Ransomware is no longer a threat reserved for large corporations. Small and mid-sized businesses are now the primary target, accounting for over 60 percent of ransomware incidents. The average ransom demand for small businesses has climbed past $100,000, and the total cost of an attack, including downtime, recovery, and reputational damage, is often five to ten times the ransom itself.
Having a documented response plan before an attack happens is the single most important step your business can take to survive a ransomware incident.
Before an Attack: Building Your Defense
Implement a Reliable Backup Strategy
Backups are your insurance policy against ransomware. Follow the 3-2-1 rule: maintain three copies of your data, on two different types of media, with one copy stored offline or off-site. Critically, at least one backup must be air-gapped, meaning it cannot be reached by ransomware that spreads across your network.
Test your backups regularly. A backup that cannot be restored is the same as no backup at all. Schedule quarterly restore tests to verify that critical systems can be recovered within your target timeframe.
Deploy Endpoint Detection and Response
Traditional antivirus is not enough to stop modern ransomware. Endpoint detection and response solutions use behavioral analysis to identify and contain ransomware before it can encrypt your files. Combined with advanced email security, EDR dramatically reduces the likelihood that ransomware ever executes on your systems.
Train Your Employees
Phishing emails remain the top delivery method for ransomware. Regular security awareness training that includes simulated phishing exercises teaches employees to recognize and report suspicious messages before they click.
Document Your Response Plan
A written incident response plan should define:
- Who is on the response team and how to contact them at any hour
- The immediate steps to contain the attack and prevent further spread
- Communication procedures for employees, clients, and law enforcement
- The priority order for restoring systems and data
- Contact information for your cyber insurance carrier and legal counsel
During an Attack: Immediate Response Steps
If ransomware is detected on your network, speed matters. Every minute of delay allows the malware to encrypt more data and spread to more systems.
Step 1: Isolate Affected Systems
Immediately disconnect infected machines from the network. Unplug Ethernet cables and disable Wi-Fi. Do not power off the machines, as forensic data in memory may be needed later. The goal is to stop the ransomware from reaching additional systems, shared drives, and backup locations.
Step 2: Alert Your Response Team
Activate your incident response plan and notify your IT support team, leadership, and cyber insurance carrier. If you have a managed IT provider, they should be your first call as they have the tools and access to coordinate containment rapidly.
Step 3: Assess the Scope
Determine which systems are affected, what data may be encrypted, and whether the attackers have exfiltrated data. This assessment drives your recovery strategy and determines whether you need to notify regulatory authorities or affected individuals.
Step 4: Do Not Pay the Ransom
Law enforcement agencies universally recommend against paying ransoms. Payment does not guarantee you will get your data back, it funds criminal operations, and it marks your business as a willing payer, making you a target for future attacks. If you have reliable backups, you can recover without paying.
After an Attack: Recovery and Hardening
Restore from Clean Backups
Before restoring any data, ensure the ransomware has been completely removed from your environment. Rebuild affected systems from known-clean images and restore data from backups that predate the infection. Verify the integrity of restored data before returning systems to production.
Conduct a Post-Incident Review
After recovery, analyze how the attack occurred and what defenses failed. Common findings include unpatched software, lack of network segmentation, and employees who clicked on phishing links. Use these findings to close gaps and prevent recurrence.
Update Your Security Controls
Apply the lessons from your post-incident review. This may include deploying new security tools, updating compliance controls, adding network segmentation, or enhancing monitoring capabilities.
Frequently Asked Questions
How long does ransomware recovery take?
With tested backups and a documented plan, most small businesses can restore critical operations within 24 to 72 hours. Without backups, recovery can take weeks or may not be possible at all.
Should I report a ransomware attack to law enforcement?
Yes. Report the incident to the FBI Internet Crime Complaint Center. Reporting helps law enforcement track and disrupt ransomware operations, and it may be required by your cyber insurance policy or regulatory obligations.
How can I tell if my business is at risk?
Every business with digital systems is at risk. However, businesses without current backups, without endpoint protection, and without employee security training are at significantly higher risk. A free IT security assessment can identify your specific vulnerabilities.
Prepare Now, Not After It Happens
The time to build a ransomware response plan is before you need one. Atlantic Computer Systems helps Bay Area businesses design, implement, and test comprehensive incident response strategies so that if an attack occurs, your business recovers quickly with minimal damage. Contact us to build your defense today.


