FTC Issues Second Report to Congress on Its Work to Fight Ransomware and Other Cyberattacks

Table of Contents

The Federal Trade Commission’s second report to Congress on ransomware and cyberattacks marks a quiet but consequential shift in how U.S. regulators frame cybersecurity enforcement. Rather than treating ransomware as a purely criminal or national security problem, the report reinforces a view that insecure data practices, weak governance, and poor vendor oversight are consumer protection failures—squarely within the FTC’s authority.

Read closely, the report is less a status update and more a signal. It shows how the agency is positioning itself as a central player in the fight against cyber extortion, data theft, and systemic security failures, using existing statutory tools to pressure companies long before a breach escalates into a headline event.

FTC Delivers Second Congress Report on Ransomware and Cyberattack Enforcement

At its core, the report catalogs enforcement actions, investigations, and policy initiatives the FTC has pursued since its first ransomware-focused update to Congress. The agency emphasizes that ransomware incidents are rarely isolated technical failures. Instead, they are typically the end result of long-standing security lapses: excessive data retention, inadequate access controls, poor patch management, and limited internal accountability.

The FTC makes clear that it views these failures through the lens of unfair or deceptive practices. When companies promise reasonable security but operate with outdated systems, flat networks, or unmanaged third-party access, the agency considers that gap actionable—regardless of whether a ransom is ultimately paid.

FTC Tells Congress It’s Intensifying Efforts Against Ransomware and Cyber Threats

One of the strongest messages in the report is that the FTC is not standing still. The agency highlights expanded coordination with other federal bodies, increased use of compulsory process, and a growing willingness to impose long-term compliance obligations on organizations that experience serious cyber incidents.

These obligations increasingly resemble operational mandates rather than symbolic penalties. They include required security programs, third-party audits, executive accountability, and ongoing reporting. For companies, this means ransomware exposure now carries multi-year regulatory consequences that can reshape internal governance well beyond the immediate incident response.

FTC’s Latest Congressional Report Highlights Ransomware and Cybersecurity Action

The report also underscores the FTC’s expanding cybersecurity portfolio. While ransomware remains the headline threat, the agency situates it within a broader ecosystem of cyber risks: credential stuffing, supply-chain compromises, insider misuse, and large-scale data exfiltration.

Importantly, the FTC frames these threats as interconnected. Poor identity management enables lateral movement. Excessive data collection magnifies breach impact. Weak vendor controls turn isolated compromises into systemic failures. This holistic framing suggests future enforcement will focus less on single incidents and more on patterns of organizational neglect.

FTC Outlines Progress in Ransomware and Cyberattack Fight in New Report to Congress

The FTC points to tangible progress in using enforcement to change behavior. According to the report, settlements and consent orders are influencing how companies structure security teams, budget for resilience, and involve leadership in risk oversight.

Notably, the agency highlights cases where security failures intersected with privacy violations—situations where companies collected more data than necessary, failed to respond adequately to consumer requests, or could not account for where personal data resided. These overlaps reinforce the FTC’s position that privacy and cybersecurity are inseparable.

FTC Reports to Congress on Ransomware Response, Urges Stronger Cyber Defenses

Beyond enforcement, the report functions as a policy nudge. The FTC urges organizations to adopt proactive defenses rather than reactive fixes. This includes adopting zero-trust principles, limiting internal access to sensitive data, and regularly testing incident response plans.

The agency is particularly critical of “check-the-box” compliance. Written policies that are not operationalized, security assessments that are never remediated, and training programs that do not reach decision-makers are all cited as common precursors to serious incidents.

In Its Second Report to Congress, FTC Maps Its Ransomware and Cyberattack Strategy

Strategically, the report reveals how the FTC sees its role evolving. Rather than deferring to sector-specific regulators, the agency positions itself as a backstop—able to intervene when security failures harm consumers regardless of industry.

This approach allows the FTC to reach companies that might otherwise fall between regulatory regimes, including technology platforms, data brokers, retailers, and service providers that process large volumes of personal data without traditional prudential oversight.

FTC’s New Congressional Report Signals Sharpened Focus on Ransomware and Digital Threats

The tone of the report suggests a sharpening of enforcement priorities. The FTC repeatedly emphasizes scale, sensitivity, and preventability. Large datasets, sensitive personal information, and foreseeable security gaps are all highlighted as aggravating factors.

This framing aligns with broader federal concerns about bulk data exposure, cross-border access, and systemic cyber risk. While the report itself is rooted in consumer protection law, its logic mirrors national security discussions about data concentration and access pathways.

How the FTC Is Positioning Itself Against Ransomware, According to Its Latest Report

Taken together, the report shows the FTC positioning itself as both enforcer and architect. The agency is not merely reacting to incidents; it is shaping expectations for what “reasonable” security looks like in practice.

That includes expectations around data minimization, retention limits, access logging, and vendor oversight—areas traditionally associated with privacy programs rather than cybersecurity teams. This convergence is not accidental. It reflects a belief that ransomware thrives where data governance is weakest.

FTC Tells Lawmakers It’s Stepping Up Ransomware Fight in New Cybersecurity Report

The report also serves a political function. By documenting its actions, the FTC is making the case that existing authorities are sufficient to drive meaningful change—if used aggressively. This may influence future debates about whether Congress needs to expand or clarify the agency’s powers.

For businesses, the practical takeaway is that waiting for new laws is not a viable strategy. The FTC is already using the tools it has, and the report suggests it intends to keep doing so.

In Second Report to Congress, FTC Pushes Back Against Ransomware and Digital Threats

Ultimately, the FTC’s second report to Congress reflects a broader regulatory reality: ransomware is no longer viewed as an unpredictable external shock. It is treated as a foreseeable outcome of poor data stewardship.

Organizations that cannot explain what data they collect, where it lives, who can access it, and how long it is retained are increasingly vulnerable—not just to attackers, but to regulators. This is where DSAR operations, data mapping, and privacy engineering become critical cyber risk controls.

A mature DSAR program forces organizations to confront uncomfortable truths about their data footprint. It exposes shadow systems, undocumented vendors, and retention practices that silently increase breach impact. In the FTC’s enforcement worldview, those weaknesses are not incidental—they are central.

The message embedded in the report is clear: ransomware resilience is not only about backups and firewalls. It is about governance, accountability, and the discipline to limit data exposure before an attacker—or a regulator—finds it for you.

Written by: 

Online Privacy Compliance Made Easy

Captain Compliance makes it easy to develop, oversee, and expand your privacy program. Book a demo or start a trial now.