Ransomware in 2026: What Boards Actually Need to Know

Simon Crimp

SUBSCRIBE CONTACT US

Author



KEY TAKEAWAYS

  • Ransomware is now a routine operating risk rather than a rare IT event, so boards need to treat it as a core resilience and governance issue.


  • Attacks have become more sophisticated, with data theft, extortion and AI-enabled phishing increasing both the pressure on organisations and the speed of attacks.


  • The biggest weaknesses are often not just technical gaps but failures in governance, recovery planning, supplier oversight and crisis decision-making.


  • Boards that test their preparedness, harden backups, clarify decision rights and rehearse realistic scenarios are far more likely to reduce impact and recover faster.

3 MIN READ


Globally, ransomware is now responsible for 44% of all breaches a 37% increase compared to 2024, underlining that it is now part of routine operating risk rather than a rare incident. In larger organisations, ransomware was a component of 39% of breaches, while for small and midsize businesses, ransomware was involved in 88% of breaches. [Source: Verizon 2025 Data Breach Investigations Report (DBIR).]


Recent UK cyber security survey data shows that around half of UK businesses report some kind of cyber breach or attack in a typical year – about 50% in 2024 [Source: Sophos – State of Ransomware 2024 (government sector breakdown).]


For boards, the question is no longer if you will be hit, but how ready you will be when it happens.


From Disturbing Headlines to Everyday Risk


Ransomware can now:


  • Halt factories and logistics chains.
  • Disrupt hospitals, pharmacies, and clinical systems.
  • Lock up municipal and education services.
  • Trigger regulatory investigations and investor scrutiny within days.


A major ransomware event has become a board‑defining moment: how quickly the chair and non‑executives understand the situation, how clearly they set expectations, and how credibly they engage regulators, customers and investors.


Ransomware is Now a Professionalised Ecosystem, Not Lone Hackers


Ransomware is now a structured industry. ITPro’s analysis of the market in 2025 ('Rocketing number of ransomware groups as new smaller players emerge') counted more than 70 active groups, up sharply year‑on‑year. Many operate with:


  • Ransomware‑as‑a‑Service (RaaS) – renting out tools and infrastructure to affiliates in exchange for a share of proceeds.
  • Negotiation teams – specialists who handle communications with victims using structured playbooks.
  • Data leak operations – dedicated sites and staged disclosure campaigns to maximise reputational pressure.


Motivation, capability and persistence on the attacker side are all increasing.


Double and Triple Extortion Have Become the Normal


The simple 'encrypt files, demand payment' model has largely given way to more complex campaigns.


DigitalXRAID’s Annual Threat Pulse 2024 reports that over 80% of ransomware attacks now involve data theft as well as encryption. Many also add further elements such as DDoS attacks or direct harassment of staff and customers – so‑called triple extortion.


In practice, attackers often enter quietly, explore your network, exfiltrate sensitive data and only then reveal themselves, already in a position of leverage.


AI is Driving Scale, Speed and Adaptation


With a ransomware attack, first they need to get through the door. In 2026, phishing is still the primary way in – in recent UK surveys, around 85% of organisations that suffered a breach cited phishing as the main attack vector.


Those attacks are becoming increasingly effective as AI rapidly updates the ransomware toolkit. A KnowBe4 report highlights a double‑digit rise in phishing volumes, with more than 80% of recent campaigns using AI‑powered polymorphic techniques – attackers generate fast‑changing variants of the same scam so it is harder for filters and analysts to spot a repeating pattern.


For boards, this shows up as:


  • Highly convincing phishing and social engineering – emails and messages that look and read like genuine internal correspondence, tailored to your sector and even to your executives.
  • Faster exploitation of vulnerabilities – AI‑assisted tools that scan for weaknesses and help weaponise them at scale.
  • Automation of attack stages – semi‑automated lateral movement, credential theft, and data exfiltration once inside the network.


The net effect of AI is more attempts, better‑crafted communications and a higher probability that attackers will eventually find a way through.


Board Insight: ransomware is now as much about privacy, trust, safety, and continuity of service as it is about IT systems availability.


At the same time, AI and automation are also changing the defence side. IBM’s breach research shows that organisations using security AI and automation can cut the breach lifecycle by around 108 days, with materially lower overall costs. [Source: IBM Cost of a Data Breach – ransomware & AI analysis (2023–24 coverage)]


Boards should be asking management how they are using AI defensively, not just preparing for attackers who use it offensively.


Where Are Your Weak Spots?


When boards review real incidents, their own or peers’, we see the same patterns of vulnerability in both systems and culture.


On the Technical Side


  • For complex enterprises, whether financial services, manufacturing, telecoms, retail or critical infrastructure operators, the attack surface has grown with every merger, new platform and outsourcing deal.
  • Legacy systems and flat, poorly segmented networks turn a small foothold in one business unit into an enterprise‑wide outage across plants, trading floors, shared services and customer‑facing channels.
  • Weak identity and access controls (incomplete MFA, shared or orphaned accounts, poor privileged‑access management) give attackers too many keys into high‑value systems.
  • Complex webs of strategic outsourcers, SaaS platforms, cloud providers and key suppliers create hidden concentration risk; a single payments processor, logistics partner or IT service provider can become a single point of failure for the whole group.
  • Backups are not as robust as assumed – distributed across data centres and clouds, but still stored on connected systems, not immutable, or never tested end‑to‑end.


UK data shows that while attackers increasingly try to compromise backups, most organisations that recover do so from their own backup and resilience measures rather than by paying. The proportion of UK enterprises paying ransoms has dropped from almost half in 2023 to under a fifth in 2025, as more boards push for robust, tested backup strategies.


That turns backups from a comfort blanket into a potential liability if they are not properly segmented, hardened and exercised under realistic scenarios.


On the Governance and Culture Side


There is no rehearsed ransomware playbook that reflects how the enterprise actually operates across regions, business lines and shared services; roles, decisions and communication paths are improvised under pressure.


  • Decision rights – for system shutdowns, restoration priorities, ransom‑related choices and regulator notifications – are unclear, particularly in matrixed organisations with group, regional and business‑unit leadership.
  • Crisis communications are under‑prepared; spokespeople, stakeholder maps and holding statements are created on the fly for customers, partners, regulators, investors and staff.
  • Board reporting has focused on tools, projects and technical indicators rather than resilience outcomes, business impact and time‑to‑recover for critical services.
  • These are not purely technical failings; they are symptoms of how seriously ransomware has (or has not) been treated as an enterprise risk at board level.


Board Questions to Put on the Agenda


Rather than delving into technical details, effective boards focus on clear, practical questions.


You can use the following as a standing agenda aide‑mémoire:


Threat and Exposure


  • Which services, geographies, and customer segments would hurt most if hit by ransomware?
  • How are we monitoring ransomware trends relevant to our sector and adjusting our controls accordingly (for example, insights from ENISA, sector regulators, and major incidents in our industry)?
  • What do recent statistics (for example, Sophos, Verizon DBIR) imply about how often organisations like ours are being tested?


Preparedness and Resilience


  • Do we have a documented, rehearsed ransomware playbook covering IT, operations, finance, legal, and communications?
  • When was it last tested with ExCo and the board present? What changed as a result?
  • How quickly can we detect, contain and recover from an attack on our most important services? What evidence do we have – including realistic exercise results?
  • Are our backups segmented, immutable, and regularly tested in realistic scenarios, given how frequently attackers now target them?


Third‑party and Supply‑chain Risk


  • Which critical suppliers or partners, if compromised, could be an entry point or amplification path for ransomware?
  • How do we assess, contract, and monitor cyber resilience in key suppliers and cloud providers – and how does this align with NIS2, DORA, and other relevant frameworks?


People, Culture and Training


  • How are we equipping staff in high‑risk roles (finance, HR, senior executives) to recognise and handle phishing and social‑engineering attempts?
  • Is ransomware risk embedded in our broader risk culture and leadership behaviours, or treated as an annual awareness exercise?


When the Worst Happens: A 72‑Hour Board Checklist


No set of controls is perfect. When a serious incident lands, the board’s role is to ensure the response is being run well, not to run it themselves. In the first 72 hours, boards should look for:


Governance and Roles


  • A pre‑defined major incident structure, typically chaired by the CEO or COO, with clear workstreams for technical response, operations, legal, communications and customer support.
  • Clarity on the board’s role: oversight, major risk appetite decisions (for example, extended shutdown vs partial restart), regulatory posture, and stakeholder expectations.
  • A single source of truth for updates, with an agreed cadence, so directors are not relying on conflicting informal channels.


Regulatory and Legal Posture


  • A clear view of which regulators and authorities may need to be notified, and on what timelines (for example, data protection regulators, sector regulators, stock exchanges, law‑enforcement bodies).
  • Legal advice on ransom‑related decisions, including sanctions, money‑laundering and law‑enforcement considerations.


Stakeholder Communications


  • Prepared holding statements and trained spokespeople, updated as facts evolve.
  • Joined‑up messaging to customers, employees, suppliers, investors, and the media – avoiding both premature reassurance and damaging silence.


Decisions taken in these first few days – particularly on disclosure, negotiations, and service restoration – will shape regulatory, legal, and reputational outcomes for years.


Conclusion: Turning Statistics into Better Decisions


ENISA continues to place ransomware among the prime threats in Europe’s threat landscape, with significant impact across sectors. Sophos and Verizon’s latest numbers reinforce that ransomware is both common and costly – but they also show that organisations which invest in preparation and resilience are recovering faster and at lower cost.


Boards that deal well with ransomware typically:


  • Treat it as a standing agenda item within operational resilience and risk, not an annual technical presentation.
  • Set clear expectations of ExCo on preparedness, testing, and third‑party resilience.
  • Invest in regular crisis simulations involving both executives and non‑executive directors.
  • Use real incidents – their own or others’ – and fresh data as catalysts to lift maturity, not simply as reasons to "move on" once systems are restored.


Frameworks such as NIST’s Cybersecurity Framework 2.0 and EU regulations like NIS2 and DORA reinforce this direction by making governance, resilience testing, and third‑party oversight explicit board responsibilities.


The message for boards in 2026 is straightforward: you cannot eliminate the ransomware threat, but you can materially change the outcome when it arrives.


How Cambridge MC Can Help


Cambridge Management Consulting supports boards and executive teams to move from concern to confidence with practical, senior‑led work that strengthens readiness quickly:


  • Cyber Stress Tests – clarifying your "crown jewel" services and stress‑testing how cyber, technology and operations work together under real disruption.
  • Ransomware readiness health checks – focusing on identity, segmentation, backups, recovery, and third‑party exposure – with a prioritised remediation plan.
  • Board and ExCo simulations – realistic 72‑hour scenarios that sharpen decision‑making, governance, and communications under pressure.


If you’d like a clear view of your readiness – and a practical plan to improve it – Cambridge MC’s Digital Transformation and Cyber Security teams can run a rapid ransomware resilience assessment and board‑level simulation to identify gaps, agree priorities, and build confidence before the next test arrives.


Key References

 

  • Verizon 2025 Data Breach Investigations Report (DBIR)
  • UK Government Cyber Security Breaches Survey (via DCMS, 2024 and 2025)
  • Trustwave 2025 analysis of UK ransomware trends
  • ITPro 2025 coverage of falling ransom payments in UK enterprises
  • UK-focused cyber statistics round-ups and sector-specific analysis

About the Author

About Us

Cambridge Management Consulting (Cambridge MC) is an international consulting firm that helps companies of all sizes have a better impact on the world. Founded in Cambridge, UK, initially to help the start-up community, Cambridge MC has grown to over 200 consultants working on projects in 25 countries. Our capabilities focus on supporting the private and public sector with their people, process and digital technology challenges.


What makes Cambridge Management Consulting unique is that it doesn’t employ consultants – only senior executives with real industry or government experience and the skills to advise their clients from a place of true credibility. Our team strives to have a highly positive impact on all the organisations they serve. We are confident there is no business or enterprise that we cannot help transform for the better.


Cambridge Management Consulting has offices or legal entities in Cambridge, London, New York, Paris, Dubai, Singapore and Helsinki, with further expansion planned in future. 

Contact Form

Contact - Craig Devolution Blog

Subscribe to our Newsletter

Blog Subscribe

SHARE CONTENT

A digital human made of blocks and wires jumping into the air
by Ruth Redding 23 April 2026
Why digital transformation fails: human adoption. Learn how leaders can reduce change resistance, protect ROI and improve programme success with structured change management | READ FULL ARTICLE
Wind farms  and solar panels in the countryside at dawn
by Scott Armstrong 27 March 2026
Sustainability | Energy, risk and competitiveness – find out why sustainability is no longer just about reporting, but about resilience, cost control and long-term advantage | READ FULL ARTICLE
Yello and turquoise neon lights.
24 March 2026
International consulting firm, Cambridge Management Consulting has acquired telecommunications cost-reduction specialist, The Carrier Club, strengthening its ability to help organisations reduce their telecoms and network infrastructure costs.
Pembroke College lawn bathed in sunlight
by Tim Passingham 12 March 2026
CAMBRIDGE | See how Cambridge MC and Pembroke College are creating mutual value through a unique corporate partnership spanning student opportunities, academic collaboration and industry events | READ FULL CASE STUDY
The Top 21.2026 at the awards event in Cambridge, UK.
6 March 2026
The #21toWatch Top21.2026 winners have been announced at an awards ceremony at The Glasshouse innovation hub in Cambridge.
Asian business woman near a long window and looking at a tablet.
by Arianna Mortali 6 March 2026
BLOG | A student’s perspective on why women shouldn’t have to ‘play masculine’ to succeed at work – and how valuing empathy, confidence and inclusive leadership can help close gender gaps and build healthier organisations.
Abstract squiggle of circles
by Simon Crimp 19 February 2026
Where should leaders start with AI in 2026? A practical guide to moving beyond pilots, clarifying risk appetite, strengthening governance, improving data readiness, and delivering measurable enterprise value from AI at scale | READ FULL ARTICLE
Close up of a data centre stack with ports and wires visible
12 February 2026
We were approached by one of the fastest growing data centre providers in Europe. With over 20 data centres throughout the continent, they are consistently meeting the need for scalable, high-performance infrastructure. Despite this, a key data centre in Scandinavia had become reliant on a single, non-redundant 1 Gbps internet service from a local provider, posing significant risks to operational continuity. To enhance the reliability of its network and resolve these risks, our client needed to establish additional connectivity paths to ensure the redundancy of its infrastructure. The Ask Cambridge Management Consulting was engaged to address these connectivity challenges by identifying and evaluating potential vendors and infrastructure options to create second and third connectivity paths. This involved exploring various types of connectivity, including internet access, point-to-point capacity, wavelengths, and dark fibre. Additionally, Cambridge MC was asked to provide recommendations for building a local fibre network around the data centre to control and maintain diverse paths. This would allow the data centre to connect directly to nearby points of presence (PoPs) and reduce dependency on external providers, thereby enhancing network resilience and operational control. The goal of this project was to ensure that the Nordic data centre could maintain continuous operations even in the event of a failure in the primary connection. Approach & Skills Cambridge MC approached the project with a focus on ensuring operational continuity and resilience for the data centre. By identifying multiple connectivity paths, we aimed to mitigate the risk of network failures and ensure that the data centre could maintain continuous operations even in the event of a failure in the primary connection. This approach allowed Cambridge MC to provide a comprehensive solution to address both immediate and long-term connectivity needs. We employed a combination of Agile and Waterfall methodologies to manage the project. The initial investigative phase allowed a Waterfall approach, in which our team conducted thorough research and analysis to identify potential vendors and connectivity options. This phase involved detailed interviews with various telecommunications providers and an assessment of publicly available information. Once the initial analysis was complete, the workflow transitioned to an Agile approach for the implementation phase. This allowed Cambridge MC to adapt to new information and feedback from stakeholders, ensuring that the final solution was both flexible and robust. Challenges Lack of information: One of the primary obstacles we faced was the lack of detailed network maps and information from some of the potential vendors. To overcome this, the team conducted extensive interviews with contacts at these companies and leveraged its existing network of industry contacts to gather as much information as possible. Remote location: Another challenge was the remote location of the data centre, which limited the availability of local infrastructure and required us to explore creative solutions for connectivity. Cambridge MC addressed this by proposing the construction of a local fibre network around the data centre, which would allow for greater control and flexibility in connecting to nearby PoPs. Fragmented factors: Additionally, coordinating with multiple vendors and ensuring that their services could be integrated seamlessly posed a logistical challenge. We mitigated this by recommending a phased approach to implementation, starting with the most critical connectivity paths and gradually expanding to include additional options. Outcomes & Results Increased Connectivity: Cambridge MC successfully identified and evaluated multiple connectivity paths for the data centre. By exploring various types of connectivity, including internet access, point-to-point capacity, wavelengths, and dark fibre, we provided a comprehensive solution that significantly enhanced network resilience and reliability. Greater Control & Flexibility: Our recommendations for building a local fibre network around the data centre allowed for greater control and flexibility in connecting to nearby points of presence, ensuring continuous operations even in the event of a failure in the primary connection. New Vendors: The team’s extensive network of industry contacts and deep understanding of the regional telecommunications landscape allowed for a thorough and nuanced evaluation of potential vendors and connectivity options. Scope for Future Work: Cambridge MC identified several future developments with the potential to further enhance international connectivity and provide additional redundancy for the data centre. We also proposed further assistance, including a site visit for a more in-depth analysis of options, issuing RFI/RFP to vendors for capacity and fibre, and conducting similar connectivity studies for other candidate sites in the region.
Neon discs fading from blue to green to purple, cascading diagnolly across the screen.
by Cambridge Management Consulting 28 January 2026
Thames Freeport this week revealed the eight companies selected to participate in the Freeport’s Connectivity Lab, an initiative focused on validating commercially proven technologies in live port and logistics environments.
More posts