{"id":516,"date":"2023-09-19T13:41:52","date_gmt":"2023-09-19T13:41:52","guid":{"rendered":"https:\/\/dev.cryptoloc.au\/?p=516"},"modified":"2023-09-25T01:04:00","modified_gmt":"2023-09-25T01:04:00","slug":"what-to-do-in-the-event-of-a-breach","status":"publish","type":"post","link":"https:\/\/127.0.0.1\/what-to-do-in-the-event-of-a-breach\/","title":{"rendered":"What to do in the event of a breach"},"content":{"rendered":"
\n

What to do in the event of a breach<\/h1>\n<\/div>\n
Recovery from a ransomware attack can be a challenging and sometimes costly process. The recovery process can vary dramatically depending on whether you have no protection at all versus having backups and a file recovery system in place. Here\u2019s a comparison:<\/div>\n
Without Cryptoloc Protection<\/div>\n
    \n
  • \n

    Identification<\/h3>\n

    Step 1<\/p>\n

    The first step is to recognize that you\u2019ve been hit by ransomware. This could be through a ransom note displayed on your screen or by finding encrypted files.<\/div>\n<\/li>\n
  • \n

    Isolation<\/h3>\n

    Step 2<\/p>\n

    Once identified, you should immediately disconnect the affected devices from the network to prevent the spread of ransomware to other connected devices.<\/div>\n<\/li>\n
  • \n

    Assessment<\/h3>\n

    Step 3<\/p>\n

    Determine the extent of the damage. Which files have been encrypted? What kind of ransomware is it?<\/div>\n<\/li>\n
  • \n

    Decryption Options<\/h3>\n

    Step 4<\/p>\n

    Some ransomware variants have publicly available decryption tools thanks to cybersecurity researchers. It\u2019s worth checking if a tool is available for your ransomware variant.<\/div>\n<\/li>\n
  • \n

    Paying the Ransom<\/h3>\n

    Step 5<\/p>\n

    This is a controversial step. The Australian Cyber Security Centre strongly advises against paying a ransom. Paying the ransom doesn\u2019t guarantee that you\u2019ll get your files back, and it encourages and funds the cybercriminals. However, for some businesses or individuals, it might be seen as the only option, especially if the data is critical and irreplaceable.<\/div>\n<\/li>\n
  • \n

    Clean-Up<\/h3>\n

    Step 6<\/p>\n

    If you decide not to pay or even after retrieving your files (if the attackers keep their promise), you\u2019ll need to clean the affected system(s). This typically involves wiping the system and reinstalling the operating system and applications from scratch.<\/div>\n<\/li>\n
  • \n

    Data Loss<\/h3>\n

    Step 7<\/p>\n

    If you have no backups and can\u2019t decrypt the data, you may have to accept that you have permanently lost all your data.<\/div>\n<\/li>\n
  • \n

    Post-Incident Analysis and Prevention<\/h3>\n

    Step 7<\/p>\n

    Understand how the attack happened and implement learnings from your experience to be able to prevent future incidents and recover faster and easier.<\/div>\n<\/li>\n<\/ul>\n
    With Cryptoloc Protection<\/div>\n
      \n
    • \n

      Identification<\/h3>\n

      Step 1<\/p>\n

      The first step is to recognize that you\u2019ve been hit by ransomware. This could be through a ransom note displayed on your screen or by finding encrypted files.<\/div>\n<\/li>\n
    • \n

      Assessment<\/h3>\n

      Step 2<\/p>\n

      You\u2019d still assess the damage, but you can access of your files live on the Cryptoloc Cloud to view your incident response plan or carry on normal business operations.<\/div>\n<\/li>\n
    • \n

      Restoration<\/h3>\n

      Step 3<\/p>\n

      Restore the infected devices and with Cryptoloc backup and file recovery system in place, you can restore your system and user files from any point before the ransomware attack. This significantly reduces the downtime and loss.<\/div>\n<\/li>\n
    • \n

      Validation<\/h3>\n

      Step 4<\/p>\n

      Using a file-based backup system ensures that the backups being restored are clean and free of ransomware or any other malware.<\/div>\n<\/li>\n
    • \n

      Post-Incident Analysis and Prevention<\/h3>\n

      Step 5<\/p>\n

      Analyse the breach and put in place any preventative measures identified. Having a backup is essential, but prevention is always better. Check to ensure all essential files and data are under Cryptoloc\u2019s protection.<\/div>\n<\/li>\n
    • \n

      Regular Backup Checks<\/h3>\n

      Step 6<\/p>\n

      Access the Cryptoloc Cloud and check the status of all your backups on a single easy-to-view page to confirm their successful execution.<\/div>\n<\/li>\n<\/ul>\n
      \n

      Having a robust backup and recovery system is one of the most effective measures against ransomware. Regular backups can save you significant time, money, and stress in the event of an attack. Additionally, always ensure to keep your software updated, use a good security solution, and train employees or users about the risks of phishing emails and suspicious attachments.<\/span><\/p>\n<\/div>\n

      \n<\/div>\n


      \n<\/p>\n","protected":false},"excerpt":{"rendered":"

      What to do in the event of a breach Recovery from a ransomware attack can be a challenging and sometimes costly process. The recovery process can vary dramatically depending on whether you have no protection at all versus having backups and a file recovery system in place. Here\u2019s a comparison: Without Cryptoloc Protection Identification Step […]<\/p>\n","protected":false},"author":3,"featured_media":564,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/516"}],"collection":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=516"}],"version-history":[{"count":19,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/516\/revisions"}],"predecessor-version":[{"id":1008,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/516\/revisions\/1008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media\/564"}],"wp:attachment":[{"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}