Ransomware Rules and Realities: Why UK Businesses Say One Thing and Do Another

The Compliance Illusion at the Boardroom Table

A new Commvault survey reveals a striking contradiction inside UK organisations: three-quarters of leaders say they support a ban on ransomware payments in principle, yet most admit they’d break that rule if breached.

Silhouetted business leader in a boardroom facing digital data wall, symbolising ransomware crisis and board-level cyber decisions

This isn’t just a moral dilemma. It’s a crisis of operational clarity. And it exposes a gap between how businesses talk about cyber resilience — and how they behave under pressure.

The Stats Behind the Split

  • 75% of UK organisations support a private-sector ransomware payment ban.
  • 62% say they would still pay, if needed, to recover quickly.
  • 43% have already experienced a ransomware attack.
  • 98% plan to increase cybersecurity spending in 2025.

What these numbers reflect isn’t a lack of ethics — it’s a lack of preparedness.

When Resilience Meets Reality

The board wants to appear compliant.
Legal wants to be protected.
Ops just wants payroll to run.

When ransomware hits, principles collide with panic. And unless your recovery plan has been designed to function under duress, decisions start being made outside the playbook — by whoever is loudest, not necessarily who is right.

The breach moment is rarely when a company gets hacked. It’s when they realise they don’t actually have a clear recovery stance.

Paying Ransom = Losing Control

Even when companies say “we’ll never pay,” many haven’t accounted for:

  • Critical system downtime that outlasts backups
  • Data recovery gaps that affect regulatory reporting
  • Internal pressure from finance, HR, and communications
  • Supplier chains that can’t function without fast response

This isn’t a justification — it’s a visibility problem.

The Case for Ransom-Ready Recovery (Not Ransom-Centric Strategy)

ENHALO’s approach isn’t to shame organisations for what they might do under pressure. It’s to build structures that reduce the panic in the first place.

Because when companies rehearse ransomware scenarios, they don’t just test tech — they test leadership.

3 Signs Your Organisation Isn’t Ready

  1. You haven’t documented your no-pay stance across departments.
    If legal and comms weren’t in the war room during planning, they won’t follow the script during crisis.
  2. You treat backups as your only fallback.
    What if the backups are encrypted too? What if the window to restore is 36 hours, and you’ve got 12?
  3. You’ve never run a ransomware simulation with your exec team.
    If it’s only IT rehearsing scenarios, your business isn’t aligned to survive one.

Compliance Is Not the Same as Capacity

Ransomware bans are coming. The private sector knows it, and many support it. But unless those policies are backed by true cyber resilience, they’re just empty promises waiting to be broken.

The Bottom Line

What will your board say when the ransom note arrives?

If your answer starts with “we’d never pay,”
make sure your systems, people, and response strategy back that up.

Or don’t call it policy — call it hope.

Post Author:

Supply Chain Threat Detection

Cyber criminals have upped their game, so should you. We never underestimate or ignore your supply chain's security threats.

Security Operations Center

Financial losses, intellectual property theft, and reputational damage due to security breaches can be prevented.

SOC Assurance Service

Despite a mature Security Operations Center, you're still under threat. Our SOC Assurance mitigates the risk of unnoticed breaches.

Emergency Cyber Response

Regain immediate control, contain the damage, and eradicate the threat. Your bullet-proof, SOS rapid response.

Agentless Network Segmentation

Rely less on vulnerability management and rest assured that the threat won’t spread across your network.

Endpoint Detection and Response

This solution is for customers that do not have extensive security budgets or staffing to implement and monitor an endpoint security solution.

Irregular Behavior Detection

Companies focus heavily on malicious outsider mitigation, while the biggest threat lies with those who already have access.

Penetration Testing Services

A penetration test is arguably the most important part of any cybersecurity journey, it tests an organization’s ‘final line of defense’ against attackers.

Security Awareness Training & Testing

With cybersecurity awareness training, the risk of human error can be reduced, turning human error into a human firewall.

Insights

360 Security
Must Know Cyber
Security Services

Resources

WEBINARS
MEDIA
SON OF A BREACH
CASE STUDIES
USE CASES

Cyber Security Services

Supply Chain Thread Detection
Security Operations Center
SOC Assurance Service
Emergency Cyber Response
Agentless Network Segmentation
Cyber Risk Assessment

Supporting Cyber Security Services

Endpoint Detection and Response
Irregular Behavior Detection
Penetration Testing
Security Awareness Training and Testing

Related Posts

Cyberattack Emergency

Are you experiencing an active cyberattack?

Get rapid response.

Call ENHALO’s International SOS no:
For Other Inquiries: