Cyber Attack
Recovery Guide
10 actions to take immediately
#LetsDoSomething
Be prepared to take the right steps, in the right order.
When your data is held for ransom, time is critical. Taking
these 10 actions in this order will help you through the most
critical responses when you are under a ransomware attack.
CONTACT YOUR I.T. DEPARTMENT
The first step in recovering your data is to alert your IT department. Before you take any action,
let the person who manages your network know that you have received a ransomware message.
You should not forward or reply to the message, or engage with the hacker in any way.
DISCONNECT THE AFFECTED COMPUTER
Ransomware is a virus that can spread throughout your network, infecting other computers and even
backup files. Disconnecting the computer from the Internet, by unplugging it, will stop the virus from
spreading to other computers and taking down the internal network.
DOCUMENT ALL DECISIONS AND ACTIONS
Every cyber attack or data breach is unique. It’s important to capture what you did and how you
responded (e.g., clicked on an email “like” or replied to a hacker’s request) to help the IT forensics
team understand what has occurred, what was done and who was involved. Keeping track of dates,
times and responses is critical to a thorough recovery.
NOTIFY YOUR INCIDENT RESPONSE TEAM AND SENIOR LEADERSHIP
Every company should have a team of specialists who are prepared to handle a cyber attack.
These can include employees from the IT, communications, legal and accounting departments, as
well as the board of directors. The incident response team should be able to quickly engage your
company’s incident response plan and carry out their duties as assigned. If you don’t have an
incident response team or plan, take the time to develop one before an attack occurs.
CONTACT YOUR INSURANCE BROKER
Your insurance broker can help guide you through a successful recovery and claims process.
Under your cyber insurance policy, you will most likely have access to experts who understand the
recovery process and ensure you have the resources to comply with notification obligations to
affected parties, forensic investigations and public disclosures.
1
2
3
4
5
CALL YOUR PRIVACY ATTORNEY
Your privacy attorney is a key part of maintaining compliance with federal and state regulations that
require you to notify anyone whose data was affected by the breach. Their guidance can help you
understand your obligations for communication, credit monitoring and regulatory compliance.
ENGAGE I.T. FORENSICS TO INVESTIGATE THE CRIME
Identifying the source of the attack is a major component of data recovery. By tracking the virus path,
the IT forensics team can show what files have been compromised, the length of time your system was
compromised, and how extensive the damage may be. Oftentimes, a ransomware event occurs weeks
or months after the hack. The forensics team will be able to assess the length of time the hacker
has been in your system and the amount of damage to your data.
COMMUNICATE WITH AFFECTED INDIVIDUALS
Notification laws require that when you have a data breach, the people affected must be notified.
Sharing the details of the attack, how you addressed it and what you plan to do going forward is an
important part of external communication. Affected parties can include your clients or employees.
It may also be necessary to hire a PR firm, and even a call center, to manage outside inquiries.
ACTIVATE YOUR BACKUP FILES/DISASTER RECOVERY PLAN
You can possibly avoid paying a ransom if you regularly back up your data and test it to ensure that
the backup works properly. When a ransomware attack occurs, your files are encrypted and can only
be released with a decryption code provided by the hacker. If you can remove the corrupt data from
your network and ensure that your backup system is not compromised, you may be able to avoid
paying the ransom altogether simply by reinstalling your backup files.
CALL LAW ENFORCEMENT
A ransomware attack is a crime and should be reported to the authorities. They will conduct their own
investigation into the attack, which will be reported and tracked appropriately.
6
7
8
9
10
Looking out for you.
Looking ahead for you.
Now you know the critical response steps
to take in the event of a ransomware attack.
But remember, every organization is different,
with unique vulnerabilities and needs. You may
need to consider alternative or additional steps
to limit damages and enable recovery.
Let’s work together to develop
a robust cyber insurance program.
Contact a HUB advisor today at:
hubinternational.com/cybersecurity
hubinternational.com© 2017 HUB International Limited. All rights reserved.

More Related Content

PPTX
Website security
PPTX
Distribution Industry: What is Ransomware and How Does it Work?
PPTX
External Attacks Against Pivileged Accounts
PDF
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
PPTX
Ransomware: A Perilous Malware
PPTX
Malicion software
PDF
Anatomy of a cyber-attack
PDF
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
Website security
Distribution Industry: What is Ransomware and How Does it Work?
External Attacks Against Pivileged Accounts
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
Ransomware: A Perilous Malware
Malicion software
Anatomy of a cyber-attack
How Federal Agencies Can Build a Layered Defense for Privileged Accounts

What's hot (20)

PDF
Triangulum - Ransomware Evolved - Why your backups arent good enough
PDF
Enemy from Within: Managing and Controlling Access
PPTX
Health information security 3 vulnerability threat and risk
PDF
Ransomware and tips to prevent ransomware attacks
PPTX
Security in network computing
PDF
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
PPTX
Health information security 2 : Basic concepts
PDF
What is Ransomware? A Quick Guide
PDF
Threat and Mitigation
PPTX
Cyber Attacks
PDF
Ransomware attacks
PPTX
Detecting and mitigating cyber threats and attacks1
PDF
What is Ransomware?
PDF
Nonprofit Cybersecurity Incident Report
PPTX
Cybersecurity
PPTX
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
PPTX
3 Tips to Stay Safe Online in 2017
PDF
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
PPTX
When Ransomware Attacks: Emergency Measures to Save Your Business
Triangulum - Ransomware Evolved - Why your backups arent good enough
Enemy from Within: Managing and Controlling Access
Health information security 3 vulnerability threat and risk
Ransomware and tips to prevent ransomware attacks
Security in network computing
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Health information security 2 : Basic concepts
What is Ransomware? A Quick Guide
Threat and Mitigation
Cyber Attacks
Ransomware attacks
Detecting and mitigating cyber threats and attacks1
What is Ransomware?
Nonprofit Cybersecurity Incident Report
Cybersecurity
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
3 Tips to Stay Safe Online in 2017
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
When Ransomware Attacks: Emergency Measures to Save Your Business
Ad

Similar to CYBER ATTACK RECOVERY GUIDE (20)

PPTX
Recover your files from Ransomware - Ransomware Incident Response by Tictac
PPTX
Aftermath Review for BSI Ransomware.pptx
PDF
Ransomware attack
PPTX
A Comprehensive Guide on How to Recover from a Ransomware Attack
PDF
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
PDF
FBI Memo on How to Protect Yourself from Ransomware
PPTX
2022 Rea & Associates' Cybersecurity Conference
 
PDF
Ransomware Prevention Guide
PPTX
Recovering from a Cyber Attack
PDF
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
PDF
FBI Ransomware Report
PDF
Malware Attacks | How To Defend Organizations From It?
PPTX
How to beat ransomware
PDF
NCERT Ransomeware and malware attacks.pdf
PDF
How To Prevent Ransomware
PDF
Incident Management for Ransomware Attacks Best Practices for Response and Re...
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PDF
How to recover from your next data breach
PDF
Should You Pay Ransomware.pdf
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Aftermath Review for BSI Ransomware.pptx
Ransomware attack
A Comprehensive Guide on How to Recover from a Ransomware Attack
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
FBI Memo on How to Protect Yourself from Ransomware
2022 Rea & Associates' Cybersecurity Conference
 
Ransomware Prevention Guide
Recovering from a Cyber Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
FBI Ransomware Report
Malware Attacks | How To Defend Organizations From It?
How to beat ransomware
NCERT Ransomeware and malware attacks.pdf
How To Prevent Ransomware
Incident Management for Ransomware Attacks Best Practices for Response and Re...
CyberCare Pro - Cybersecurity for SME's updated.pptx
How to recover from your next data breach
Should You Pay Ransomware.pdf
Ad

More from MUHAMMAD HUZAIFA CHAUDHARY (20)

PDF
TOPIC : " CONTROLS " - MIND MAPPING STUDY TECHNIQUE
PDF
Computers In Auditing - MIND MAPPING STUDY TECHNIQUE
PDF
Communication With Previous Auditor - MIND MAPPING STUDY TECHNIQUE
PDF
Communication Protocols - MIND MAPPING STUDY TECHNIQUE
PDF
Client Acceptance - MIND MAPPING STUDY TECHNIQUE
PDF
I as Substantive Procedures - MIND MAPPING STUDY TECHNIQUE
PDF
Going Concern Basis - MIND MAPPING STUDY TECHNIQUE
PDF
TOPIC ; " FLOW CHART " - MIND MAPPING STUDY TECHNIQUE
PDF
External Confirmation - MIND MAPPING STUDY TECHNIQUE
PDF
TOPIC :- " EXPERT " ---- MIND MAPPING STUDY TECHNIQUE
PDF
Equity Substantive Procedures - MIND MAPPING STUDY TECHNIQUE
PDF
Engagement Withdrawal - MIND MAPPING STUDY TECHNIQUE
PDF
Emphasis Of Matter Paragraph - MIND MAPPING STUDY TECHNIQUE
PDF
EDI SYSTEMS - MIND MAPPING STUDY TECHNIQUES
PDF
Debtors Substantive Procedures - MIND MAPPING STUDY TECHNIQUE
PDF
Opinion Modification - MIND MAPPING STUDY TECHNIQUE
PDF
ONLINE SYSTEMS - MIND MAPPING STUDY TECHNIQUE
PDF
Niventory Count - MIND MAPPING STUDY TECHNIQUE
PDF
Ncl Substantive Procedures - MIND MAPPING STUDY TECHNIQUE
PDF
Nca ta Substantive Procedure(s) - MIND MAPPING STUDY TECHNIQUE
TOPIC : " CONTROLS " - MIND MAPPING STUDY TECHNIQUE
Computers In Auditing - MIND MAPPING STUDY TECHNIQUE
Communication With Previous Auditor - MIND MAPPING STUDY TECHNIQUE
Communication Protocols - MIND MAPPING STUDY TECHNIQUE
Client Acceptance - MIND MAPPING STUDY TECHNIQUE
I as Substantive Procedures - MIND MAPPING STUDY TECHNIQUE
Going Concern Basis - MIND MAPPING STUDY TECHNIQUE
TOPIC ; " FLOW CHART " - MIND MAPPING STUDY TECHNIQUE
External Confirmation - MIND MAPPING STUDY TECHNIQUE
TOPIC :- " EXPERT " ---- MIND MAPPING STUDY TECHNIQUE
Equity Substantive Procedures - MIND MAPPING STUDY TECHNIQUE
Engagement Withdrawal - MIND MAPPING STUDY TECHNIQUE
Emphasis Of Matter Paragraph - MIND MAPPING STUDY TECHNIQUE
EDI SYSTEMS - MIND MAPPING STUDY TECHNIQUES
Debtors Substantive Procedures - MIND MAPPING STUDY TECHNIQUE
Opinion Modification - MIND MAPPING STUDY TECHNIQUE
ONLINE SYSTEMS - MIND MAPPING STUDY TECHNIQUE
Niventory Count - MIND MAPPING STUDY TECHNIQUE
Ncl Substantive Procedures - MIND MAPPING STUDY TECHNIQUE
Nca ta Substantive Procedure(s) - MIND MAPPING STUDY TECHNIQUE

Recently uploaded (20)

PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Getting Started with Data Integration: FME Form 101
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
The various Industrial Revolutions .pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
DOCX
search engine optimization ppt fir known well about this
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
Web Crawler for Trend Tracking Gen Z Insights.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Chapter 5: Probability Theory and Statistics
Getting Started with Data Integration: FME Form 101
NewMind AI Weekly Chronicles – August ’25 Week III
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
The various Industrial Revolutions .pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Module 1.ppt Iot fundamentals and Architecture
Zenith AI: Advanced Artificial Intelligence
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Assigned Numbers - 2025 - Bluetooth® Document
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Getting started with AI Agents and Multi-Agent Systems
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
search engine optimization ppt fir known well about this
A contest of sentiment analysis: k-nearest neighbor versus neural network

CYBER ATTACK RECOVERY GUIDE

  • 1. Cyber Attack Recovery Guide 10 actions to take immediately #LetsDoSomething
  • 2. Be prepared to take the right steps, in the right order. When your data is held for ransom, time is critical. Taking these 10 actions in this order will help you through the most critical responses when you are under a ransomware attack. CONTACT YOUR I.T. DEPARTMENT The first step in recovering your data is to alert your IT department. Before you take any action, let the person who manages your network know that you have received a ransomware message. You should not forward or reply to the message, or engage with the hacker in any way. DISCONNECT THE AFFECTED COMPUTER Ransomware is a virus that can spread throughout your network, infecting other computers and even backup files. Disconnecting the computer from the Internet, by unplugging it, will stop the virus from spreading to other computers and taking down the internal network. DOCUMENT ALL DECISIONS AND ACTIONS Every cyber attack or data breach is unique. It’s important to capture what you did and how you responded (e.g., clicked on an email “like” or replied to a hacker’s request) to help the IT forensics team understand what has occurred, what was done and who was involved. Keeping track of dates, times and responses is critical to a thorough recovery. NOTIFY YOUR INCIDENT RESPONSE TEAM AND SENIOR LEADERSHIP Every company should have a team of specialists who are prepared to handle a cyber attack. These can include employees from the IT, communications, legal and accounting departments, as well as the board of directors. The incident response team should be able to quickly engage your company’s incident response plan and carry out their duties as assigned. If you don’t have an incident response team or plan, take the time to develop one before an attack occurs. CONTACT YOUR INSURANCE BROKER Your insurance broker can help guide you through a successful recovery and claims process. Under your cyber insurance policy, you will most likely have access to experts who understand the recovery process and ensure you have the resources to comply with notification obligations to affected parties, forensic investigations and public disclosures. 1 2 3 4 5
  • 3. CALL YOUR PRIVACY ATTORNEY Your privacy attorney is a key part of maintaining compliance with federal and state regulations that require you to notify anyone whose data was affected by the breach. Their guidance can help you understand your obligations for communication, credit monitoring and regulatory compliance. ENGAGE I.T. FORENSICS TO INVESTIGATE THE CRIME Identifying the source of the attack is a major component of data recovery. By tracking the virus path, the IT forensics team can show what files have been compromised, the length of time your system was compromised, and how extensive the damage may be. Oftentimes, a ransomware event occurs weeks or months after the hack. The forensics team will be able to assess the length of time the hacker has been in your system and the amount of damage to your data. COMMUNICATE WITH AFFECTED INDIVIDUALS Notification laws require that when you have a data breach, the people affected must be notified. Sharing the details of the attack, how you addressed it and what you plan to do going forward is an important part of external communication. Affected parties can include your clients or employees. It may also be necessary to hire a PR firm, and even a call center, to manage outside inquiries. ACTIVATE YOUR BACKUP FILES/DISASTER RECOVERY PLAN You can possibly avoid paying a ransom if you regularly back up your data and test it to ensure that the backup works properly. When a ransomware attack occurs, your files are encrypted and can only be released with a decryption code provided by the hacker. If you can remove the corrupt data from your network and ensure that your backup system is not compromised, you may be able to avoid paying the ransom altogether simply by reinstalling your backup files. CALL LAW ENFORCEMENT A ransomware attack is a crime and should be reported to the authorities. They will conduct their own investigation into the attack, which will be reported and tracked appropriately. 6 7 8 9 10
  • 4. Looking out for you. Looking ahead for you. Now you know the critical response steps to take in the event of a ransomware attack. But remember, every organization is different, with unique vulnerabilities and needs. You may need to consider alternative or additional steps to limit damages and enable recovery. Let’s work together to develop a robust cyber insurance program. Contact a HUB advisor today at: hubinternational.com/cybersecurity hubinternational.com© 2017 HUB International Limited. All rights reserved.