"Nicole Willing"},"description":"Nicole Willing is B2B journalist with expertise spanning the technology and financial industries. For more than 20 years, she has reported extensively on the key issues affecting business operations and supply chains, and she has developed a keen interest in how emerging technologies like AI are reshaping the way enterprises work. She has a passion for translating complex innovations into engaging stories that inform business decision-makers and inspire new ideas.","url":"https:\/\/www.cxtoday.com\/author\/nicole-willingcxtoday-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/76151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/users\/11074"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/comments?post=76151"}],"version-history":[{"count":4,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/76151\/revisions"}],"predecessor-version":[{"id":76216,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/76151\/revisions\/76216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/media\/76167"}],"wp:attachment":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/media?parent=76151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/categories?post=76151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}