Ransomware Events are on the Rise | Protect your Networks Now (Part 2)

9.9.16 Blog Image - Ransomware

In Part 1 of this post, I noted that ransomware events are occurring much more frequently; as many as 4,000 a day since January 1st of 2016. We took a look at some preventative measures that may protect your company and its network/data against a ransomware event.

This week, I want to outline several actions to consider when an event does take place. Let’s face it, if the ransomware trend continues as it’s going, it’s only a matter of time before your company is impacted as well. Taking a “head in the sand” approach will only ensure lost data, reputation damage and many unchecked expenses.

Consider these actions if ransomware infects your network:

  1. Isolate the infected device — If possible, you’ll want to stop the infection from spreading, so immediately remove the device from the network. Unplug the network cable or turn off the WiFi connection. In addition, power off any other devices on the network until the malware is contained and eliminated.
  2. Alert your IT representative — Your IT staff or service provider will, at the very least, be able to assess the severity of the situation.
  3. Activate your Business Continuity and Disaster Recovery Plans — As recommended in Part 1, you should have a plan to deal with cyber breach events. Your team should be aware of the content, trained to perform the actions and ready to act. The plan should include:
    • Bringing in the IT department or an IT forensics firm to assess and remediate the situation — Remove the malware (if possible), recover data from backups, clean the infected devices and note exactly what data was impacted
    • Updating the C-Suite and Department Managers so they may facilitate their part of the plan
    • Contacting Law Enforcement to report the ransomware event — The decision to pay the ransom should be heavily weighed against remediating the issue in-house, without ever communicating with, or sending a single Bitcoin to the bad guys
  4. Notify your Cyber Insurer — Report the claim to your insurer so they can guide you through the event in accordance with your policy, so you don’t step outside the bounds of your coverage and incur unrecoverable costs.
  5. Upgrade and Update — After the event has been dealt with, make sure that the bad guys cannot reinstate the ransomware and take advantage of the same lax security or uneducated user(s).

Ransomware is, unfortunately, a serious cyber risk that every company with a computer faces. In addition to stopping events, being prepared to handle one that occurs is extremely critical.

Click here to request more information or if you have any questions regarding the implementation of a strategic cyber risk mitigation plan.

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Form Submission Response

Dear [field id="name"],

Thank you for subscribing to The ALS Group articles! We are so excited to have you on board and look forward to providing you with valuable insights, risk management advice, and industry news.

As a subscriber, you will be the first to receive our latest blog posts straight to your inbox. In addition to the blog content, we have a wealth of resources on our website that we believe will be useful to you.

If you have any questions or require any risk management advice, please contact Albert Sica, Managing Principal, at [email protected] or at 732-395-4251.

Thank you,

The ALS Group

Skip to content