hero-background-color-red-orange-gradient
image
https://assets.lumen.com/is/image/Lumen/Top50-25_August_The-mostHERO?Creativeid=
https://assets.lumen.com/is/image/Lumen/Top50-25_August_The-mostHERO?Creativeid=
https://assets.lumen.com/is/image/Lumen/Top50-25_August_The-most_card_hero?Creativeid=
A young person works on a laptop at a desk with a monitor in front of a bright window.
content
content-col-11

The most effective preparations to withstand ransom-based cyberattacks

A cybercriminal has disrupted your company’s technology systems and they communicate their demands of $2.3 million, which was the median ransom demand in 2024.1 If you don’t have strong backup plans for your data and network, you’re at the mercy of the attacker to keep your business online.

Two of the most likely ways that the cyber attacker accessed your company’s assets:

In 2024, 94% of ransomware attacks targeted companies’ backup systems, and successful attackers demanded over double the amount of money from their victims.1 With the right preparations, your business can stay online while you work through your incident response plans to handle these threats. This blog will provide you with a blueprint for preparing a resilient digital infrastructure through data backups and network redundancies.

Back it up, buttercup!

If one of your data storage locations gets compromised, having copies will allow your business to utilize the data from one of the copies. This may sound simple, but a haphazard approach can contribute to a chaotic and ineffective incident response.

Few companies have the resources to utilize the same backup practices for all data, so it’s important to prioritize your datasets. Defining which data should be considered “essential” will save you a lot of discussion throughout the process.

Essential data should always include sensitive data like personally identifiable information, health records and financial data. Additionally, any data that feeds critical tasks should be considered essential, such as:

Let’s start with your data storage needs

Once your team has aligned around the various tiers of data, you’re ready to start planning your data storage needs. You should follow the 3-2-1 rule for best practices:

Your “essential” data determination and industry compliance standards will help influence the frequency of your data backups. Often, essential data should be backed up continuously, hourly or daily.

For the remaining data sets, data backup frequency will depend on factors like cost-benefit analyses and the regularity of data collection. Is fresh data important for the features of your organization to function effectively? If a feature becomes unavailable, how damaging would it be for your organization’s operations and reputation? Putting monetary value behind these answers with processes similar to Cyber Risk Quantification analyses helps organizations establish budgets based on the ROI of downtime prevention.

Your network’s critical role in data backup and recovery

Data storage solutions are rendered useless if they aren’t effectively connected by a secure network with enough bandwidth to transport full datasets, but it’s wasteful to constantly pay for the elevated network bandwidth required for data backups.

On-demand services such as Lumen® NaaS (Network-as-a-Service) solutions allow you to flexibly back up your data by expanding your bandwidth and contracting it again once your backup is complete.

Your best options for networking solutions that can support data backups include:

One data backup solution to manage both storage and network considerations

Lumen offers a turnkey data backup solution called Data Protect that combines agile Lumen® Network Storage and network solutions with usage-based billing and on-demand service flexibility. You can dictate the hours and intervals that you’d like for your data to back up to both on-site and off-site locations, including immutable copies.

Network resilience … brilliance!

Rather than target your data storage locations, some cyber attackers may demand ransom by targeting your network to disrupt the flow of data. Employing redundant networking throughout your system allows your data to continue to flow through a different path during an attack, like taking an alternate route when you hit rush hour traffic.

To achieve effective network redundancy, you should focus on having backup options for Layers 1 through 3 of the OSI model.

Here’s a brief rundown of these layers, and you can learn more about the OSI model layers in this blog post.

Quality network providers manage the resilience of each layer, but it’s important that your company retain backup Layer 2 and 3 services within your network architecture to enable rapid response. Each key node of your digital infrastructure should be connected by at least two to three network routes, typically from Network-as-a-Service solutions.

Maintaining a secure network may also involve security layers like Lumen Defendersm, which proactively manages threats by utilizing machine learning to recognize internet-based threats from across the web and automatically blocks traffic before it breaches your internal network.

Nuvision Credit Union utilized Lumen NaaS for network redundancy, which helped eliminate outages and maintain 99.99% network availability for their members. Beyond increasing their network reliability, the benefits of scalable networking have also helped them seamlessly deploy new services for customers and add private connections for critical applications. Their Leader of Network and Information Security said, “Having a product that we can scale up at a moment’s notice is game-changing for us.”

Combating the sledgehammer approach for ransomware response

Some cyber attackers disrupt businesses through the not-so-subtle approach of sending hordes of traffic to overwhelm your network, known as Distributed Denial of Service (DDoS) attacks. Bad actors will threaten companies with DDoS attacks if they do not pay a ransom. These attacks have been rapidly rising in prevalence and magnitude due to the relative simplicity of implementation and the effectiveness of utilizing AI to scale the attacks.2

DDoS mitigation services widen your network during an attack with multi-layered automated protection, effectively distributing the traffic influx to a manageable level and enabling legitimate traffic to continue to access your systems.

Customers of Lumen® DDoS Mitigation saw 31% fewer attacks after implementation and reported benefits valued at an ROI of 297% over three years.3

Expect the best, but prepare for the worst

Effective cybersecurity requires a healthy mix of prevention and response.

Maintaining a preventative cybersecurity posture is critical to the success of your business, but in the ever-evolving world of cybersecurity, it’s equally important to arm your response capabilities to minimize the impact of breaches. Data backups, network redundancy and DDoS mitigation address key vulnerabilities exploited by ransom-based cyber attackers.

With a holistic approach to cybersecurity, your company can confidently invest in best-of-breed digital solutions to advance your business operations, customer experiences and employee productivity.

Take your first step by exploring Lumen Data Protect, a comprehensive and flexible approach to data backup services.

1Sophos, The State of Ransomware, 2024.
2Cloudflare, Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4, January 2025.
3Forrester, The Total Economic ImpactTM of Lumen DDoS Mitigation Solutions,April 2023.

Nuvision Credit Union is a current Lumen customer compensated for their endorsement.

This content is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. Lumen does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user. All third-party company and product or service names referenced in this article are for identification purposes only and do not imply endorsement or affiliation with Lumen. This document represents Lumen products and offerings as of the date of issue. Services not available everywhere. Lumen may change or cancel products and services or substitute similar products and services at its sole discretion without notice. ©2025 Lumen Technologies. All Rights Reserved.

image
https://blogassets.lumen.com/wp-content/uploads/2024/11/David-August.jpg
https://blogassets.lumen.com/wp-content/uploads/2024/11/David-August.jpg
https://blogassets.lumen.com/wp-content/uploads/2024/11/David-August.jpg
Dave Ward, chief technology and product officer headshot
content
Author

David August

David August is a Senior Solutions Marketing Manager for Lumen, where he connects the dots between technical product details and customers’ needs. David joined Lumen in 2024 and has expertise in networking, cybersecurity and business collaboration.
image
https://assets.lumen.com/is/image/Lumen/img-blog-featured-resource-card-infrastructure?Creativeid=62542e86-56ff-40b1-82d1-bec474424a9c
https://assets.lumen.com/is/image/Lumen/img-blog-featured-resource-card-infrastructure?Creativeid=62542e86-56ff-40b1-82d1-bec474424a9c
https://assets.lumen.com/is/image/Lumen/img-blog-featured-resource-card-infrastructure?Creativeid=62542e86-56ff-40b1-82d1-bec474424a9c
Person wearing a dark blazer and white shirt standing in a modern office setting, holding a closed laptop. The background features a colorful abstract overlay and illustrated office elements, including desks, chairs, a computer monitor, and a yellow robotic arm on a workbench near large windows
content
VIDEO
Lumen® Wavelengths Solutions for AI
link
Watch video
https://players.brightcove.net/1186058296001/ObIoHMsRd_default/index.html?videoId=6378434612112
_self