Ransom: To Pay or Not To Pay

Welcome to this month’s tech news. Here you will find:
- Ransom: To pay or not to pay?
- Microsoft: What’s new?
- Tech Facts: did you know?
- Q & A: what everyone’s asking
- Quiz Time: test your team!
Enjoy the read, and remember to give us a call if you have any IT concerns – we’re here to help!

Ransom: To Pay or Not To Pay?
Imagine arriving at work to find everything frozen — your files, systems, and email all locked by ransomware.
Then comes the message: Pay now, or lose everything. It’s stressful, and the pressure to just pay and move on is real.
But here’s the truth: paying the ransom rarely solves the problem, and it often makes things worse.
Why paying is risky:
- No guarantees: Even if you pay, there’s no promise you’ll get your data back — or that it won’t be corrupted.
- Your data may already be copied: Modern ransomware doesn’t just lock files — it steals them. Attackers might still leak your data, even after you’ve paid.
- Backups may be compromised: Some attacks also target your backup systems to block recovery options.
- You’re funding future attacks: Every ransom paid helps cybercriminals refine their methods and target new victims — possibly even you again.
The real cost goes beyond the ransom.
Research shows that the total cost of a ransomware incident is often 10 times higher than the ransom itself. This includes:
- Downtime and lost productivity
- Rebuilding systems
- Legal and compliance fallout
- Damaged client trust and reputation
You’re not just paying for data — you’re paying for chaos control.
What to do instead: Focus on recovery, not ransom
You can’t always stop ransomware from getting in, but you can make sure it doesn’t stop your business. Here’s how:
✅ Invest in secure, off-site backups
Keep at least one backup offline or in a cloud service with built-in ransomware protection. Test your backups often to ensure they actually work.
✅ Create and rehearse a response plan
Make sure your team knows what to do when something goes wrong. A good plan reduces panic and helps limit damage.
✅ Train your staff regularly
Most ransomware attacks start with someone clicking a dodgy link or downloading a fake attachment. Good cyber habits go a long way.
✅ Patch and protect your systems
Outdated software is an open door for attackers. Make updates and security monitoring a regular habit — not a once-off.
Ransomware is brutal. But if you’re prepared, you can bounce back quickly — without paying criminals to do it again.
We can help create a recovery plan that gives you peace of mind ‣

What’s new to Microsoft?
Keep your Windows 11 Start menu tidy
Windows 11 just made it easier to tidy up your Start menu. Now, when you right click a pinned app, you can move it left or right without dragging it around. It’s handy if you’re fussy about your layout. You can also create folders or move apps between them right from the menu. It’s a small update, but it makes organising your apps quicker and less f iddly. If you like your Start menu neat, this update’s for you.

Did you know?

Tech Facts:
- In 2014, hackers used a fridge to send spam emails. Yes, a fridge. It was part of a botnet made up of smart devices like TVs and thermostats that were online but poorly protected. Even toothbrushes aren’t safe these days. It just shows that as more gadgets get “smart,” they also need to get secure.
- The computers that sent astronauts to the moon had just 64KB of memory. That’s less than a basic calculator today. Now, every time you Google something, it uses more computing power than NASA had for the entire Apollo mission. We’ve gone from rocket science to rocket-speed search results in just one click.
- Scientists have found a wild new way to store data: DNA. Yep, the same stuff that makes you. You could one day hold all the world’s digital info. Just one gram of DNA can store 215 million gigabytes. In theory, we could fit the entire internet in a shoebox… made of science.

Q & A
Q: Do we need cyber insurance?
A: It’s a good safety net, especially if you handle sensitive data. But please remember that it’s not a replacement for good security practices.
Q: Is storing files in the cloud safe?
A: Yes, if it’s a trusted provider and you use strong security settings like multi-factor authentication. If you want advice on the best cloud solution for your business, get in touch.
Q: How often should we review our IT security?
A: Regular reviews are essential – that’s at least once a year. But do it sooner if your business changes or if new threats appear.


Time for a Tech Quiz!
- Which popular video-sharing platform was originally created as a dating site?
- Which company created the Android operating system?
- What is the name of a type of malware that locks your files and demands money to unlock them?
- What was the most used emoji in 2024?
- What does “incognito mode” do in a browser?
See answers below
Until next time,
The GZD team
Quiz answers:
1. YouTube. 2. Google (after acquiring it in 2005).
3. Ransomware. 4. 😭 or Loudly Crying Face.
5. Stops your browsing history from being saved on your device.