{"id":1166,"date":"2021-02-23T22:01:49","date_gmt":"2021-02-23T22:01:49","guid":{"rendered":"https:\/\/wwfins.com\/?p=1166"},"modified":"2021-02-23T22:01:49","modified_gmt":"2021-02-23T22:01:49","slug":"ransomware-alert-what-to-do-if-your-systems-are-taken-hostage","status":"publish","type":"post","link":"https:\/\/wwfins.com\/?p=1166","title":{"rendered":"Ransomware Alert: What to Do if Your Systems Are Taken Hostage"},"content":{"rendered":"<p>It\u2019s one of the scariest risks a business owner can face. Rogue hackers gain access to your computer system and data, lock you out, and hold your data hostage until you pay a ransom.<\/p>\n<p>It sounds like science fiction. But ransomware attacks have grown into a global threat, with devastating consequences for the victims. They disrupt operations, compromise data, jeopardize customers and suppliers, and create a serious financial burden. And not only large corporations and government agencies are at risk. Midsized businesses, smaller businesses, and even home networks are increasingly being targeted. According to FBI <a href=\"https:\/\/www.justice.gov\/criminal-ccips\/file\/872771\/download\" target=\"_blank\" rel=\"noopener noreferrer\">statistics<\/a>, an average of 4,000 ransomware incidents occur every day, at an annual cost of $1 billion.<\/p>\n<p><strong>How Does Ransomware Work? <\/strong><\/p>\n<p>Hackers find a vulnerability in an organization\u2019s system and install malware, virtually taking control of their systems and \u201cstealing\u201d their files. In many cases, hackers gain access to your systems when employees unknowingly click on an email link.<\/p>\n<p>The hackers then demand a monetary ransom to return or restore the files. They might ask for a nominal amount, or they might demand millions of dollars, and business owners are forced to either pay or figure out how to recover their systems and data on their own.<\/p>\n<p><strong>What If It Happens to Your Company?<\/strong><\/p>\n<p>If the unthinkable happens, how you respond is critical. Never try to handle an incident alone. The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing &amp; Analysis Center (MS-ISAC) have released an in-depth <a href=\"https:\/\/www.cisa.gov\/publication\/ransomware-guide\" target=\"_blank\" rel=\"noopener noreferrer\">guide<\/a> with recommendations for reducing your risks and a step-by-step checklist for how to respond. Here are some basic steps to take if it happens to you:<\/p>\n<ul>\n<li><strong>Report It. <\/strong>Any ransomware attack should be reported to the FBI. Contacting the local field office and the Bureau\u2019s Internet Crime Complaint Center.<\/li>\n<li><strong>Contain It<\/strong>. Determine how widespread the attack is and which systems are impacted, and immediately isolate those systems. Work with your IT team to determine the appropriate actions, e.g., taking the network offline, disconnecting individual systems, or unplugging or shutting down devices. Be careful to preserve any evidence for law enforcement to investigate.<\/li>\n<li><strong>Go stealth<\/strong>. After an attack, hackers often monitor an organization\u2019s communications and response. Avoid tipping off the hackers to your mitigation efforts. Communicate with all stakeholders about the attack through phone calls and other off-network communications.<\/li>\n<li><strong>Call Your ISP<\/strong>. Even if the breach wasn\u2019t at your internet service provider\u2019s level, hackers had to go through them to get to you, so your service provider needs to know so they can take action to protect other customers.<\/li>\n<li><strong>Restore Backups<\/strong>. You <em>do<\/em> have backups in a safe location, don\u2019t you? Hopefully, you have a robust backup system and can restore company files while simultaneously handling the ransomware situation. You may need to work with an IT company to keep your backups safe from the hackers.<\/li>\n<li><strong>Contact Stakeholders. <\/strong>For ethical, safety, and liability reasons, it\u2019s important to let your customers, investors, and other stakeholders know quickly if the company\u2019s data has been compromised.<\/li>\n<\/ul>\n<p><strong>Minimize Your Risk<\/strong><\/p>\n<p>Before your organization becomes a victim of ransomware, take measures to reduce your exposure:<\/p>\n<ul>\n<li>Stay informed of the latest cyber threats with sources such as <a href=\"https:\/\/www.bleepingcomputer.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">BleepingComputer.com<\/a>, your local authorities, your internet service provider, and the FBI.<\/li>\n<li>Have a cyber incident response plan that includes a ransomware response checklist.<\/li>\n<li>Ensure you have robust antivirus software installed and up to date across all endpoints.<\/li>\n<li>Provide frequent security awareness training to employees on phishing tactics and other cyber dangers.<\/li>\n<li>Keep data backups in the cloud and\/or at a separate location from your main facility.<\/li>\n<\/ul>\n<p>The federal government also offers a <a href=\"https:\/\/www.justice.gov\/criminal-ccips\/file\/872771\/download\" target=\"_blank\" rel=\"noopener noreferrer\">guide<\/a> with best practices and mitigation strategies to help private entities and government agencies prevent and respond to ransomware attacks.<\/p>\n<p><strong>Ready to Talk About Cyber Insurance? <\/strong><\/p>\n<p>Wilson, Washburn &amp; Forster is a boutique independent insurance agency that has been in business since 1961. We have expertise and connections in the commercial and cyber insurance markets and can also help customize the right mix of coverage to protect against the unique exposures of your business. You will find that our experience, claims handling, service, and community commitment is unrivaled.<\/p>\n<p><strong>Contact us today at 786-454-8384 for a complimentary analysis of your current insurance program by an insurance specialist in this field.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s one of the scariest risks a business owner can face. Rogue hackers gain access to your computer system and data, lock you out, and hold your data hostage until you pay a ransom.<\/p>\n<p>It sounds &#8230;<\/p>\n","protected":false},"author":2,"featured_media":1167,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[41,42],"_links":{"self":[{"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/posts\/1166"}],"collection":[{"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1166"}],"version-history":[{"count":2,"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/posts\/1166\/revisions"}],"predecessor-version":[{"id":1169,"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/posts\/1166\/revisions\/1169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=\/wp\/v2\/media\/1167"}],"wp:attachment":[{"href":"https:\/\/wwfins.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wwfins.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}