Incident response planning: who, what, why and when
In this guide, we walk you through how to prepare for a cyber incident such as a ransomware attack.
Our client portal provides all the tools you need to create, view or update your support requests.
For urgent IT support during business hours, or if you suspect anything suspicious call 01314528444 for the fastest response.
If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.
6 min read
itfoundations
Originally posted on October 11, 2024
Last updated on October 11, 2024
If you think you have been attacked with ransomware. Don't panic Here's a summary of the immediate actions you need to take:
You should always contact your insurer before doing anything else as most insurance companies have specialist crisis management teams to deal with events like the one you're currently experiencing. They will guide you and your IT team (regardless of whether they are an internal team or an external partner) through the steps that they want you to take.
There are two reasons why this is so important:
Now that we've covered the basic emergency first steps, we should probably take a step back and explain ransomware before we go through the next steps you'll need to take to get back up and running.
Ransomware is a type of malicious software designed to block access to your computer systems or data until a ransom is paid. Software infecting your computers or servers encrypts your data rendering it in accessible. A message will usually pop up on your screens, and you may receive a phone call either offering to unblock your device or giving you instructions to pay a ransom to have your data released. If you get such a call the National Centre for Cyber Security says to hang up.
More often than not, your data won't be released even if you do pay a ransom, or the attacker will release it, only to encrypt it again a short time later before demanding more money. This is where incident response plans and backups come into their own.
These attacks can be devastating, leading to significant financial losses and operational disruption. Knowing how to identify and respond to ransomware can make all the difference in mitigating its impact.
Recognising a ransomware attack early can help you respond more effectively. It is possible to spot the early signs of an attack before you get to the lock screen demanding a ransom.
Here are some common signs that your system may have been compromised:
After following the steps at the top of this article, and subject to the instructions of your insurer you should continue to follow the steps below.
If you haven't got an incident response plan to help guide you through this process then you need to quickly seek expert advice.
Contact your lawyers to discuss the attack so that they are kept fully abreast of the situation as it unfolds.
You also need to quickly consider your communications around the incident, both internally and externally.
You will want to brief you staff on the situation and give them very clear instructions about what they can and cannot say to anyone outside the organisation. Your lawyers will be able to assist you with providing a script that aims to protect you and your customers.
Providing staff with a script will help re-assure them and can avoid people feeling pressured to say something more. This is especially true in the early stages of an attack while you are still trying to understand what is going on.
At this stage, you, and likely your insurer, will want to conduct an investigation to identify the extent of the damage and the cause. You need to understand whether data has simply been encrypted or whether it has been stolen (exfiltrated in technical parlance). The latter has significant implications for you, your customers, and for regulators.
This is done primarily through analysing logs in your system. These are records that are automatically generated and record actions taken by various systems in your computer and network. Your team may also look on the dark web to see if any of your data has been immediately made available online in known data breach repositories.
Identifying the source of your attack (the vector) and the tool used is equally important. You need to understand how the attacker accessed your system and how they encrypted it. You don't want to re-build your systems only to find the weakness is saved in your backups and lets the attacker lock everything up again. Once the vector and tool have been identified, the weakness can be addressed, any malicious software can be cleansed and then you can think about beginning to rebuild.
If you are based in, or do business with the UK and identify that a data breach contains personally identifiable information that poses a risk to people’s rights and freedoms then you must report the breach to the Information Commissioners Office within 72 hours. If the stolen data is likely to be high risk to the individuals affected (credit card details, passport number etc) then you must notify them without undue delay.
You should also report the ransomware attack to the police, although you are not obliged to. The act of hacking into your system and encrypting your data is a criminal offence, perpetrated by the attacker against you.
Once the immediate threat is contained, it’s time to focus on recovery. Here are the steps to take:
This stage can take a long time, particularly if systems need to be re-built from scratch. Identify your priority systems like payroll that you need to be up and running first, and then work your way methodically through everything until you have a fully restored service.
The above steps help if you have suffered a ransomware attack but as any doctor will tell you, prevention is always better than cure.
There are some simple things that you can do to reduce the likelihood that you will fall victim to a ransom attack (and to minimise the damage if you do).
Ransomware attacks are a serious threat, but with the right knowledge and preparation, you can protect your business and respond effectively if an attack occurs. Remember, the key steps are to contact your insurance company, notify your IT team, isolate the infection, avoid paying the ransom, and focus on recovery and prevention. By following these guidelines, you can minimise the impact of ransomware and keep your business running smoothly.
If you would like to discuss improving your business' cyber security then get in touch with us today. We are based in Edinburgh but provide IT support across Scotland and northern England.
In this guide, we walk you through how to prepare for a cyber incident such as a ransomware attack.
3 min read
No business wants to suffer a data breach. But unfortunately, in today’s environment, it’s difficult to completely avoid them. Approximately 83% of...
Cyber security insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large...