An old axiom attributed to Benjamin Franklin, “an ounce of prevention is worth a pound of cure,” is perfectly applicable to a threat unfathomable in his time: ransomware.

Recently IBM X-Force Incident Response Services released its “Ransomware Response Guide.” This guide was created due to the continued evolution of the malware. Ransomware has not discriminated: There have been several high-profile examples of hospitals and government agencies essentially being held hostage for bitcoin payments after ransomware has encrypted business-critical files. At the same time, ransomware has also plagued the average home user by encrypting family photos and other sentimentally valuable information.

When you read the “Ransomware Response Guide,” you’ll notice that a large portion of the document is devoted to a key phase in incident response: preparation. To Mr. Franklin’s point, not preparing for ransomware with an ounce of effort will in most cases result in a pound of resources being used to recover from an infection.

The X-Force Incident Response Services team witnesses this time and time again, and cannot emphasize enough the importance of implementing that ounce of prevention. Unfortunately, when our customers call, many times it’s all too apparent that simple preventative steps could have helped them avoid a ransomware infection entirely.

If your organization does fall prey to an attack, the “Ransomware Response Guide” offers a number of important guidelines you can use as your organization runs through the incident response life cycle. The guide explores important issues relating to ransomware, including the identification of the type of malware. It also provides key steps, discusses understanding the root cause and covers various recovery options.

The threat landscape is constantly changing. Types of ransomware, their technical makeup and the techniques used for their propagation that are en vogue today may drastically change tomorrow. This guide may not encompass the inevitable threats looming on the horizon. It does, however, lay a foundation for that ever-important ounce of prevention.

Whether or not your organization has been hit by ransomware, the “Ransomware Response Guide” will help you develop new ideas to prepare for this common threat or assist you in validating that your organization is taking the right steps to prepare for this attack.

Download the complete Ransomware Response Guide

More from Incident Response

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

Expert Insights on the X-Force Threat Intelligence Index

5 min read - Top insights are in from this year’s IBM Security X-Force Threat Intelligence Index, but what do they mean? Three IBM Security X-Force experts share their thoughts on the implications of the most pressing cybersecurity threats, and offer guidance for what organizations can do to better protect themselves. Moving Left of Boom: Early Backdoor Detection Andy Piazza, Global Head of Threat Intelligence at IBM Security X-Force, sat down with Security Intelligence to chat with us about the rise in the deployment…

5 min read

How Morris Worm Command and Control Changed Cybersecurity

4 min read - A successful cyberattack requires more than just gaining entry into a victim’s network. To truly reap the rewards, attackers must maintain a persistent presence within the system. After establishing communication with other compromised network devices, actors can stealthily extract valuable data. The key to all this is a well-developed Command and Control (C2 or C&C) infrastructure. The number of C2 servers used for launching cyberattacks increased by 30% in 2022. More than 17,000 of these servers were detected last year,…

4 min read