{"id":1677,"date":"2016-09-28T19:27:38","date_gmt":"2016-09-28T19:27:38","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1677"},"modified":"2021-07-07T04:29:23","modified_gmt":"2021-07-07T08:29:23","slug":"what-to-do-during-a-ransomware-attack","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1677","title":{"rendered":"What To Do After a Ransomware Attack"},"content":{"rendered":"<p>The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike.\u00a0 We\u2019ve discussed some of these <a href=\"https:\/\/tsisupport.com\/tsistaging\/news\/tsi-security-warning-update-apple-users\/\">common types of intrusions<\/a> before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount of damage it can cause to your machine or business infrastructure.<\/p>\n<p>The aftermath of a ransomware attack can be catastrophic to any organization, often resulting in the loss of sensitive or proprietary information, not to mention the financial losses incurred from the restoration of files and harm to reputation. However, there are certain tips and tricks you can use to hopefully minimize the reach of an attack if you suspect one has occurred.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8470\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/How-It-Works.jpg\" alt=\"\" width=\"400\" height=\"429\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/How-It-Works.jpg 400w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/How-It-Works-280x300.jpg 280w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/p>\n<p><span style=\"color: #800000;\"><strong>How it Works:<\/strong><\/span>\u00a0\u00a0Ransomware attacks generally start with an e-mail addressed to a recipient from a seemingly trusted source, with an attachment or URL provided. Upon opening what appears to be a legitimate attachment, such as an invoice or electronic fax, or clicking on the URL link, the ransomware code gets deployed onto your local machine.<\/p>\n<p>After the code is deployed, the infection begins to encrypt files and folders on your local drives, any attached drives, backups, and potentially throughout the business network your machine is attached to.<\/p>\n<p>Most users only become aware of the infection when they notice files are renamed, are unable to open a file, and\/or receive a message with instructions to pay a ransom to unlock the data, often through an untraceable currency like Bitcoin. Even when an organization agrees to pay the ransom, there is no guarantee the perpetrator will actually offer the key to unencrypt your files or desist from extorting your network again.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8471\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/What-to-Do-Ransomware.jpg\" alt=\"\" width=\"400\" height=\"400\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/What-to-Do-Ransomware.jpg 400w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/What-to-Do-Ransomware-300x300.jpg 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/What-to-Do-Ransomware-150x150.jpg 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/p>\n<p><span style=\"color: #800000;\"><strong>Tips for Minimizing the Effects: <\/strong><\/span>in the event of a suspected attack, we recommend:<\/p>\n<ol class=\"OLStyle\">\n<li>Immediately disconnecting from the local area network (LAN) and\/or any other storage devices connected to your machine.<\/li>\n<li>If you have a clean system restore point, you may attempt to go back to that data to see if it will work.<\/li>\n<li>If you have a recent backup you can format and reinstall Windows, then use your backed up data to make a fresh start.<\/li>\n<li>Try to identify the type of Ransomware that has infected your machine. With nearly 200 different forms of attack to date, identifying the ailment can help to identify a resolution.\u00a0 You can try a free service like <a href=\"https:\/\/id-ransomware.malwarehunterteam.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ID-Ransomware<\/a> to assist you in these efforts.<\/li>\n<li>If you are successful in identifying the type of ransomware that has infected your machine, check to see if there is an <a href=\"https:\/\/id-ransomware.malwarehunterteam.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">available decrypt tool<\/a>.<\/li>\n<li>Finally, it is recommended you report the ransomware attack to the local cybercrime division of your <a href=\"http:\/\/www.policelocator.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">police department,<\/a> <a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\" target=\"_blank\" rel=\"noopener noreferrer\">FBI office<\/a>. You may also follow the FBI\u2019s recommendation to file a complaint through their Internet Crime Complaint Center.<\/li>\n<\/ol>\n<p><span style=\"color: #800000;\"><strong>From the Experts: <\/strong><\/span>Unfortunately, ransomware continues to evolve and become more sophisticated the more it is proven to be profitable.\u00a0 There is no single tool of proven process to eliminate this very real threat to your organization. The best approach involves proper planning, including implementing a proper Backup &amp; Disaster Recovery strategy, and educating users on the best practices for identifying a suspicious message.\u00a0 Of course, this is all in addition to having multi-layered protection for your organization; including enterprise level Anti-Virus, Anti-Malware, and Firewall which are properly configured. These are all a key component of having a trusted IT service provider who can minimize these vulnerabilities.\u00a0 To learn how we can help protect your organization, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike.\u00a0 We\u2019ve discussed some of these common types of intrusions before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[173,19,107,169,170,195],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Protection | What To Do After a Ransomware Attack | TSI<\/title>\n<meta name=\"description\" content=\"Learn about what to do after a ransomware attack, how to get the best ransomware protection and how you can minimize the damage caused by them.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Protection | What To Do After a Ransomware Attack | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn about what to do after a ransomware attack, how to get the best ransomware protection and how you can minimize the damage caused by them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1677\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-28T19:27:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T08:29:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Minimizing-Effects-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1677\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1677\",\"name\":\"Ransomware Protection | What To Do After a Ransomware Attack | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1677#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1677#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Minimizing-Effects-1140x380-1.png\",\"datePublished\":\"2016-09-28T19:27:38+00:00\",\"dateModified\":\"2021-07-07T08:29:23+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Learn about what to do after a ransomware attack, how to get the best ransomware protection and how you can minimize the damage caused by them.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1677#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1677\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1677#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Minimizing-Effects-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Minimizing-Effects-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1677#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What To Do After a Ransomware Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Protection | What To Do After a Ransomware Attack | TSI","description":"Learn about what to do after a ransomware attack, how to get the best ransomware protection and how you can minimize the damage caused by them.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ransomware Protection | What To Do After a Ransomware Attack | TSI","og_description":"Learn about what to do after a ransomware attack, how to get the best ransomware protection and how you can minimize the damage caused by them.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1677","og_site_name":"TSI Support","article_published_time":"2016-09-28T19:27:38+00:00","article_modified_time":"2021-07-07T08:29:23+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Minimizing-Effects-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1677","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1677","name":"Ransomware Protection | What To Do After a Ransomware Attack | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1677#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1677#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Minimizing-Effects-1140x380-1.png","datePublished":"2016-09-28T19:27:38+00:00","dateModified":"2021-07-07T08:29:23+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Learn about what to do after a ransomware attack, how to get the best ransomware protection and how you can minimize the damage caused by them.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1677#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1677"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1677#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Minimizing-Effects-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/09\/Minimizing-Effects-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1677#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"What To Do After a Ransomware Attack"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1677"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1677"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1677\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8469"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}