{"id":1032,"date":"2020-12-20T20:07:08","date_gmt":"2020-12-21T01:07:08","guid":{"rendered":"https:\/\/www.is-t.net\/blog\/?p=1032"},"modified":"2022-07-06T10:48:46","modified_gmt":"2022-07-06T15:48:46","slug":"what-to-do-when-you-are-the-victim-of-a-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/","title":{"rendered":"What To Do When You Are The Victim Of A Ransomware Attack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1032\" class=\"elementor elementor-1032\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-69c12cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"69c12cb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ace3a1d\" data-id=\"ace3a1d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cfa2c9 elementor-widget elementor-widget-text-editor\" data-id=\"8cfa2c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As a business owner, you likely take a variety of preventative steps to protect your business assets, staff, and property. But are you taking steps to protect your business IT systems and data? This is an important consideration for modern businesses because cybersecurity threats such as ransomware pose serious risks to businesses of all sizes. The long-term effects of a ransomware attack range from devastating financials to the destruction of business IT systems, making education regarding ransomware a top priority for businesses in all industries.<\/p><p>Here we\u2019ll discuss what ransomware is and how to properly navigate a ransomware attack<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bad7b3 elementor-widget elementor-widget-image\" data-id=\"6bad7b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg\" class=\"attachment-large size-large wp-image-1034\" alt=\"what to do when you are the victim of a ransomware attack\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39613e3 elementor-widget elementor-widget-heading\" data-id=\"39613e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#What_is_ransomware\" >What is ransomware?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#What_types_of_businesses_are_susceptible_to_ransomware\" >What types of businesses are susceptible to ransomware?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#Prevention_is_Key\" >Prevention is Key<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#What_to_do_if_business_systems_are_victims_of_ransomware\" >What to do if business systems are victims of ransomware?<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"What_is_ransomware\"><\/span>What is ransomware?\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-385d971 elementor-widget elementor-widget-text-editor\" data-id=\"385d971\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ransomware is a type of malware which infects computer systems through websites, downloaded applications, spam emails, phishing emails, or social media. Once ransomware has infected a system, it encrypts all of the systems files, effectively shutting off the user from their own personal data. Ransomware cyber criminals will then demand a ransom, typically requested through Bitcoin, in exchange for the decryption of the files and full restoration of the system.<\/p><p>Although there are other types of ransomware and associated malware, this is the most common variety that business owners experience. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ba0493 elementor-widget elementor-widget-heading\" data-id=\"9ba0493\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"What_types_of_businesses_are_susceptible_to_ransomware\"><\/span>What types of businesses are susceptible to ransomware?\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e20ac48 elementor-widget elementor-widget-text-editor\" data-id=\"e20ac48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ransomware can affect any and all businesses, regardless of industry or size. Ransomware attacks are on the rise across all sectors of business. As the number of widespread attacks increases, it is the view of most IT professionals that all businesses will at some point be exposed to a style of ransomware over time. The key to recovering from an attack is dependent on two things \u2013 how well the business was prepared for cybersecurity issues such as ransomware before the attack and how educated the business is on how to navigate the attack itself. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-010254f elementor-widget elementor-widget-heading\" data-id=\"010254f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Prevention_is_Key\"><\/span>Prevention is Key<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e928f81 elementor-widget elementor-widget-text-editor\" data-id=\"e928f81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unfortunately, once a business has been the victims of ransomware attacks there is little that can be done. The best way to handle ransomware attacks is to avoid them at all costs. To help prevent ransomware attacks, businesses can take a variety of steps, including:<\/p><ul><li>Employee training on spotting suspicious links and best practices regarding business computer and application use<\/li><li>Implementation of antivirus programs<\/li><li>Keeping operating systems and software updated regularly<\/li><li>Having a reliable, fail-safe backup system for all business data and files<\/li><li>Working with an experienced<a href=\"https:\/\/www.is-t.net\"> IT consulting firm<\/a> on how to strengthen business IT security<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80a8d6e elementor-widget elementor-widget-image\" data-id=\"80a8d6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack1_IST.jpg\" class=\"attachment-large size-large wp-image-1035\" alt=\"what to do when you are the victim of a ransomware attack 1\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack1_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack1_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack1_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ec8890 elementor-widget elementor-widget-heading\" data-id=\"6ec8890\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"What_to_do_if_business_systems_are_victims_of_ransomware\"><\/span>What to do if business systems are victims of ransomware?\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-394cd77 elementor-widget elementor-widget-text-editor\" data-id=\"394cd77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If your business has been the victim of a ransomware attack, there are steps you can take to ensure the best possible recovery.<\/p><p>Firstly, you should try to identify where the infection began and isolate that computer or device from every other device in the system. You can do this by disconnecting the computer from the network, including Wi-Fi, and from any storage devices. As with any cybersecurity attack, there can be multiple infected computers, so it is best to treat all devices as if they are infected.<\/p><p>Once the infection has been isolated, the next step is to identify what type of ransomware is attacking your systems. This can be done by searching ransomware identification websites or with the help of an IT professional. No matter how you choose to identify the ransomware, it is important to then notify the authorities. The FBI recommends that victims report all ransomware attacks so the authorities can better coordinate efforts to prevent and stop ransomware criminals.<\/p><p>The next step is to determine how you will deal with the infection. Typically, with ransomware your options are to pay the ransom, try to remove the malware from your system, or wipe your system clean and start from scratch. It&#8217;s important to know that even if you pay the ransom, the odds of your system and data being returned to you are low so that is not generally the recommended option. For those businesses with a solid <a href=\"https:\/\/www.is-t.net\/managed-it-services-houston-tx\/complete-data-backup-disaster-recovery-houston\">backup of system data<\/a> , wiping clean is usually the best option as it ensures 100% eradication of the malware. However, not every business has backup and disaster recovery plans in place. This can make navigating a ransomware attack much more challenging. Typically, it is best to have a reliable IT provider to help you navigate a situation such as this.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>As a business owner, you likely take a variety of preventative steps to protect your business assets, staff, and property. But are you taking steps to protect your business IT systems and data? This is an important consideration for modern businesses because cybersecurity threats such as ransomware pose serious risks to businesses of all sizes. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-1032","post","type-post","status-publish","format-standard","hentry","category-managed-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What To Do When You Are The Victim Of A Ransomware Attack? | IS&amp;T<\/title>\n<meta name=\"description\" content=\"The best way to handle ransomware attacks is to avoid them at all costs. Being proactive instead of reactive, and educating staff on cyber security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What To Do When You Are The Victim Of A Ransomware Attack? | IS&amp;T\" \/>\n<meta property=\"og:description\" content=\"The best way to handle ransomware attacks is to avoid them at all costs. Being proactive instead of reactive, and educating staff on cyber security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"IS&amp;T Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T01:07:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-06T15:48:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg\" \/>\n<meta name=\"author\" content=\"Scott Lard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Lard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/\"},\"author\":{\"name\":\"Scott Lard\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\"},\"headline\":\"What To Do When You Are The Victim Of A Ransomware Attack\",\"datePublished\":\"2020-12-21T01:07:08+00:00\",\"dateModified\":\"2022-07-06T15:48:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/\",\"name\":\"What To Do When You Are The Victim Of A Ransomware Attack? | IS&T\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg\",\"datePublished\":\"2020-12-21T01:07:08+00:00\",\"dateModified\":\"2022-07-06T15:48:46+00:00\",\"description\":\"The best way to handle ransomware attacks is to avoid them at all costs. Being proactive instead of reactive, and educating staff on cyber security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg\",\"width\":800,\"height\":400,\"caption\":\"what to do when you are the victim of a ransomware attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What To Do When You Are The Victim Of A Ransomware Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"name\":\"IS&amp;T Blog\",\"description\":\"News for nerds, stuff that matters\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\",\"name\":\"IS&T Consulting Group, LLC\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"width\":125,\"height\":47,\"caption\":\"IS&T Consulting Group, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\",\"name\":\"Scott Lard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"caption\":\"Scott Lard\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What To Do When You Are The Victim Of A Ransomware Attack? | IS&T","description":"The best way to handle ransomware attacks is to avoid them at all costs. Being proactive instead of reactive, and educating staff on cyber security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/","og_locale":"en_US","og_type":"article","og_title":"What To Do When You Are The Victim Of A Ransomware Attack? | IS&T","og_description":"The best way to handle ransomware attacks is to avoid them at all costs. Being proactive instead of reactive, and educating staff on cyber security.","og_url":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/","og_site_name":"IS&amp;T Blog","article_published_time":"2020-12-21T01:07:08+00:00","article_modified_time":"2022-07-06T15:48:46+00:00","og_image":[{"url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg","type":"","width":"","height":""}],"author":"Scott Lard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Lard","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#article","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/"},"author":{"name":"Scott Lard","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa"},"headline":"What To Do When You Are The Victim Of A Ransomware Attack","datePublished":"2020-12-21T01:07:08+00:00","dateModified":"2022-07-06T15:48:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/"},"wordCount":718,"publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg","articleSection":["Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/","url":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/","name":"What To Do When You Are The Victim Of A Ransomware Attack? | IS&T","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg","datePublished":"2020-12-21T01:07:08+00:00","dateModified":"2022-07-06T15:48:46+00:00","description":"The best way to handle ransomware attacks is to avoid them at all costs. Being proactive instead of reactive, and educating staff on cyber security.","breadcrumb":{"@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#primaryimage","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2020\/12\/WhatToDoWhenYouAreTheVictimOfARansomwareAttack2_IST.jpg","width":800,"height":400,"caption":"what to do when you are the victim of a ransomware attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.is-t.net\/blog\/what-to-do-when-you-are-the-victim-of-a-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.is-t.net\/blog\/"},{"@type":"ListItem","position":2,"name":"What To Do When You Are The Victim Of A Ransomware Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.is-t.net\/blog\/#website","url":"https:\/\/www.is-t.net\/blog\/","name":"IS&amp;T Blog","description":"News for nerds, stuff that matters","publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.is-t.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.is-t.net\/blog\/#organization","name":"IS&T Consulting Group, LLC","url":"https:\/\/www.is-t.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","width":125,"height":47,"caption":"IS&T Consulting Group, LLC"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa","name":"Scott Lard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","caption":"Scott Lard"}}]}},"_links":{"self":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/comments?post=1032"}],"version-history":[{"count":12,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1032\/revisions"}],"predecessor-version":[{"id":3370,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1032\/revisions\/3370"}],"wp:attachment":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media?parent=1032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/categories?post=1032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/tags?post=1032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}