Ransomware Response

FREE, NO-NONSENSE GUIDE ON WHAT TO DO WHEN YOU’VE BEEN HIT BY A RANSOMWARE ATTACK - DOWNLOAD & PRINT IT TODAY

 

The scourge of ransomware is on the rise and as recent attacks, such as those on Colonial Pipeline in the United States and the Travelex ransomware attack in the UK have shown, nobody is safe from this massive cyber security issue. As per some estimates, every 15 seconds a business entity somewhere in the world is being hit by some type of ransomware. Have you thought about what you’re going to do when you’re hit by a ransomware attack? 

Download our FREE, PRINTABLE ransomware attack workflow and start using it immediately to be one step ahead of the criminals. Here’s what the workflow is all about: 

  • Clear, visual guideline on how to react and respond when attacked 
  • Downloadable, printable guide that your IT team should ideally have in front of them at all times 
  • A zero-fluff approach to ransomware attacks and what you need to do immediately after you’ve been hit 
  • Expert advice on whom to communicate with, how, what to review, whom to inform and more
  • ** GDPR ** We wholeheartedly believe your and our rights to privacy and in the GDPR. The bottom of the page explains how we use your data. 

Complete the form below to receive a copy of the detailed Travelex attack document and timeline.



This Ransomware Attack Response workflow is the perfect first guide to look at after taking a deep breath in case you’ve been attacked. It tells you what basic steps to take that can help you mitigate damage.

Since you’re on this page, you are probably well-aware of what ransomware is and how damaging it can be to business continuity and bottomline. Yet, if one has to explain the meaning of ransomware in simple words, it is basically a malicious software that blocks access to your own data and encrypts files.

The hacker threatens to steal data and leak it and obviously demands a ransom. You won’t get access to the encrypted data until a ransom is paid. Sadly, there is no guarantee that you’ll get access even after making the payment.

The natural next question is - How to prevent ransomware infection in your information systems?

There’s a lot that can be done to prevent sophisticated ransomware attacks from bringing your business to a halt. While ransomware prevention technologies such as End Point Detection & Response (EDR), Content Destruction & Reconstruction (CDR) and High Quality Threat Intelligence play a vital role here, we mustn’t forget that a majority of ransomware attacks succeed because of access to privileged credentials.

This means that the human element is extremely critical in preventing ransomware attacks and they must, therefore, be trained and oriented correctly if ransomware attacks, or any cyber-attacks for that matter, have to be prevented.

Do backups prevent ransomware attacks?

Sure they do. Backups and innovative recovery technologies can play a huge role in securing your organisation against different forms of malware but make sure that they don’t lead to a false sense of security. A ransomware assessment is a good idea if you want to truly measure your breach readiness. You may also like to check out Ransomware Checklist to assess where exactly you stand. 

All said and done, while you can try your best to make the wisest technology investments, buy the best security software and manage your privileged users, the sad truth is that you’ll probably still get attacked at some point in your business lifetime.

No, there’s no fear mongering here - just the hard truth and a viable discussion on how to deal with it.

The only and best protection against a ransomware attack (or any other kind of malicious cyber attack) is preparation.

Your core IT, Security & Management team has to digest the fact that your organisation could be the next victim of a ransomware attack and you must all be on the same page regarding the next steps. You should already have had multiple discussions on whether you’ll pay a ransom and if you do, under what circumstances will you do so. We have additional resources available to help you answer the question - should you pay the ransom?

Once you have your ransomware response plans and checklists in order, it is also imperative to practise and rehearse these checklists with the key stakeholders in a crisis. This is why ransomware tabletop exercises are extremely crucial today. Read our blog to know why ransomware tabletop scenario workshops are so critical going forward. 

Additionally, we’ve curated this FREE, crisp and to-the-point ransomware attack response workflow that will help you when you’re actually under attack. This free resource is also of great help when training your team for how to respond to a ransomware attack. You can also check out our Ransomware Response Checklist which goes into greater detail of how to respond to a ransomware attack. 

DOWNLOAD & PRINT THIS EASY-TO-FOLLOW VISUAL WORKFLOW FOR IF/WHEN YOU’RE UNDER ATTACK

NCSC Certified Training B&W

We are industry experienced practitioners when it comes to cyber security training & cyber security consultancy services

Cyber Security Training

Training

We offer a host of courses including our GCHQ Certified Cyber Security & Privacy Essentials (CSPE) course and our Cyber Incident and Response Planning (CIPR) workshop

Virtual CISO DPO

Virtual CISO and DPO

Our virtual CISOs and DPOs are industry thought leaders and have several years of experience in cyber security and data privacy working with small, medium and large organisations

Cyber Security Events

Events

We work with event organisers from around the world to create engaging cyber security events. Our pool of keynote speakers are carefully chosen and are recognised global industry leaders.

ISO27001

Cyber Essentials & ISO27001

Acquiring an accreditation is often a daunting and complicated task. We work with you to ensure that your business is ready for any and all compliance requirements

GDPR GAP Assessment

Third Party Assessments

With the ever increasing dependency on outsourcing it isimperative for businesses to manage risks posed by third parties. Leaving the backdoor unlocked is simply not an option.

Cyber Security GAP Assessment

Security Gap Assessments

We offer GAP assessments against most frameworks and accreditation including Information Security, PCI-DSS, Data Privacy and Cyber Incident Response

How we use your data:

  • The form above collects personal information so we may email you the requested information and pressing the "Get your free copy now"  button acts as informed consent for this processing purpose. Consequently we may be in touch to:

    • Update you when we host our ground-breaking Wisdom of Crowds events in your country or region.
    • Keep you posted on free resources and documents around Wisdom of Crowds events and its outputs. (For example, we tend to create insightful mind maps and we also are the creators of free to view Insights with Cyber Leaders Video Interviews. )
    • Ping you a note about upcoming FREE educational webinars on GDPR and Cybersecurity.
    • Inform you of any upcoming Data Breach Response or Cyber Incident Response training.  
  • Using the information from this page we will NOT sell or market to you any of our consultancy or trusted advisory services.  
  • In its purest interpretation, this act of us communicating with you is direct marketing and is processed on the basis of our legitimate interest and your engaging in our services. All marketing communication will include an unsubscribe button or other method of ending communication.