A company calls us in a panic on a Monday morning following a ransomware attack. A disaster scenario that we know well at Present. Cyberattackers often take advantage of the weekend to infiltrate the network of a vulnerable SME by exploiting security flaws. On Monday morning, employees return to their desk, only to find their workstations are crypto-locked, impossible to work or perform tasks as innocuous as sending an email. In addition to the lack of productivity and the reputational damage, important and confidential data is now inaccessible and even worse, sold on the Dark Web. A ransom is now demanded, but paying it is out of the question.
We explain here how to establish a recovery plan if you have unfortunately been the victim of a ransomware attack, but above all we explain how to prevent such a situation from happening in the first place.
At the end of the blog, we also share with you our 15 cybersecurity essentials.
Realizing that your business is the victim of a ransomware attack is stressful. Nevertheless, the first thing to do is to try to react calmly. These additional policies can help you prevent broader network infiltration and regain access to computers and files.
You must first contact your lawyers and your insurer to inform them of the security incident. They will also tell you the specific approach to take depending on your coverage and their incident management policies.
Do not communicate or respond to requests or social media comments from anyone and advise all staff to do the same. Let the specialized services of your lawyers manage the communications.
Disconnecting the infected device from the Internet and any other device is necessary for the security of the network as a whole. However, you should not shut down or restart your computer.
Several attack methods inject "Services" which are activated in the start-up cycle, often even before the protection tools are activated, which can cause damage and even more rapid propagation.
It is also important to temporarily disconnect all of your shared drives until you have determined that all infected systems have been identified. Continue to monitor systems to identify if there are any new or missing files.
Once the threat has been identified and isolated, in order to be able to perform recovery steps, it is important to define a network segment that is completely isolated from the affected network.
Once an environment has been infected, there is no way to guarantee that the ransomware is completely gone unless you wipe the devices, as well as clean VMs, and start with a fresh image. Reimaging servers and applications ensures that the ransomware has been remediated. You can rebuild your network and workstations from scratch by applying cyberattack prevention tools.
Depending on your disaster recovery plan, you should be able to recover your data from backups. However, you must check them beforehand in case they are invalid or encrypted.
If you have an “Air Gap” type backup, you will most likely be able to recover your information.
Avoid restoring "System" opt more for data recovery only.
90% of threats could be stopped with a MFA installed. One of the most common ways adversaries gain access to corporate data is by guessing weak passwords or stealing them, whether through phishing or buying them from the Dark Web.
From there, they get the same permissions as legitimate users including administrators and power users.
The goal of multi-factor authentication (MDR) is to create an additional layer of defense beyond just using a password by adding a physical factor to it.
Additionally, a MDR service allows you to protect your terminals well beyond what a simple antivirus can do. A managed detection and response solution provides the following benefits:
A backup policy is a set of rules and procedures that describes a strategy when creating backup copies of data to be retained. A corporate data backup policy is an integral part of an organization's overall data protection, disaster recovery, and business continuity strategy.
Applying the 3-2-1-1-0 rule is the best way to protect your backups. 3 copies of data (one of which is the production data set) must be saved on 2 different types of media where 1 copy must be located offsite and at least 1 of the copies must be stored offline. The 0 refers to the verified integrity of the backup and guarantees that it contains 0 errors.
In the event of cyber incidents or data breaches, time is of the essence. The sooner you can contain the damage and identify the cause, the better. This is where an incident response plan comes in. By having a clear, well-documented plan on how to identify and handle an information security incident, you can ensure your team is ready to take quick and effective action.
When designed and implemented correctly, a cybersecurity incident response plan can also provide a structure to prevent future attacks by identifying weaknesses and gathering valuable threat intelligence.
Managing your business' security requires a team of experts who will be able to support you in order to guarantee the security of your corporate data. To find out more about how Present can support you, do not hesitate to contact us!
The right use of technology addresses business challenges and drives business growth in all areas of an enterprise. We hope this blog will offer insight into developing strategies and tactics to enable you to identify those key drivers of growth and keep pace with and anticipate the rapid technology change of today.