Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
2nd Edition GlitchZone RHC 970x120 2
Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

Redazione RHC : 17 November 2025 08:02

Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection .

Data from the Veeam Ransomware Trends Reports 2024 and 2025 shows that the number of organizations paying a ransom after a ransomware attack decreased by nearly a quarter compared to the previous year. This decline, however, does not imply an overall decrease in attacks: companies continue to be targeted by ransomware campaigns, but there are positive signs related to the ability to recover data without paying the ransom. In 2024, 30% of companies were able to recover data independently, compared to 14% the previous year. At the same time, the percentage of organizations obtaining data by paying the ransom decreased from 54% to 32% , confirming that this strategy is increasingly less effective.

The analysis highlights another crucial element: many organizations still lack alternative infrastructures that can guarantee business continuity in the event of an attack. By 2024, only 37% of EMEA companies had implemented such solutions, while the remaining 63% remain vulnerable to prolonged outages that could affect their entire operations . The consequences of such a downtime aren’t limited to technical aspects: they can generate significant financial and reputational impacts, with losses that in some cases can exceed millions of euros.

The decline in payments reflects improved data recovery capabilities, but the ransomware threat remains real and constantly evolving. Attackers are developing new strategies, sometimes focusing on stealing data to extort money directly or resell it on black markets, or aiming to disrupt business operations without an immediate financial objective. Gaps in data resilience continue to leave many businesses vulnerable , underscoring the importance of consolidating alternative infrastructure, secure backups, and rapid recovery strategies.

Despite advances in data resilience and counter-attacker operations, investing in structural measures that ensure protection and operational readiness remains essential. The analysis confirms that, despite advances in data resilience and counter-attacker operations, investing in secure backups and alternative infrastructure remains crucial. Resilience standards are gradually improving, but key measures remain incomplete. The next generation of cybersecurity strategies must therefore focus on effective infrastructure, detailed recovery plans, and integrated approaches to ensure business continuity and rapid recovery even in complex scenarios.

In this context, Veeam presents the “Veeam is Much More” initiative: an invitation for companies and cybersecurity leaders to rethink the role of backup as a tool for building a more secure, agile, and resilient business. Organizations must go beyond simply “backup done right” and ensure the ability to quickly restore entire locations or compromised infrastructures, ensure data portability across virtual environments, clouds, and containers without constraints, protect storage by making it secure , immutable, isolated, and encrypted, and operate in a hybrid cloud model that offers flexibility, control, and resilience. In this context, Veeam proposes a reflection on the strategic value of data resilience , inviting companies to manage distributed workloads, prevent disruptions, and ensure operational readiness in increasingly complex scenarios.

Immagine del sitoRedazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli