Ransomware Response Plan: What to Do Before and After an Attack

Ransomware attack response and recovery

Ransomware is no longer a threat reserved for large corporations. Small and mid-sized businesses are now the primary target, accounting for over 60 percent of ransomware incidents. The average ransom demand for small businesses has climbed past $100,000, and the total cost of an attack, including downtime, recovery, and reputational damage, is often five to ten times the ransom itself.

Having a documented response plan before an attack happens is the single most important step your business can take to survive a ransomware incident.

Before an Attack: Building Your Defense

Implement a Reliable Backup Strategy

Backups are your insurance policy against ransomware. Follow the 3-2-1 rule: maintain three copies of your data, on two different types of media, with one copy stored offline or off-site. Critically, at least one backup must be air-gapped, meaning it cannot be reached by ransomware that spreads across your network.

Test your backups regularly. A backup that cannot be restored is the same as no backup at all. Schedule quarterly restore tests to verify that critical systems can be recovered within your target timeframe.

Deploy Endpoint Detection and Response

Traditional antivirus is not enough to stop modern ransomware. Endpoint detection and response solutions use behavioral analysis to identify and contain ransomware before it can encrypt your files. Combined with advanced email security, EDR dramatically reduces the likelihood that ransomware ever executes on your systems.

Train Your Employees

Phishing emails remain the top delivery method for ransomware. Regular security awareness training that includes simulated phishing exercises teaches employees to recognize and report suspicious messages before they click.

Document Your Response Plan

A written incident response plan should define:

  • Who is on the response team and how to contact them at any hour
  • The immediate steps to contain the attack and prevent further spread
  • Communication procedures for employees, clients, and law enforcement
  • The priority order for restoring systems and data
  • Contact information for your cyber insurance carrier and legal counsel

During an Attack: Immediate Response Steps

If ransomware is detected on your network, speed matters. Every minute of delay allows the malware to encrypt more data and spread to more systems.

Step 1: Isolate Affected Systems

Immediately disconnect infected machines from the network. Unplug Ethernet cables and disable Wi-Fi. Do not power off the machines, as forensic data in memory may be needed later. The goal is to stop the ransomware from reaching additional systems, shared drives, and backup locations.

Step 2: Alert Your Response Team

Activate your incident response plan and notify your IT support team, leadership, and cyber insurance carrier. If you have a managed IT provider, they should be your first call as they have the tools and access to coordinate containment rapidly.

Step 3: Assess the Scope

Determine which systems are affected, what data may be encrypted, and whether the attackers have exfiltrated data. This assessment drives your recovery strategy and determines whether you need to notify regulatory authorities or affected individuals.

Step 4: Do Not Pay the Ransom

Law enforcement agencies universally recommend against paying ransoms. Payment does not guarantee you will get your data back, it funds criminal operations, and it marks your business as a willing payer, making you a target for future attacks. If you have reliable backups, you can recover without paying.

After an Attack: Recovery and Hardening

Restore from Clean Backups

Before restoring any data, ensure the ransomware has been completely removed from your environment. Rebuild affected systems from known-clean images and restore data from backups that predate the infection. Verify the integrity of restored data before returning systems to production.

Conduct a Post-Incident Review

After recovery, analyze how the attack occurred and what defenses failed. Common findings include unpatched software, lack of network segmentation, and employees who clicked on phishing links. Use these findings to close gaps and prevent recurrence.

Update Your Security Controls

Apply the lessons from your post-incident review. This may include deploying new security tools, updating compliance controls, adding network segmentation, or enhancing monitoring capabilities.

Frequently Asked Questions

How long does ransomware recovery take?

With tested backups and a documented plan, most small businesses can restore critical operations within 24 to 72 hours. Without backups, recovery can take weeks or may not be possible at all.

Should I report a ransomware attack to law enforcement?

Yes. Report the incident to the FBI Internet Crime Complaint Center. Reporting helps law enforcement track and disrupt ransomware operations, and it may be required by your cyber insurance policy or regulatory obligations.

How can I tell if my business is at risk?

Every business with digital systems is at risk. However, businesses without current backups, without endpoint protection, and without employee security training are at significantly higher risk. A free IT security assessment can identify your specific vulnerabilities.

Prepare Now, Not After It Happens

The time to build a ransomware response plan is before you need one. Atlantic Computer Systems helps Bay Area businesses design, implement, and test comprehensive incident response strategies so that if an attack occurs, your business recovers quickly with minimal damage. Contact us to build your defense today.

Related articles

Partner with Us for Comprehensive IT

We're happy to answer any questions you may have and help you determine which of our services best fit your needs.

Call us at: 1-650-300-7557

Your benefits:

Client-oriented approach
Proven results and reliability
Industry-leading technology
Transparent pricing, no surprises

What happens next?

1We schedule a call at your convenience
2We do a discovery and consulting meeting
3We prepare a proposal tailored to your needs

Schedule a Free Consultation

Fill out the form and we'll be in touch soon.