IBM Security X-Force saw a rapid increase in victims of ransomware, commonly delivered via an unsolicited email as an attachment.
Knowing the incidents you are most likely to encounter based on operating sector, systems in use and applicable key risk indicators is critical.
Proactive end-user education is key; a well-developed and rehearsed incident response plan can save time and money.
Discovering ransomware infection can vary, from being unable to access specific files or services to receiving a ransom note.
It is essential to identify the ransomware variant and determine how it entered the organization to better fight it and prevent the spread.
Staff must identify all infected resources, disable and disconnect them, remove ransomware and rebuild systems with a trusted source.
Afterwards, organizations must patch vulnerabilities to prevent re-exploitation and restore data using internal backup infrastructure.
To learn how to protect your organization, download the complete guide.