{"id":57862,"date":"2025-08-25T16:48:00","date_gmt":"2025-08-25T16:48:00","guid":{"rendered":"https:\/\/www.dinsmore.com\/?post_type=publications&#038;p=57862"},"modified":"2025-12-31T15:10:43","modified_gmt":"2025-12-31T15:10:43","slug":"making-your-business-cyber-secure","status":"publish","type":"publications","link":"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/","title":{"rendered":"Making Your Business Cyber Secure"},"content":{"rendered":"\n<p>One key lesson from the ongoing ransomware epidemic is clear: threat actors don\u2019t discriminate. It doesn\u2019t matter who you are or what your business does \u2014 if they see an opening, they\u2019ll exploit it, ready or not. Despite increased attention from federal law enforcement and cybersecurity agencies, ransomware remains a lucrative and active threat. These criminals have adopted increasingly aggressive methods to extract payment, and advancements in artificial intelligence are only making their job easier.<\/p>\n\n\n\n<p>In the early days, ransomware attacks were relatively unsophisticated. Today, they are highly coordinated. Threat actors often infiltrate systems weeks in advance, conducting reconnaissance to identify valuable data and vulnerabilities. Before launching an attack, they exfiltrate sensitive files to use as leverage \u2014 threatening to leak the data unless a ransom is paid. Finally, they encrypt critical data file-by-file, effectively shutting down business operations.<\/p>\n\n\n\n<p><strong>New threats from insider-enabled and AI attacks<\/strong><\/p>\n\n\n\n<p>Alarmingly, there have also been documented cases of insider-enabled ransomware attacks. In some instances, remote IT workers \u2014 hired under false pretenses \u2014 turned out to be threat actors who enabled malware deployment. This tactic has become so widespread that the FBI recently issued a warning about North Korean actors posing as IT job applicants. The rise of open-source AI tools has further lowered the barrier for these criminals. AI accelerates their ability to craft convincing phishing emails and evade detection \u2014 tasks that previously required technical skill and time can now be simply automated. In this complex threat environment, there is no silver bullet. Companies must invest in both proactive and reactive strategies. At Dinsmore, we offer clients strategic legal guidance and cybersecurity insight to help prevent incidents \u2014 and support them through any breach to minimize damage and ensure a complete recovery. It\u2019s a comprehensive, full-service approach to cybersecurity and data protection.<\/p>\n\n\n\n<p><strong>Fundamentals to improving security posture<\/strong><\/p>\n\n\n\n<p>Even with evolving threats, there are fundamental practices all businesses can implement to strengthen their security posture:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Develop a tailored plan.<\/strong> Effective organizations conduct thorough cyber risk assessments and create plans aligned with their risk appetite and operational goals. Just as important, they regularly test and update those plans.<\/li>\n\n\n\n<li><strong>Master the basics<\/strong>. Most ransomware breaches don\u2019t come from sophisticated exploits\u2014they stem from phishing emails or unpatched vulnerabilities. Solid fundamentals go a long way.<\/li>\n\n\n\n<li><strong>Foster a cyber-aware culture<\/strong>. Leading companies embed cybersecurity into their operations\u2014from vendor contracts to mergers\u2014 treating it as a core component of decision making.<\/li>\n\n\n\n<li><strong>Insurance risk assessment. <\/strong>Regularly review and update insurance policies and ensure your trusted partners are included as part of the review. During a crisis, being directed to a stranger to handle critical decisions can quickly turn into a nightmare.<\/li>\n<\/ul>\n\n\n\n<p>At Dinsmore, we know your business needs more than a hotline when a crisis hits. You need a trusted partner\u2014one who supports you at every stage of your cybersecurity journey.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One key lesson from the ongoing ransomware epidemic is clear: threat actors don\u2019t discriminate. It doesn\u2019t matter who you are or what your business does \u2014 if they see an opening, they\u2019ll exploit it, ready or not. Despite increased attention from federal law enforcement and cybersecurity agencies, ransomware remains a lucrative and active threat. These\u2026<\/p>\n","protected":false},"author":8,"featured_media":0,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"tags":[],"publication-type":[8],"class_list":["post-57862","publications","type-publications","status-publish","format-standard","hentry","publication-type-articles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Making Your Business Cyber Secure - Dinsmore &amp; Shohl<\/title>\n<meta name=\"description\" content=\"Making Your Business Cyber Secure Read insights and legal analysis from attorneys at Dinsmore &amp; Shohl LLP.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making Your Business Cyber Secure\" \/>\n<meta property=\"og:description\" content=\"Making Your Business Cyber Secure Read insights and legal analysis from attorneys at Dinsmore &amp; Shohl LLP.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Dinsmore &amp; Shohl\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-31T15:10:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2026\/02\/social-media-share.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/\",\"url\":\"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/\",\"name\":\"Making Your Business Cyber Secure - Dinsmore &amp; Shohl\",\"isPartOf\":{\"@id\":\"https:\/\/www.dinsmore.com\/#website\"},\"datePublished\":\"2025-08-25T16:48:00+00:00\",\"dateModified\":\"2025-12-31T15:10:43+00:00\",\"description\":\"Making Your Business Cyber Secure Read insights and legal analysis from attorneys at Dinsmore & Shohl LLP.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dinsmore.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Making Your Business Cyber Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dinsmore.com\/#website\",\"url\":\"https:\/\/www.dinsmore.com\/\",\"name\":\"Dinsmore & Shohl\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.dinsmore.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dinsmore.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dinsmore.com\/#organization\",\"name\":\"Dinsmore & Shohl\",\"url\":\"https:\/\/www.dinsmore.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dinsmore.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Dinsmore-Final-Logo-Navy.svg\",\"contentUrl\":\"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Dinsmore-Final-Logo-Navy.svg\",\"width\":413,\"height\":54,\"caption\":\"Dinsmore & Shohl\"},\"image\":{\"@id\":\"https:\/\/www.dinsmore.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Making Your Business Cyber Secure - Dinsmore &amp; Shohl","description":"Making Your Business Cyber Secure Read insights and legal analysis from attorneys at Dinsmore & Shohl LLP.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/","og_locale":"en_US","og_type":"article","og_title":"Making Your Business Cyber Secure","og_description":"Making Your Business Cyber Secure Read insights and legal analysis from attorneys at Dinsmore & Shohl LLP.","og_url":"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/","og_site_name":"Dinsmore &amp; Shohl","article_modified_time":"2025-12-31T15:10:43+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2026\/02\/social-media-share.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/","url":"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/","name":"Making Your Business Cyber Secure - Dinsmore &amp; Shohl","isPartOf":{"@id":"https:\/\/www.dinsmore.com\/#website"},"datePublished":"2025-08-25T16:48:00+00:00","dateModified":"2025-12-31T15:10:43+00:00","description":"Making Your Business Cyber Secure Read insights and legal analysis from attorneys at Dinsmore & Shohl LLP.","breadcrumb":{"@id":"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dinsmore.com\/publications\/making-your-business-cyber-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dinsmore.com\/"},{"@type":"ListItem","position":2,"name":"Making Your Business Cyber Secure"}]},{"@type":"WebSite","@id":"https:\/\/www.dinsmore.com\/#website","url":"https:\/\/www.dinsmore.com\/","name":"Dinsmore & Shohl","description":"","publisher":{"@id":"https:\/\/www.dinsmore.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dinsmore.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dinsmore.com\/#organization","name":"Dinsmore & Shohl","url":"https:\/\/www.dinsmore.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dinsmore.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Dinsmore-Final-Logo-Navy.svg","contentUrl":"https:\/\/www.dinsmore.com\/wp-content\/uploads\/2025\/12\/Dinsmore-Final-Logo-Navy.svg","width":413,"height":54,"caption":"Dinsmore & Shohl"},"image":{"@id":"https:\/\/www.dinsmore.com\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publications\/57862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publications"}],"about":[{"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/types\/publications"}],"author":[{"embeddable":true,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/users\/8"}],"version-history":[{"count":4,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publications\/57862\/revisions"}],"predecessor-version":[{"id":65960,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publications\/57862\/revisions\/65960"}],"wp:attachment":[{"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/media?parent=57862"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/tags?post=57862"},{"taxonomy":"publication-type","embeddable":true,"href":"https:\/\/www.dinsmore.com\/wp-json\/wp\/v2\/publication-type?post=57862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}