From the early instances of Locky to the more recent infestation of the WannaCry attacks, ransomware is unquestionably on the rise.

Ransomware is commonly received by the victim through an unsolicited email from an unknown sender as an attachment or else injected into a user’s browser session through a web browser vulnerability. The widespread success of ransomware is due to several factors, including the fact that it does not require administrative privileges like other malware. In addition, many companies do not maintain current and complete back-ups of their data and assets, which leaves them vulnerable to this type of attack.

As ransomware continues to make headlines in health care, transportation and many other critical business areas, the experts from IBM X-Force Incident Response and Intelligence Services offer a guide for organizations faced with a ransomware infection.

Read the Ransomware Response Guide to learn:

  • How you can protect your critical information and resources;
  • How to identify the specific variant of ransomware and determine how the malware entered the organization;
  • How to contain and remove the ransomware from the infected systems.

Download the complete Ransomware Response Guide

More from Incident Response

Cybersecurity crisis communication: What to do

4 min read - Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook a key part of response preparedness: crisis communication. Because a brand’s reputation often takes a significant hit, a cyberattack can significantly affect the company’s future…

3 recommendations for adopting generative AI for cyber defense

3 min read - In the past eighteen months, generative AI (gen AI) has gone from being the source of jaw-dropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The EU and US are beginning to put new regulatory frameworks in place to manage AI risks.Amid all this commotion, hackers and other cybercriminals are hardly…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today