You log on as usual. Coffee in hand, you sift through your overnight emails and open the document you were working on yesterday to add that important update. Only you now find yourself locked out. You try your account password, but the screen shakes its head in response. You check that it’s the correct file, but the extension now reads .encrypted.
Your apps won’t open either – missing or corrupted data. Before you can ask your team if they’re having similar issues, messages are pinging in like gunfire to share the same story. The IT guy’s not answering your messages, nor anyone else’s. He’s curled up in a dark corner of the office with his laptop closed, hyperventilating.
It’s finally happened – your business has been hit by a ransomware attack. Maybe it was a phishing email that the intern clicked on. Maybe the CEO downloaded a dodgy link while surfing the web over lunch. All that matters now is how your company responds.
Your first priority is to stop the spread. Ransomware tends to move laterally across networks, targeting as many additional devices and backups into which it can sink its greasy little fingers.
Here’s what you should do:
To work out the best course of action, you first need to know what type of ransomware you’re dealing with:
Whatever data has been lost, at least you have a backup, right? But even if you have backed up your data, if it’s not an immutable backup, the hackers may have infiltrated that version as well, rendering it useless.
Once containment is complete, it’s time to evaluate the extent of the attack:
If clean backups are available, you can begin the restoration process. This is where having a robust backup and recovery solution is essential. If not, and the data is critical to your operations, you may have to consider paying the ransom.
Before you can restore your data, you first need to ensure that you’re restoring it to a secure environment. Here’s what that looks like:
Hack me one time, shame on you. Hack me twice, can't put the blame on you. Once recovery is complete, attention should turn to long-term protection. This should include the following:
Outdated backup solutions are no better than not having data backup at all. This is because they’re just as likely to end up encrypted as the live versions they’re designed to preserve.
Redstor’s ransomware recovery solutions ensure automated backups that combine rapid response with secure data restoration. Here’s how:
Fail to prepare, prepare to fail your customers. Recovering from ransomware requires a proactive approach. While no organisation or cyber security firm can guarantee immunity from cyberattacks, Redstor ensures full recovery. In 24 years, we’ve never lost data.
No company deserves to be held hostage by ransomware. But equally, some can't complain about the consequences when they neglect to protect against this growing threat. Make sure your business isn’t one of them by getting in touch today.