Research Article

The Rising Threat of Ransomware: Prevention and Response Strategies for Organizations

by  Jerome Ofori-Kyeremeh, Bright Osei Amankwatia, Leo Ofori-Kyeremeh, Francis Dartey, Ali Munhaimin, Victor Twene Dapaah
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 73
Published: January 2026
Authors: Jerome Ofori-Kyeremeh, Bright Osei Amankwatia, Leo Ofori-Kyeremeh, Francis Dartey, Ali Munhaimin, Victor Twene Dapaah
10.5120/ijca2026926224
PDF

Jerome Ofori-Kyeremeh, Bright Osei Amankwatia, Leo Ofori-Kyeremeh, Francis Dartey, Ali Munhaimin, Victor Twene Dapaah . The Rising Threat of Ransomware: Prevention and Response Strategies for Organizations. International Journal of Computer Applications. 187, 73 (January 2026), 32-38. DOI=10.5120/ijca2026926224

                        @article{ 10.5120/ijca2026926224,
                        author  = { Jerome Ofori-Kyeremeh,Bright Osei Amankwatia,Leo Ofori-Kyeremeh,Francis Dartey,Ali Munhaimin,Victor Twene Dapaah },
                        title   = { The Rising Threat of Ransomware: Prevention and Response Strategies for Organizations },
                        journal = { International Journal of Computer Applications },
                        year    = { 2026 },
                        volume  = { 187 },
                        number  = { 73 },
                        pages   = { 32-38 },
                        doi     = { 10.5120/ijca2026926224 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2026
                        %A Jerome Ofori-Kyeremeh
                        %A Bright Osei Amankwatia
                        %A Leo Ofori-Kyeremeh
                        %A Francis Dartey
                        %A Ali Munhaimin
                        %A Victor Twene Dapaah
                        %T The Rising Threat of Ransomware: Prevention and Response Strategies for Organizations%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 73
                        %P 32-38
                        %R 10.5120/ijca2026926224
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Ransomware has rapidly evolved into one of the most critical cybersecurity threats confronting organizations across industries. Characterized by malicious software that encrypts or locks access to critical data until a ransom is paid, ransomware attacks have escalated in frequency, sophistication, and financial impact. This paper investigates the rising threat of ransomware, examining contemporary attack methods, including phishing campaigns, remote desktop protocol exploitation, and supply chain vulnerabilities. The study highlights the profound consequences of successful attacks, ranging from operational downtime and data loss to reputational damage and regulatory penalties. Emphasizing proactive measures, the research explores prevention strategies that combine technological solutions, such as intrusion detection systems, regular data backups, and network segmentation, with organizational policies including employee training and access management protocols. Furthermore, the paper presents effective response strategies to mitigate the impact of attacks when prevention fails. These include establishing incident response plans, coordinating with cybersecurity experts and law enforcement, executing data recovery procedures, and understanding legal and regulatory obligations associated with ransomware incidents. By synthesizing preventive and responsive approaches, organizations can enhance their cyber resilience, minimize financial and operational losses, and maintain stakeholder trust. This study underscores the need for a holistic, multi-layered defense strategy that integrates both technological safeguards and organizational preparedness to combat the growing threat of ransomware. The findings provide actionable insights for practitioners, policymakers, and researchers seeking to strengthen organizational cybersecurity posture in an era of increasingly complex digital threats.

References
  • “Using Situational Crime Prevention (SCP)-C³ Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes.” (2024). Journal of Cybersecurity, 10(1), tyae020.
  • Adebayo, A. S., Chukwurah, N., & Oluwaseun, O. (2025). Proactive Ransomware Defense Frameworks Using Predictive Analytics and Early Detection Systems for Modern Enterprises. World Scientific News, 2025(??), 83–109.
  • Alotaibi, B., Alharthi, A., & Alqahtani, S. (2023). Challenges in ransomware detection: A survey of emerging techniques and organizational impacts. Journal of Information Security and Applications, 69, 103237. https://doi.org/10.1016/j.jisa.2023.103237
  • Araujo, M. S. de, Machado, B. A. S., & Passos, F. U. (2024). Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance. Applied Sciences, 14(5), 2116.
  • Chen, T., Li, X., & Wang, Y. (2024). Emerging ransomware threats and adaptive mitigation strategies in enterprise networks. Computers & Security, 127, 103101. https://doi.org/10.1016/j.cose.2023.103101
  • Galinkin, E. (2021). Winning the Ransomware Lottery: A Game‑Theoretic Model for Mitigating Ransomware Attacks.
  • Gray, I. W., Cable, J., Brown, B.,  Cuiujuclu, V., & McCoy, D. (2023). Money Over Morals: A Business Analysis of Conti Ransomware.
  • Guvçi, F., & Şenol, A. (2023). An Improved Protection Approach for Protecting from Ransomware Attacks. Journal of Data Applications, Issue 1, 69–82.
  • Hassan, M., & Alshamrani, A. (2023). Sector-specific vulnerability analysis and ransomware risk assessment: A longitudinal study. Information & Computer Security, 31(4), 569–589. https://doi.org/10.1108/ICS-10-2022-0198
  • Ibrahim, K., & Mahmoud, R. (2022). Ransomware attack patterns and adaptive enterprise response strategies: A review of 2020–2022 studies. Future Generation Computer Systems, 138, 360–379. https://doi.org/10.1016/j.future.2022.04.012
  • Kamaruddin, N., Idris, A., & Fernandez, K. (Eds.). (2024). The new normal and its impact on society: perspectives from ASEAN and the European Union. Springer Nature.
  • Karaca, H., & Tekerek, A. (2025). Enhancing Cybersecurity against Ransomware Attacks Using LSTM Deep Learning Method: A Case Study on Android Devices. Politeknik, 28(2), 491–502.
  • Malik, V., Khanna, A., Sharma, N., & Nalluri, S. (2024). Trends in Ransomware Attacks: Analysis and Future Predictions. International Journal of Geospatial and Information Science, 2024.
  • Masum, M., Hossain Faruk, Md. J., Shahriar, H., Qian, K., Lo, D., & Adnan, M. I. (2022). Ransomware Classification and Detection With Machine Learning Algorithms.
  • Mott, G., Huesch, P., & Sullivan, J. (2024). ‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience. Journal of Cybersecurity, 10(1), tyae013. Retrieved from https://academic.oup.com
  • Muniandy, M., Ismail, N. A., Al Nahari, A. Y. Y., & Yao, D. N. L. (2024). Evolution and Impact of Ransomware: Patterns, Prevention, and Recommendations for Organizational Resilience. International Journal of Academic Research in Business and Social Sciences,  14 (1), 585–599.
  • Munoz Cornejo, G., Lee, J., & Russell, B. A. (2024). A thematic analysis of ransomware incidents among United States hospitals, 2016–2022. Health and Technology, 14, 1059–1070. Retrieved from https://link.springer.com
  • Ojo, A. O. (2025). Ransomware trends and mitigation strategies: A comprehensive review. Global Journal of Engineering and Technology Advances, 22(03), 009–016.
  • Oliveira, D., & Rodrigues, L. (2025). Multi-layered cybersecurity approaches for mitigating advanced ransomware attacks. International Journal of Information Management, 69, 103567. https://doi.org/10.1016/j.ijinfomgt.2024.103567
  • Raghavan, S., & Patel, D. (2025). Evaluating the effectiveness of ransomware prevention and response frameworks in SMEs. Journal of Cybersecurity Research, 7(1), 45–68. https://doi.org/10.1016/j.jcsr.2025.01.002
  • Saini, K., & Kumar, R. (2025). The Evolution of Ransomware: In Depth Analysis of Threat Development and Modern Defense Mechanisms. Journal of Network Security (JoNS), 13(03), 35–43.
  • Shaikh, M. U. R., Ullah, R., Akbar, R., Savita, K. S., & Mandala, S. (2024). Fortifying against ransomware: Navigating cybersecurity risk management with a focus on ransomware insurance strategies. International Journal of Academic Research in Business and Social Sciences, 14(1), 1415–1430. Retrieved from https://kwpublications.com
  • Song, W., Karanam, S., Xiao, Y., Qi, J., Dautenhahn, N., Meng, N., & Ferrari, E. (2023). Crypto‑Ransomware and Their Defenses: In‑depth Behavioral Characterization, Discussion of Deployability, and New Insights.
  • Tran, L., & Nguyen, H. (2024). Zero-day ransomware and its implications for enterprise cybersecurity policies. Computers, Materials & Continua, 80(3), 6115–6132. https://doi.org/10.32604/cmc.2024.025001
  • Verma, P., Singh, A., & Kumar, R. (2022). The role of human factors and organizational readiness in ransomware resilience. Computers & Security, 118, 102738. https://doi.org/10.1016/j.cose.2022.102738.
  • Williams, T. III. (2023). Risk trends by industry: An empirical study in ransomware target trends. Issues in Information Systems, 24(1), 270–279. Retrieved from https://iacis.org
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Ransomware Cybersecurity Organizational Resilience Prevention Detection Response Threat Mitigation and Human and Technical Factors

Powered by PhDFocusTM