{"id":1274,"date":"2019-10-09T01:28:14","date_gmt":"2019-10-09T01:28:14","guid":{"rendered":"https:\/\/www.backupassist.com\/?page_id=1274"},"modified":"2020-06-02T10:33:32","modified_gmt":"2020-06-02T10:33:32","slug":"ransomware-protection-guide","status":"publish","type":"page","link":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide","title":{"rendered":"Ransomware Protection &#8211; Definitive guide for business in 2020"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1274\" class=\"elementor elementor-1274\" data-elementor-settings=\"[]\">\n\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-element elementor-element-7af2275 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-top-section\" data-id=\"7af2275\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40fe6ac elementor-column elementor-col-100 elementor-top-column\" data-id=\"40fe6ac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c7a708 elementor-widget elementor-widget-heading\" data-id=\"7c7a708\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Definitive <b>Ransomware Protection<\/b> Guide for Business in 2020.<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d7568a elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"4d7568a\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;rotating_text&quot;:&quot;Prepare - Survive - Recover&quot;,&quot;animation_type&quot;:&quot;typing&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-typing elementor-headline-letters\">\n\t\t\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\"><\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed13cfa elementor-widget elementor-widget-text-editor\" data-id=\"ed13cfa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p class=\"p1\">Ransomware is a huge threat to businesses. The best time to protect yourself from ransomware is before it strikes. Cyber-resilience requires <strong>the right ransomware protection<\/strong>\u00a0to save you from the panic and stress of unplanned downtime and potentially hundreds of thousands of dollars in ransom payments.<\/p><p class=\"p1\">Preparation is essential &#8211; with the reward of resilience: meaning you can prevent many attacks, and still survive and recover from any attack that slips through the defenses.<\/p><p class=\"p1\">In this comprehensive guide, we include specific steps that are often overlooked, show some fascinating real life examples and leave you with a clear understanding of ransomware and how to implement the best ransomware protection &#8211; at both a technical and a human-process level.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a8ecdf elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"6a8ecdf\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Read on and avoid the panic and crisis that often characterize ransomware attacks\u200b<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-c20f45c elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-top-section\" data-id=\"c20f45c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a75fa6a elementor-hidden-tablet elementor-hidden-phone elementor-column elementor-col-50 elementor-top-column\" data-id=\"a75fa6a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<section class=\"elementor-element elementor-element-a12df3e elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"a12df3e\" data-element_type=\"section\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fd1793 elementor-hidden-phone elementor-column elementor-col-100 elementor-inner-column\" data-id=\"2fd1793\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bada57 elementor-widget elementor-widget-heading\" data-id=\"2bada57\" data-element_type=\"widget\" data-settings=\"{&quot;sticky_offset&quot;:62,&quot;sticky_effects_offset&quot;:93,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Table of Contents<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06de4b1 elementor-nav-menu--indicator-chevron elementor-nav-menu__align-left elementor-nav-menu--dropdown-tablet elementor-nav-menu__text-align-aside elementor-widget elementor-widget-nav-menu\" data-id=\"06de4b1\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;vertical&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_offset&quot;:137,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t<nav role=\"navigation\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-vertical e--pointer-background e--animation-fade\"><ul id=\"menu-1-06de4b1\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11836\"><a href=\"#know-your-enemy\" class=\"elementor-item elementor-item-anchor\">1.0. Know Your Enemy<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11837\"><a href=\"#staying-a-step-ahead\" class=\"elementor-item elementor-item-anchor\">2.0. Staying a Step Ahead<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11838\"><a href=\"#the-big-reveal\" class=\"elementor-item elementor-item-anchor\">3.0. What Ransomware Serves Up<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11839\"><a href=\"#the-business-model\" class=\"elementor-item elementor-item-anchor\">4.0. The Business Model<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11840\"><a href=\"#staying-safe\" class=\"elementor-item elementor-item-anchor\">5.0. Staying Safe<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11841\"><a href=\"#zeroing-in-on-backups\" class=\"elementor-item elementor-item-anchor\">6.0. Zeroing In On Backups<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11842\"><a href=\"#hitting-pause\" class=\"elementor-item elementor-item-anchor\">7.0. Hitting Pause<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11843\"><a href=\"#ransomware-response-resources\" class=\"elementor-item elementor-item-anchor\">8.0. Ransomware Response Resources<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11844\"><a href=\"#ransomware-response-plan\" class=\"elementor-item elementor-item-anchor\">9.0. Ransomware Response Plan<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11845\"><a href=\"#the-disaster-recovery-plan\" class=\"elementor-item elementor-item-anchor\">10.0 The Disaster Recovery Plan<\/a><\/li>\n<\/ul><\/nav>\n\t\t\t\t\t<div class=\"elementor-menu-toggle\" role=\"button\" tabindex=\"0\" aria-label=\"Menu Toggle\" aria-expanded=\"false\">\n\t\t\t<i class=\"eicon-menu-bar\" aria-hidden=\"true\"><\/i>\n\t\t\t<span class=\"elementor-screen-only\">Menu<\/span>\n\t\t<\/div>\n\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" role=\"navigation\" aria-hidden=\"true\"><ul id=\"menu-2-06de4b1\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11836\"><a href=\"#know-your-enemy\" class=\"elementor-item elementor-item-anchor\">1.0. Know Your Enemy<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11837\"><a href=\"#staying-a-step-ahead\" class=\"elementor-item elementor-item-anchor\">2.0. Staying a Step Ahead<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11838\"><a href=\"#the-big-reveal\" class=\"elementor-item elementor-item-anchor\">3.0. What Ransomware Serves Up<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11839\"><a href=\"#the-business-model\" class=\"elementor-item elementor-item-anchor\">4.0. The Business Model<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11840\"><a href=\"#staying-safe\" class=\"elementor-item elementor-item-anchor\">5.0. Staying Safe<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11841\"><a href=\"#zeroing-in-on-backups\" class=\"elementor-item elementor-item-anchor\">6.0. Zeroing In On Backups<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11842\"><a href=\"#hitting-pause\" class=\"elementor-item elementor-item-anchor\">7.0. Hitting Pause<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11843\"><a href=\"#ransomware-response-resources\" class=\"elementor-item elementor-item-anchor\">8.0. Ransomware Response Resources<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11844\"><a href=\"#ransomware-response-plan\" class=\"elementor-item elementor-item-anchor\">9.0. Ransomware Response Plan<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-11845\"><a href=\"#the-disaster-recovery-plan\" class=\"elementor-item elementor-item-anchor\">10.0 The Disaster Recovery Plan<\/a><\/li>\n<\/ul><\/nav>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fef07f1 elementor-column elementor-col-50 elementor-top-column\" data-id=\"fef07f1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<section class=\"elementor-element elementor-element-481ab17 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"481ab17\" data-element_type=\"section\" id=\"know-your-enemy\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e91aaf5 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"e91aaf5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-049c334 elementor-widget elementor-widget-heading\" data-id=\"049c334\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>1.0.<\/b> Know your enemy \u2013 understanding what is ransomware and how it works<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d57bfa7 elementor-widget elementor-widget-text-editor\" data-id=\"d57bfa7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><span lang=\"EN-US\">Although \u2018what is ransomware\u2019 can be answered in a sentence, it\u2019s worth equipping you with a deeper understanding using <b style=\"mso-bidi-font-weight: normal;\">a quick FAQ<\/b>. We\u2019ll expand on these answers in the following sections, but first let\u2019s give you a solid grounding in the basics.<\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-0e4dfac elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-top-section\" data-id=\"0e4dfac\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2286a32 elementor-column elementor-col-100 elementor-top-column\" data-id=\"2286a32\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3338a4c elementor-widget elementor-widget-heading\" data-id=\"3338a4c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is ransomware? <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfb9da1 elementor-widget elementor-widget-text-editor\" data-id=\"dfb9da1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Ransomware is malicious software that \u201clocks you out\u201d of your own data, by encrypting it with a secret key, and then demanding payment for that key so you can decrypt and access your data again.<br \/><br \/><br \/>Many strains of ransomware force victims to take action by incorporating an expiration date into the ransom demand: if the ransom is not paid by a certain date, the decryption key will be destroyed and all ransomed data will be inaccessible forever.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8eda674 elementor-widget elementor-widget-heading\" data-id=\"8eda674\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Is ransomware the same as malware?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0dad16 elementor-widget elementor-widget-text-editor\" data-id=\"e0dad16\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">There are many types of malware, and ransomware is one such type. But rather than stealing or deleting information, or spying on you, it\u2019s designed to extract a payment from you to get back access to your data.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d623ce elementor-widget elementor-widget-heading\" data-id=\"1d623ce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Where does ransomware come from?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e798ba3 elementor-widget elementor-widget-text-editor\" data-id=\"e798ba3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Ransomware originates from cyber-criminals, which can range from \u201clone-wolf\u201d individuals all the way to well organized consortiums. Such criminals preserve their anonymity and conceal their activities by using tools such as TOR and cryptocurrencies, to the point where it is almost impossible for a regular computer user to know where the criminal is located.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f05ddc elementor-widget elementor-widget-heading\" data-id=\"1f05ddc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How can ransomware get onto my network or computer?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba8ec28 elementor-widget elementor-widget-text-editor\" data-id=\"ba8ec28\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Broadly speaking, three of the most common ways this can happen are:<br \/><br \/><br \/><span style=\"letter-spacing: -0.3px;\">1. Self-propagated infection \u2013 much like a virus, some strains of ransomware can automatically probe adjacent computers on a network, and \u201cjump\u201d from one host to another, spreading automatically by exploiting certain characteristics and services of a computer\u2019s operating system or application software.<\/span><br \/><br \/><br \/><span style=\"letter-spacing: -0.3px;\">2. Manual infection \u2013 involving hackers who can break into systems (via a variety of methods, such as weak passwords, vulnerabilities in protocols such as RDP, or zero-day exploits) and then manually install ransomware in order to monetize their break-in.<\/span><br \/><br \/><br \/><span style=\"letter-spacing: -0.3px;\">3. \u201cHapless user\u201d infection \u2013 where users unknowingly infect themselves by clicking on links in spam or phishing emails, plugging in USB devices, or visiting websites that have been sabotaged.<\/span><br \/><br \/><br \/>We describe this in more detail later in the article.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73ae03a elementor-widget elementor-widget-heading\" data-id=\"73ae03a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How does ransomware affect your computer systems?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26201bd elementor-widget elementor-widget-text-editor\" data-id=\"26201bd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Two common things that ransomware can do to your system is:<br \/><br \/><br \/>1. To prevent it from booting. The Petya (2016) strain attacked the Master Boot Record (MBR) of machines to hijack the computer and demand ransom from the user.<br \/><br \/><br \/>2. To allow booting, but otherwise deny access to data. Here, ransomware will look for data that it thinks has value, like documents and databases, and encrypts that data so that you can no longer use or view it.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1475ee8 elementor-widget elementor-widget-heading\" data-id=\"1475ee8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What happens when you are infected?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-8228af6 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"8228af6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b9c1ec elementor-column elementor-col-50 elementor-inner-column\" data-id=\"3b9c1ec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ca5e8f elementor-widget elementor-widget-text-editor\" data-id=\"3ca5e8f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Most ransomware displays an onscreen warning to inform you that your data\u2019s been encrypted. It will also explain how to pay the ransom and that you\u2019ll get a digital key to decrypt your data when the ransom\u2019s paid. Some ransomware will prevent your computer from even starting unless you pay the ransom.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-350aff0 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"350aff0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e9f2f5 elementor-widget elementor-widget-image\" data-id=\"8e9f2f5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.backupassist.com\/app\/uploads\/2019\/10\/Picture-1.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"Picture 1\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"822\" height=\"581\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png 822w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1-300x212.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1-768x543.png 768w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e337c5 elementor-widget elementor-widget-heading\" data-id=\"2e337c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How common is ransomware?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fbaf4f elementor-widget elementor-widget-text-editor\" data-id=\"6fbaf4f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Ransomware is far more common than most people think and reported infections are increasing year on year. According to the McAfee Labs Threat Report (<a href=\"https:\/\/www.mcafee.com\/enterprise\/en-au\/threat-center\/mcafee-labs\/reports.html\">August 2019<\/a>), the number of Ransomware reports worldwide during first quarter of 2019 was 1.3 million. This was more than double the 600,000 infections reported in the previous quarter at the end of 2018.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29a286a elementor-widget elementor-widget-heading\" data-id=\"29a286a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Can ransomware infect my backups?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8729615 elementor-widget elementor-widget-text-editor\" data-id=\"8729615\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Unfortunately yes. There are a number of ways that ransomware can interfere with backups and render them useless &#8211; such as corrupting the backup files from externally, or corrupting the backed up data internally. A good ransomware protection strategy must factor in <a href=\"https:\/\/www.backupassist.com\/blog\/can-ransomware-infect-your-backup\">how ransomware infect your backups<\/a>.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19723fc elementor-widget elementor-widget-heading\" data-id=\"19723fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Can I reuse a previously infected machine?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56579e6 elementor-widget elementor-widget-text-editor\" data-id=\"56579e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Due to the risk of reinfection, we recommend against this. The safest method of recovery is to recover from backup to <b>new hardware<\/b>. This will minimize the chance of reinfection.<\/p><p>Using the <b>existing machine with new hard drives<\/b>\u00a0is not the best solution.\u00a0<span style=\"letter-spacing: -0.3px;\">As we explain in Chapter 3 of this article, ransomware often installs backdoors, which can make it extremely difficult to remove.\u00a0<\/span><a style=\"letter-spacing: -0.3px; background-color: #efefef;\" href=\"https:\/\/www.blackhat.com\/docs\/asia-17\/materials\/asia-17-Matrosov-The-UEFI-Firmware-Rootkits-Myths-And-Reality.pdf\" target=\"_blank\" rel=\"noopener\">Backdoors can include modifying the computer&#8217;s UEFI Firmware<\/a><span style=\"letter-spacing: -0.3px;\">, which can result in reinfection even if the hard disk is completely wiped.<\/span><\/p><p>And we absolutely <strong>do not recommend<\/strong> continuing to use an<b> infected Operating System.<\/b> While it might be tempting to use a malware removal tool to clean a machine as the fastest way to get running again, it raises a number of risks such as reinfection, or spreading the infection to adjacent networked machines. If it is absolutely necessary to reuse the infected OS, it should only be a temporary stop-gap solution used in isolation (disconnected from the network) while a proper recovery to new hardware is being performed.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4803465 elementor-widget elementor-widget-heading\" data-id=\"4803465\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is the best form of ransomware protection?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65c146c elementor-widget elementor-widget-text-editor\" data-id=\"65c146c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>As we discuss later, there are both preventative and remedial forms of ransomware protection. For all the reasons outlined later in this article, if you only use one form of protection, we recommend <b>multiple air-gapped backups<\/b>, as the only fully reliable solution.<\/p><p>For home-users, this can be as simple as manually copying your data to a removable USB drive that you disconnect from your computer. An even better solution is to burn your data to a write-once medium, like Blu-ray disk (albeit limited in storage capacity).<\/p><p>For businesses, the requirements are generally much higher &#8211; including restoring servers and mission-critical systems such as Active Directory, email and databases. These backups are generally done by business-grade backup software products, preferably containing active defenses against ransomware that can alert you to data corruption due to ransomware and preserve the integrity of the backup.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-dbed9b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"dbed9b8\" data-element_type=\"section\" id=\"staying-a-step-ahead\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9489db elementor-column elementor-col-100 elementor-inner-column\" data-id=\"f9489db\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15df327 elementor-widget elementor-widget-heading\" data-id=\"15df327\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>2.0.<\/b> Staying a step ahead - how ransomware gets into your network <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c8ad28 elementor-widget elementor-widget-text-editor\" data-id=\"8c8ad28\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>This section will leave you with an understanding of what vulnerabilities your business may have, and how an infection can exploit them. This understanding is essential in order to protect your organization against ransomware.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3b3c44 elementor-widget elementor-widget-heading\" data-id=\"e3b3c44\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Anatomy of a network breach - how ransomware gets in<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-70f6ef8 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"70f6ef8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b31d10 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"1b31d10\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-645ccad elementor-widget elementor-widget-text-editor\" data-id=\"645ccad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><span style=\"letter-spacing: -0.3px;\">The reason why ransomware is so pervasive is because there are many ways it can spread.<\/span><span style=\"letter-spacing: -0.3px;\">\u00a0<\/span><\/p><p><span style=\"letter-spacing: -0.3px;\">Ransomware can get into your network via exploited network vulnerabilities, removable media, remote access tools like RDP, malicious websites and email attachments. Once the ransomware installs on one computer, it can spread around the network installing itself on every device it finds.<\/span><\/p><p><span style=\"letter-spacing: -0.3px;\">This graphic shows the 3 common ways ransomware uses to spread: internet connections, email attachments and infected removable drives. Once it\u2019s on a machine in your network, ransomware can detect all the workstations, servers, laptops and other local networks and spread to them as well.<\/span><span style=\"letter-spacing: -0.3px;\"><br \/><\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a42e063 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"a42e063\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42a18ad elementor-widget elementor-widget-image\" data-id=\"42a18ad\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/ransomware-graphic.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ce6c03 elementor-widget elementor-widget-heading\" data-id=\"7ce6c03\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5 ways ransomware can spread onto your computers<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-69ffac7 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"69ffac7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d97da6d elementor-column elementor-col-33 elementor-inner-column\" data-id=\"d97da6d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6dfbcc elementor-widget elementor-widget-heading\" data-id=\"d6dfbcc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">1<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78af38e elementor-column elementor-col-33 elementor-inner-column\" data-id=\"78af38e\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bdc53e2 elementor-widget elementor-widget-heading\" data-id=\"bdc53e2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The internet threat<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75915f6 elementor-widget elementor-widget-text-editor\" data-id=\"75915f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Every time a service (e.g. a web server, remote login server, email server or e-commerce site) is exposed to the Internet, there\u2019s a potential security risk that the service can be hacked and exploited. Hackers often use automated tools to search the internet for computers and networks with vulnerabilities such as poor configurations, outdated network or computer patches and weak passwords, and then use those vulnerabilities to copy ransomware code onto a device in your network.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b178e4f elementor-column elementor-col-33 elementor-inner-column\" data-id=\"b178e4f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-555ced2 elementor-widget elementor-widget-text-editor\" data-id=\"555ced2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><strong>Example:<\/strong> <strong>Summer of discontent\u00a0<\/strong><\/p><p>To help users work remotely, a company enables remote protocols so users can log into their work computers from their home PCs. A hacker figures out company usernames using an employee email address list, and runs a program to brute force the passwords. 2 days later the password summeR76 works for one of the employee\u2019s PCs, and the hacker installs ransomware, which spreads. Job done!<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-836098c elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"836098c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5890061 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"5890061\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ea10fa elementor-widget elementor-widget-heading\" data-id=\"0ea10fa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">2<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed9d21 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"5ed9d21\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb6927d elementor-widget elementor-widget-heading\" data-id=\"bb6927d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The attached device threat<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-528dcd6 elementor-widget elementor-widget-text-editor\" data-id=\"528dcd6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Ransomware can hide on USB drives, thumb drives and connected devices, and will spread to other machines when that drive or device is attached.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca32284 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"ca32284\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c7c012 elementor-widget elementor-widget-text-editor\" data-id=\"0c7c012\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Example:<\/strong> <strong>Terror in the top draw <\/strong>\n<br\/><br\/>\nJane uses a USB thumb drive to back up her work laptop. She loses the USB, and gets another one from a drawer at home. At some time in the past the USB was infected with ransomware. She plugs the USB into the laptop, then securely connects to her company network using a trusted laptop, and the USB deploys its ransomware to the company file server. It then spreads, infecting the whole company.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-18b9593 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"18b9593\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d8869d elementor-column elementor-col-33 elementor-inner-column\" data-id=\"7d8869d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-108b74e elementor-widget elementor-widget-heading\" data-id=\"108b74e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">3<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-389160a elementor-column elementor-col-33 elementor-inner-column\" data-id=\"389160a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a43a011 elementor-widget elementor-widget-heading\" data-id=\"a43a011\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Malicious websites\u200b<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6e2165 elementor-widget elementor-widget-text-editor\" data-id=\"b6e2165\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">A computer with an unpatched vulnerability can be infected with ransomware when visiting a malicious website. Although Google and web browsers do filter malicious websites, the danger persists due to the risk of redirection techniques such as cross-site scripting. These attacks use a compromised legitimate website to send you to a malicious website.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdb0675 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"bdb0675\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de439ba elementor-widget elementor-widget-text-editor\" data-id=\"de439ba\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><strong>Example:<\/strong>\u00a0<strong>The doppelgangers portal<\/strong><strong>\u00a0<\/strong><\/p><p>A new employee\u2019s told to use a web portal to log their timesheet. They don\u2019t have the site saved so they Google it and select the site name. But the site they selected is .co.rs instead of .co.au. They\u2019re on a malicious site that looks legitimate. They click a link and quickly select okay to a message but nothing happens, so they leave the site and move on to something else. Like most staff, the employee goes home early that day, as there\u2019s something wrong with all the company computers.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-a8eadcb elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"a8eadcb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0a3828 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"c0a3828\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-563ab27 elementor-widget elementor-widget-heading\" data-id=\"563ab27\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">4<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b5e641 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"9b5e641\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a23476 elementor-widget elementor-widget-heading\" data-id=\"7a23476\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Malvertising\u200b<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ceb0a65 elementor-widget elementor-widget-text-editor\" data-id=\"ceb0a65\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Online advertising uses dynamic features to encourage you to view and click on ads. Unfortunately, these features can be exploited by hackers who insert ransomware into legitimate advertisements. The adds can infect your machine by redirecting you to a malicious website or by deploying the ransomware when you interact with the ad. In some cases, it is enough just to view the advertisement for it to infect your computer.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1380bf4 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"1380bf4\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-845c32b elementor-widget elementor-widget-text-editor\" data-id=\"845c32b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Example:<\/strong>\u00a0<strong>Buyer\u2019s remorse<\/strong>\n<br\/><br\/>\nKim recently made a purchase online with a reputable company. After making the purchase, the company\u2019s online advertisements start showing up in her social media. One add prompts her to consider another purchase but she changes her mind. Unfortunately, that\u2019s not the end of it. Hackers have injected malware into the company\u2019s advertisements and Kim and thousands of others notice the computers they used to view the\u00a0 advertisement at work and at home, now have a new flashing message &#8211; this time its ransomware.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-6be4a72 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"6be4a72\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d85a2e elementor-column elementor-col-33 elementor-inner-column\" data-id=\"4d85a2e\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3412442 elementor-widget elementor-widget-heading\" data-id=\"3412442\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">5<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa4f8f0 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"fa4f8f0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a45596d elementor-widget elementor-widget-heading\" data-id=\"a45596d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The email threat\u200b<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e37962 elementor-widget elementor-widget-text-editor\" data-id=\"4e37962\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>We saved the best until last.<\/p><p>Ransomware can be spread using emails with attachments. Although PDFs and office documents are a lot more secure than they used to be, file compression formats like WinRAR can be used to deliver ransomware, especially if the mail server does not provide adequate mail filtering. The email may sound like a legitimate communication, but once the attachment is opened, it will quietly begin encrypting your data and spreading from one machine to the next.<\/p><p>Although this is one of the oldest forms of ransomware propagation, the McAfee Advanced Threat Research team&#8217;s\u00a0<a href=\"https:\/\/www.mcafee.com\/enterprise\/en-au\/threat-center\/mcafee-labs\/reports.html\">August 2019<\/a>\u00a0report shows that user execution attachments are still used, and threat actors often survey large organizations before sending the emails due to the lucrative returns.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4e5a89 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"a4e5a89\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-faa87c2 elementor-widget elementor-widget-text-editor\" data-id=\"faa87c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Example:<\/strong>\u00a0<strong>A horrible resume<\/strong>\n<br\/><br\/>\nDave in HR receives an email titled \u2018Job application\u2019 with a PDF attached. The email makes sense and Dave opens it to find a poorly written resume for a generic job. He closes the PDF, not knowing that it ran a macro and installed ransomware. Ten minutes later the ransomware has encrypted Dave\u2019s PC and spread to all company PCs and servers. The company is now unable to function or access critical data.<br\/><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0b1788 elementor-widget elementor-widget-heading\" data-id=\"f0b1788\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Honorable mention - 0-day exploits<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-976c6ab elementor-widget elementor-widget-text-editor\" data-id=\"976c6ab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>This is the reason why ransomware can never be fully eradicated. It is a special kind of nasty that can apply to any of the previous examples. It can exploit even the most secure systems because the vulnerability the ransomware uses may not yet be known (day 0), so patched and updated machines can still be compromised.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-64e08e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"64e08e9\" data-element_type=\"section\" id=\"the-big-reveal\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12d3ed4 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"12d3ed4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93f8c5c elementor-widget elementor-widget-heading\" data-id=\"93f8c5c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>3.0.<\/b> An unsavory meal \u2013 what Ransomware serves up once it\u2019s on your computer<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab16845 elementor-widget elementor-widget-text-editor\" data-id=\"ab16845\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">This section explains what ransomware does once it\u2019s installed. It can help with what to look for if you suspect you\u2019ve been infected, and what needs to be undone when you are infected. These tasks can occur in different orders, depending on the ransomware.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdfb2a4 elementor-widget elementor-widget-heading\" data-id=\"bdfb2a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ransomware starter #1: install backdoors<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd207c2 elementor-widget elementor-widget-text-editor\" data-id=\"bd207c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Ransomware can be clever &#8211; trying to get a solid foothold into your computer. Once installed, it can open backdoors in your systems and exploit them later. Examples of these backdoors include:<\/p><ul><li>Embedding itself into the computer&#8217;s BIOS or UEFI firmware, so it can &#8220;spring back to life&#8221; even if the hard drive is wiped and the operating system is reinstalled.<\/li><li>Phoning home to the cyber criminals and opening a &#8220;shell&#8221;, which allows the criminal to directly access and control the machine without you knowing.<\/li><\/ul><p>It can also do something called privilege elevation, whereby system or user accounts the ransomware may use are given more access. These changes can be used to help the infection spread to secure areas, and open more back doors into your network.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1ea0dd elementor-widget elementor-widget-heading\" data-id=\"f1ea0dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ransomware starter #2: propagation<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5da8ce elementor-widget elementor-widget-text-editor\" data-id=\"c5da8ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Once on a computer, ransomware can locate and spread to any location you can access from your desktop. In fact, with the creation of backdoors, it can probably spread to more locations than you think. And this will happen quickly and often unnoticed, while it\u2019s encrypting your machine.<\/p><p>It is common that in a networked environment, ransomware will spread by scanning for other machines on the network, and then exploiting vulnerabilities in software or lax security configurations to install itself on other machines.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae199dc elementor-widget elementor-widget-heading\" data-id=\"ae199dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ransomware main course: encrypt and lock you out of your data <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-4378581 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"4378581\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-713cbab elementor-column elementor-col-50 elementor-inner-column\" data-id=\"713cbab\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da685d5 elementor-widget elementor-widget-text-editor\" data-id=\"da685d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Now the destruction begins. Ransomware&#8217;s main purpose is to search for your files and encrypt them, one by one. Unfortunately for us, computer processors and storage drives are so fast nowadays, the encryption can happen rapidly. Encryption expert, Linus Chang, says that on common desktops, &#8220;data can be encrypted at rates upwards of 300GB per hour. Most people can be locked out of all their data in just a few hours.&#8221;<\/p><p>R<span style=\"letter-spacing: -0.3px;\">ansomware will stay hidden and operate in the background locating data it thinks is valuable. For example, everything in My documents, in a folder called photos, all Microsoft Office documents, and files that look like databases. Once encrypted, the files will often appear as files with no application association and if you open them they show gibberish.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36fc9da elementor-column elementor-col-50 elementor-inner-column\" data-id=\"36fc9da\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17847ec elementor-widget elementor-widget-image\" data-id=\"17847ec\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"931\" height=\"581\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-3.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-3.png 931w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-3-300x187.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-3-768x479.png 768w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9dbd91 elementor-widget elementor-widget-heading\" data-id=\"e9dbd91\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">And now you get the check: the demand for ransom<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90a6443 elementor-widget elementor-widget-text-editor\" data-id=\"90a6443\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Once your important files have been encrypted, the ransomware will display a notification. This notification could be an open text file or, more commonly with new ransomware, a flashy hard to miss browser graphic.\n<BR\/><BR\/>\n2 examples of ransomware notifications<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-6fa7702 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"6fa7702\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44be057 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"44be057\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c66efdd elementor-widget elementor-widget-image\" data-id=\"c66efdd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.backupassist.com\/app\/uploads\/2019\/10\/Picture-4.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"Picture 4\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"779\" height=\"525\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-4.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-4.png 779w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-4-300x202.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-4-768x518.png 768w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d61721 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"8d61721\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00e88a9 elementor-widget elementor-widget-image\" data-id=\"00e88a9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.backupassist.com\/app\/uploads\/2019\/10\/Picture-5.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"Picture 5\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"714\" height=\"516\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-5.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-5.png 714w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-5-300x217.png 300w\" sizes=\"auto, (max-width: 714px) 100vw, 714px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca6f4c2 elementor-widget elementor-widget-heading\" data-id=\"ca6f4c2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A ransomware notification will usually:<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-7a8a88b elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"7a8a88b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-450cea3 elementor-column elementor-col-25 elementor-inner-column\" data-id=\"450cea3\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0608767 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"0608767\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<!-- Generator: Adobe Illustrator 23.0.4, SVG Export Plug-In . SVG Version: 6.00 Build 0)  -->\n<svg version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 100 100\" style=\"enable-background:new 0 0 100 100;\" xml:space=\"preserve\">\n<style type=\"text\/css\">\n\t.st0{fill:#FFFFFF;}\n\t.st1{fill:#4E4E4F;}\n<\/style>\n<g>\n\t<circle class=\"st0\" cx=\"75.86\" cy=\"32.76\" r=\"6.9\"\/>\n\t<path class=\"st0\" d=\"M62.07,72.41c0.95,0,1.72-0.77,1.72-1.72v-1.72h-6.9v3.45H62.07z\"\/>\n\t<path class=\"st0\" d=\"M44.83,6.9h3.45v10.34h-3.45V6.9z\"\/>\n\t<path class=\"st0\" d=\"M89.04,36.83l0.28-0.91l3.78-1.03v-4.27l-3.78-1.03l-0.28-0.91c-0.25-0.8-0.58-1.59-0.99-2.36l-0.44-0.84\n\t\tl1.95-3.41l-3.02-3.02L83.13,21l-0.84-0.44c-0.78-0.41-1.57-0.74-2.36-0.99l-0.9-0.28l-1.04-3.78h-4.26l-1.04,3.78l-0.9,0.28\n\t\tc-0.79,0.24-1.59,0.58-2.36,0.99l-0.84,0.44l-3.41-1.95l-3.02,3.02l1.95,3.41l-0.44,0.84c-0.41,0.77-0.74,1.56-0.99,2.36\n\t\tl-0.28,0.91l-3.78,1.03v4.27l3.78,1.03l0.28,0.91c0.25,0.8,0.58,1.59,0.99,2.36l0.44,0.84l-1.95,3.41l3.02,3.02l3.41-1.95\n\t\tl0.84,0.44c0.78,0.41,1.57,0.74,2.36,0.99l0.9,0.28L73.73,50h4.26l1.04-3.78l0.9-0.28c0.79-0.24,1.59-0.58,2.36-0.99l0.84-0.44\n\t\tl3.41,1.95l3.02-3.02l-1.95-3.41l0.44-0.84C88.47,38.42,88.8,37.63,89.04,36.83L89.04,36.83z M75.86,43.1\n\t\tc-5.71,0-10.34-4.64-10.34-10.34s4.64-10.34,10.34-10.34s10.34,4.64,10.34,10.34S81.57,43.1,75.86,43.1z\"\/>\n\t<path class=\"st0\" d=\"M89.66,48.23l-2.53,2.53l-4.08-2.33c-0.39,0.18-0.78,0.34-1.18,0.49l-1.24,4.53H71.1l-1.24-4.53\n\t\tc-0.39-0.15-0.79-0.31-1.18-0.49l-4.08,2.33l-6.74-6.74l2.33-4.08c-0.18-0.39-0.34-0.78-0.49-1.18l-4.53-1.24v-9.53l4.53-1.24\n\t\tc0.15-0.4,0.31-0.79,0.49-1.18l-2.33-4.08l6.74-6.74l4.08,2.33c0.39-0.18,0.78-0.34,1.18-0.49l1.24-4.53h9.53l1.24,4.53\n\t\tc0.39,0.15,0.79,0.31,1.18,0.49l4.08-2.33l2.53,2.53V0H10.34v65.52h79.31V48.23z M34.48,3.45h3.45v17.24h-3.45V3.45z M27.59,3.45\n\t\th3.45v17.24h-3.45V3.45z M27.59,24.14h3.45v17.24h-3.45V24.14z M24.14,58.62c0,1.9-1.55,3.45-3.45,3.45h-3.45\n\t\tc-1.9,0-3.45-1.55-3.45-3.45V48.28c0-1.9,1.55-3.45,3.45-3.45h3.45c1.9,0,3.45,1.55,3.45,3.45V58.62z M24.14,37.93\n\t\tc0,1.9-1.55,3.45-3.45,3.45h-3.45c-1.9,0-3.45-1.55-3.45-3.45V27.59c0-1.9,1.55-3.45,3.45-3.45h3.45c1.9,0,3.45,1.55,3.45,3.45\n\t\tV37.93z M24.14,17.24c0,1.9-1.55,3.45-3.45,3.45h-3.45c-1.9,0-3.45-1.55-3.45-3.45V6.9c0-1.9,1.55-3.45,3.45-3.45h3.45\n\t\tc1.9,0,3.45,1.55,3.45,3.45V17.24z M37.93,58.62c0,1.9-1.55,3.45-3.45,3.45h-3.45c-1.9,0-3.45-1.55-3.45-3.45V48.28\n\t\tc0-1.9,1.55-3.45,3.45-3.45h3.45c1.9,0,3.45,1.55,3.45,3.45V58.62z M44.83,62.07h-3.45V44.83h3.45V62.07z M44.83,37.93\n\t\tc0,1.9-1.55,3.45-3.45,3.45h-3.45c-1.9,0-3.45-1.55-3.45-3.45V27.59c0-1.9,1.55-3.45,3.45-3.45h3.45c1.9,0,3.45,1.55,3.45,3.45\n\t\tV37.93z M51.72,62.07h-3.45V44.83h3.45V62.07z M51.72,41.38h-3.45V24.14h3.45V41.38z M51.72,17.24c0,1.9-1.55,3.45-3.45,3.45h-3.45\n\t\tc-1.9,0-3.45-1.55-3.45-3.45V6.9c0-1.9,1.55-3.45,3.45-3.45h3.45c1.9,0,3.45,1.55,3.45,3.45V17.24z\"\/>\n\t<path class=\"st0\" d=\"M17.24,6.9h3.45v10.34h-3.45V6.9z\"\/>\n\t<path class=\"st0\" d=\"M17.24,48.28h3.45v10.34h-3.45V48.28z\"\/>\n\t<path class=\"st0\" d=\"M37.93,27.59h3.45v10.34h-3.45V27.59z\"\/>\n\t<path class=\"st0\" d=\"M31.03,48.28h3.45v10.34h-3.45V48.28z\"\/>\n\t<path class=\"st0\" d=\"M17.24,27.59h3.45v10.34h-3.45V27.59z\"\/>\n\t<path class=\"st0\" d=\"M25.86,96.55h48.28V100H25.86V96.55z\"\/>\n\t<path class=\"st0\" d=\"M94.83,17.24H93.1v3.5l0.76,0.76l-2.33,4.08c0.18,0.39,0.34,0.78,0.49,1.18l4.53,1.24v9.53l-4.53,1.24\n\t\tc-0.15,0.4-0.31,0.79-0.49,1.18l2.33,4.08l-0.76,0.76v20.74h6.9v-43.1C100,19.56,97.68,17.24,94.83,17.24z\"\/>\n\t<path class=\"st0\" d=\"M43.1,82.76H56.9V93.1H43.1V82.76z\"\/>\n\t<path class=\"st0\" d=\"M46.55,68.97h6.9v3.45h-6.9V68.97z\"\/>\n\t<path class=\"st0\" d=\"M29.72,89.66c-0.66,0-1.25,0.37-1.54,0.95l-1.25,2.49h12.73v-3.45H29.72z\"\/>\n\t<path class=\"st0\" d=\"M37.93,72.41h5.17v-3.45h-6.9v1.72C36.21,71.64,36.98,72.41,37.93,72.41z\"\/>\n\t<path class=\"st0\" d=\"M67.24,70.69c0,2.85-2.32,5.17-5.17,5.17H37.93c-2.85,0-5.17-2.32-5.17-5.17v-1.72H0v5.17\n\t\tc0,2.85,2.32,5.17,5.17,5.17h89.66c2.85,0,5.17-2.32,5.17-5.17v-5.17H67.24V70.69z\"\/>\n\t<path class=\"st0\" d=\"M6.9,17.24H5.17C2.32,17.24,0,19.56,0,22.41v43.1h6.9V17.24z\"\/>\n\t<path class=\"st0\" d=\"M70.28,89.66h-9.94v3.45h12.73l-1.25-2.49C71.53,90.02,70.94,89.66,70.28,89.66z\"\/>\n<\/g>\n<\/svg>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6178844 elementor-widget elementor-widget-text-editor\" data-id=\"6178844\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Advise that your data has been encrypted<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4418c64 elementor-column elementor-col-25 elementor-inner-column\" data-id=\"4418c64\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c6a5ef elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"5c6a5ef\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<!-- Generator: Adobe Illustrator 23.0.4, SVG Export Plug-In . SVG Version: 6.00 Build 0)  -->\n<svg version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 100 100\" style=\"enable-background:new 0 0 100 100;\" xml:space=\"preserve\">\n<style type=\"text\/css\">\n\t.st0{fill:#FFFFFF;}\n\t.st1{fill:#4E4E4F;}\n<\/style>\n<g>\n\t<path class=\"st1\" d=\"M38.28,100c8.64,0,15.33-0.83,20.7-2.52c-0.11-0.61-0.19-1.23-0.19-1.88c0-2.87,1.19-5.46,3.1-7.32\n\t\tc-1.91-1.86-3.1-4.45-3.1-7.32s1.19-5.46,3.1-7.32c-1.91-1.86-3.1-4.45-3.1-7.32s1.19-5.46,3.1-7.32c-1.91-1.86-3.1-4.45-3.1-7.32\n\t\tc0-3.39,1.67-6.38,4.22-8.25c-1.74-1.6-3.6-3.03-5.56-4.28c0.79-1,1.34-2.21,1.34-3.58c0-3.24-2.62-5.86-5.86-5.86h-29.3\n\t\tc-3.24,0-5.86,2.62-5.86,5.86c0,1.37,0.54,2.58,1.33,3.58C7.73,46.45,0,59.72,0,73.63C0,97.27,21.93,100,38.28,100z M38.25,71.56\n\t\tc-4.85,0-8.79-3.94-8.79-8.79c0-3.83,2.47-7.05,5.89-8.26V50.2c0-1.62,1.31-2.93,2.93-2.93s2.93,1.31,2.93,2.93v4.34\n\t\tc3.39,1.22,5.83,4.44,5.83,8.24c0,1.62-1.31,2.93-2.93,2.93c-1.62,0-2.93-1.31-2.93-2.93c0-1.62-1.31-2.93-2.93-2.93\n\t\tc-1.62,0-2.93,1.31-2.93,2.93s1.31,2.93,2.93,2.93c4.85,0,8.79,3.94,8.79,8.79c0,3.8-2.44,7.02-5.83,8.24v2.62\n\t\tc0,1.62-1.31,2.93-2.93,2.93s-2.93-1.31-2.93-2.93v-2.6c-3.42-1.2-5.89-4.43-5.89-8.26c0-1.62,1.31-2.93,2.93-2.93\n\t\tc1.62,0,2.93,1.31,2.93,2.93c0,1.62,1.31,2.93,2.93,2.93c1.62,0,2.93-1.31,2.93-2.93S39.87,71.56,38.25,71.56z\"\/>\n\t<path class=\"st1\" d=\"M95.61,91.21H69.04c-2.43,0-4.39,1.97-4.39,4.39s1.97,4.39,4.39,4.39h26.56c2.43,0,4.39-1.97,4.39-4.39\n\t\tS98.03,91.21,95.61,91.21z\"\/>\n\t<path class=\"st1\" d=\"M95.61,76.56H69.04c-2.43,0-4.39,1.97-4.39,4.39s1.97,4.39,4.39,4.39h26.56c2.43,0,4.39-1.97,4.39-4.39\n\t\tS98.03,76.56,95.61,76.56z\"\/>\n\t<path class=\"st1\" d=\"M95.61,61.91H69.04c-2.43,0-4.39,1.97-4.39,4.39s1.97,4.39,4.39,4.39h26.56c2.43,0,4.39-1.97,4.39-4.39\n\t\tS98.03,61.91,95.61,61.91z\"\/>\n\t<path class=\"st1\" d=\"M95.61,47.27H69.04c-2.43,0-4.39,1.97-4.39,4.39s1.97,4.39,4.39,4.39h26.56c2.43,0,4.39-1.97,4.39-4.39\n\t\tS98.03,47.27,95.61,47.27z\"\/>\n\t<path class=\"st1\" d=\"M46.53,5.86C45.32,2.46,42.1,0,38.28,0c-3.82,0-7.08,2.45-8.29,5.86H20.7c-0.94,0-1.83,0.45-2.38,1.22\n\t\tc-0.55,0.76-0.7,1.75-0.4,2.64l4.57,14.11h31.57l4.57-14.11c0.3-0.89,0.15-1.88-0.4-2.64c-0.55-0.76-1.44-1.22-2.38-1.22H46.53z\"\/>\n<\/g>\n<\/svg>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-288cf06 elementor-widget elementor-widget-text-editor\" data-id=\"288cf06\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Tell you how much to pay<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02b71ae elementor-column elementor-col-25 elementor-inner-column\" data-id=\"02b71ae\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33e9123 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"33e9123\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<!-- Generator: Adobe Illustrator 23.0.4, SVG Export Plug-In . SVG Version: 6.00 Build 0)  -->\n<svg version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 100 100\" style=\"enable-background:new 0 0 100 100;\" xml:space=\"preserve\">\n<style type=\"text\/css\">\n\t.st0{fill:#FFFFFF;}\n\t.st1{fill:#4E4E4F;}\n<\/style>\n<g id=\"Business-coin-cryptocurrency-digital-2_1_\">\n\t<path class=\"st0\" d=\"M60.71,42.86c-0.01-2.96-2.4-5.35-5.36-5.36H44.64v10.71h10.71C58.31,48.21,60.71,45.81,60.71,42.86z\"\/>\n\t<path class=\"st0\" d=\"M5.36,21.43v33.93h14.86c-6.69-10.07-7.79-22.86-2.93-33.93H5.36z\"\/>\n\t<path class=\"st0\" d=\"M60.71,28.57c-0.01-2.96-2.4-5.35-5.36-5.36H44.64v10.71h10.71C58.31,33.92,60.71,31.53,60.71,28.57z\"\/>\n\t<path class=\"st0\" d=\"M94.64,92.86c0,0.99-0.8,1.79-1.79,1.79H75V100h25V87.5h-5.36V92.86z\"\/>\n\t<circle class=\"st0\" cx=\"50\" cy=\"80.36\" r=\"1.79\"\/>\n\t<path class=\"st0\" d=\"M0,83.93h8.93c0.99,0,1.79,0.8,1.79,1.79v5.36h17.86c0.99,0,1.79,0.8,1.79,1.79V100h41.07v-7.14\n\t\tc0-0.99,0.8-1.79,1.79-1.79h17.86v-5.36c0-0.99,0.8-1.79,1.79-1.79H100V69.64H0V83.93z M50,75c2.95-0.01,5.35,2.38,5.35,5.33\n\t\tc0,2.27-1.43,4.3-3.57,5.05v2.11h1.79v3.57h-1.79v1.79h-3.57v-7.47c-2.78-0.98-4.25-4.03-3.27-6.82C45.7,76.43,47.73,75,50,75z\"\/>\n\t<path class=\"st0\" d=\"M7.14,92.86V87.5H0V100h26.79v-5.36H8.93C7.94,94.64,7.14,93.84,7.14,92.86z\"\/>\n\t<path class=\"st0\" d=\"M39.45,66.07h21.11c5.63-1.94,10.6-5.42,14.34-10.05c11.2-13.75,9.14-33.98-4.62-45.19S36.29,1.7,25.09,15.45\n\t\ts-9.14,33.98,4.62,45.19C32.61,63,35.91,64.84,39.45,66.07L39.45,66.07z M50,7.14c15.78,0,28.57,12.79,28.57,28.57\n\t\tS65.78,64.29,50,64.29S21.43,51.49,21.43,35.71C21.45,19.94,34.23,7.16,50,7.14z\"\/>\n\t<path class=\"st0\" d=\"M85.71,35.71c-0.01,6.99-2.07,13.82-5.93,19.64h14.86V21.43H82.71C84.69,25.93,85.71,30.8,85.71,35.71z\"\/>\n\t<path class=\"st0\" d=\"M68.79,66.07h30.11l-3.57-7.14H77.09C74.71,61.72,71.91,64.13,68.79,66.07z\"\/>\n\t<path class=\"st0\" d=\"M22.91,58.93H4.68l-3.57,7.14h30.11C28.09,64.14,25.29,61.73,22.91,58.93z\"\/>\n\t<path class=\"st0\" d=\"M50,60.71c13.81,0,25-11.19,25-25s-11.19-25-25-25s-25,11.19-25,25C25.01,49.52,36.2,60.7,50,60.71z\n\t\t M37.5,48.21h3.57v-25H37.5v-3.57h5.36v-3.57h3.57v3.57h5.36v-3.57h3.57v3.57c4.92-0.02,8.91,3.96,8.93,8.87\n\t\tc0.01,2.84-1.34,5.51-3.63,7.2c3.96,2.91,4.81,8.49,1.89,12.45c-1.68,2.29-4.36,3.63-7.2,3.63v3.57h-3.57v-3.57h-5.36v3.57h-3.57\n\t\tv-3.57H37.5V48.21z\"\/>\n\t<path class=\"st0\" d=\"M3.57,0h3.57v3.57H3.57V0z\"\/>\n\t<path class=\"st0\" d=\"M3.57,7.14h3.57v3.57H3.57V7.14z\"\/>\n\t<path class=\"st0\" d=\"M7.14,3.57h3.57v3.57H7.14V3.57z\"\/>\n\t<path class=\"st0\" d=\"M0,3.57h3.57v3.57H0V3.57z\"\/>\n\t<path class=\"st0\" d=\"M92.86,0h3.57v3.57h-3.57V0z\"\/>\n\t<path class=\"st0\" d=\"M92.86,7.14h3.57v3.57h-3.57V7.14z\"\/>\n\t<path class=\"st0\" d=\"M96.43,3.57H100v3.57h-3.57V3.57z\"\/>\n\t<path class=\"st0\" d=\"M89.29,3.57h3.57v3.57h-3.57V3.57z\"\/>\n<\/g>\n<\/svg>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-604ccea elementor-widget elementor-widget-text-editor\" data-id=\"604ccea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Explain how to pay<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7b0c92 elementor-column elementor-col-25 elementor-inner-column\" data-id=\"c7b0c92\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f869feb elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"f869feb\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<!-- Generator: Adobe Illustrator 23.0.4, SVG Export Plug-In . SVG Version: 6.00 Build 0)  -->\n<svg version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 100 100\" style=\"enable-background:new 0 0 100 100;\" xml:space=\"preserve\">\n<style type=\"text\/css\">\n\t.st0{fill:#FFFFFF;}\n\t.st1{fill:#4E4E4F;}\n<\/style>\n<g id=\"surface1_1_\">\n\t<path class=\"st1\" d=\"M55.36,52.5c-6.9,0-12.5,5.6-12.5,12.5s5.6,12.5,12.5,12.5s12.5-5.6,12.5-12.5\n\t\tC67.84,58.1,62.24,52.5,55.36,52.5z M57.21,68.68c0,1.06-0.87,1.92-1.92,1.92c-1.06,0-1.92-0.87-1.92-1.92v-3.89\n\t\tc0-1.06,0.87-1.92,1.92-1.92c1.06,0,1.92,0.87,1.92,1.92V68.68z\"\/>\n\t<path class=\"st1\" d=\"M92.72,25.14H19.57c-3.97,0-7.31,3.22-7.31,7.19v58.92h80.46c3.97,0,7.28-3.34,7.28-7.33V32.33\n\t\tC100,28.37,96.71,25.14,92.72,25.14z M55.34,81.35c-9.01,0-16.35-7.33-16.35-16.35c0-9.01,7.31-16.35,16.32-16.35\n\t\tc2.6,0,5.02,0.6,7.19,1.68v-3.97c0-3.99-3.2-7.24-7.19-7.24c-3,0-5.67,1.87-6.73,4.69c-0.38,0.98-1.49,1.49-2.48,1.13\n\t\tc-0.99-0.38-1.51-1.49-1.13-2.48c1.61-4.3,5.77-7.19,10.36-7.19c6.11,0,11.03,4.98,11.03,11.08v6.63\n\t\tc3.37,2.98,5.29,7.26,5.29,11.99C71.63,74.02,64.35,81.35,55.34,81.35z\"\/>\n\t<path class=\"st1\" d=\"M46.18,21.3l-8.51-10.5c-1.37-1.68-3.41-2.72-5.58-2.72H7.28C3.29,8.08,0,11.42,0,15.41v68.53\n\t\tc0,3.97,3.29,7.33,7.28,7.33h1.13V32.33c0-6.11,5.07-11.03,11.15-11.03H46.18z\"\/>\n<\/g>\n<\/svg>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03d2907 elementor-widget elementor-widget-text-editor\" data-id=\"03d2907\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Tell you what will happen when you pay<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf5a8c3 elementor-widget elementor-widget-text-editor\" data-id=\"cf5a8c3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">A ransomware notification may also pressure you to make a quick decision by having a ransom that increases if you delay paying or including a time limit after which you will never get your data back<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-d9fc44a elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"d9fc44a\" data-element_type=\"section\" id=\"the-business-model\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5fd81b elementor-column elementor-col-100 elementor-inner-column\" data-id=\"a5fd81b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50f5ea5 elementor-widget elementor-widget-heading\" data-id=\"50f5ea5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>4.0.<\/b> The business model - how ransomware makes money and how bitcoin is involved<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4899e97 elementor-widget elementor-widget-text-editor\" data-id=\"4899e97\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Ransom demands ask to be paid using cryptocurrency, usually bitcoins, because they use digital wallets that are anonymous &#8211; and therefore appealing to cyber criminals.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-090eacb elementor-widget elementor-widget-heading\" data-id=\"090eacb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">$ How much is a typical ransom?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a7ff6 elementor-widget elementor-widget-text-editor\" data-id=\"a5a7ff6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Ransoms range from a few hundred dollars to over a million, and average in the thousands. Ransoms have been increasing each year and almost doubled in 2019 to an estimated <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-the-cost-of-rescuing-your-files-is-going-up-as-attackers-get-more-sophisticated\/\">$12,000<\/a>.<br \/><br \/><br \/>In 2016, the estimated total cost in the US reached the <a href=\"https:\/\/money.cnn.com\/2016\/04\/15\/technology\/ransomware-cyber-security\/\">billion-dollar threshold<\/a> and by 2018 the global cost of ransomware reached an estimated <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-exceed-8-billion-in-2018\/\">8 billion a year<\/a>.<\/p><p>Over time, cyber criminals have also improved their strategy, focusing on &#8220;soft target&#8221; organizations who are more likely to pay higher amounts of ransom because of the higher cost of business disruption.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7d5f50 elementor-widget elementor-widget-heading\" data-id=\"f7d5f50\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">$ What are the additional costs of an attack?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-e80906c elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"e80906c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ccea02 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"6ccea02\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-728b957 elementor-widget elementor-widget-text-editor\" data-id=\"728b957\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Ransomware response firm Coveware\u2019s <a href=\"https:\/\/www.coveware.com\/blog\/2019\/4\/15\/ransom-amounts-rise-90-in-q1-as-ryuk-ransomware-increases\">2019 ransomware report<\/a> estimates that the average downtime due to a ransomware infection is 7.3 days. That\u2019s over a week\u2019s lost income and does not take into account the cost of managing the recovery process.\n\n<br\/><br\/>\n2019 has seen many attacks on public institutions and has a high success rate with counties and schools<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4fecb6 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"d4fecb6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eafb724 elementor-widget elementor-widget-image\" data-id=\"eafb724\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.backupassist.com\/app\/uploads\/2019\/10\/Picture-3.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"Picture 3\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"931\" height=\"581\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-3.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-3.png 931w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-3-300x187.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-3-768x479.png 768w\" sizes=\"auto, (max-width: 931px) 100vw, 931px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-0a467d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"0a467d6\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d788e62 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"d788e62\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e76d007 elementor-widget elementor-widget-text-editor\" data-id=\"e76d007\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">2019 snapshot of summertime for IT staff in the US counties<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97e1d34 elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"97e1d34\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;rotating_text&quot;:&quot;Palm Beach County: $600,000\\nLake City Florida: $460,000\\nLa Porte County: $130,000\\nJackson County: $400,000\\nMonroe College $2,000,000&quot;,&quot;animation_type&quot;:&quot;typing&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-headline elementor-headline-animation-type-typing elementor-headline-letters\">\n\t\t\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\"><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af65dfb elementor-widget elementor-widget-text-editor\" data-id=\"af65dfb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>demanded in ransom<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-1195b6a elementor-widget elementor-widget-heading\" data-id=\"1195b6a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">$ Does paying a ransom fix the problem?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d184948 elementor-widget elementor-widget-text-editor\" data-id=\"d184948\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>This is a complex question with both immediate and global implications.<\/p><p>Will you get your data back? Most ransomware payments result on the delivery of a decryption key, but about 5% of paid ransoms are not sent a decryption key. But even if your data is decrypted, your network may still be compromised by backdoors and malware. This can lead to <strong>repeat victims<\/strong> &#8211; users who show they are willing to pay and are targeted again by ransomware.<\/p><p>The lesson here is that if you pay, it may not be the end of it. You could be targeted again and, as explained in the backdoor section, all impacted servers and machines will still need to be rebuilt.<\/p><p>On a global level, many law enforcement agencies recommend against paying the ransom on the basis that it only encourages the cyber criminals. However, for organizations that failed to prepare and institute adequate ransomware protection, this viewpoint is of little benefit.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89664db elementor-widget elementor-widget-heading\" data-id=\"89664db\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">$ How do you avoid paying a ransom?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5baa20 elementor-widget elementor-widget-text-editor\" data-id=\"c5baa20\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">To pay a ransom with bitcoin, you must get an account and a bitcoin wallet with one of the online bitcoin exchanges. This process includes providing identification information to verify your identity. You then have to buy bitcoins, send them to your wallet and then use the wallet to transfer the ransom to the address of the wallet detailed in the ransomware notification.\n<br\/><br\/>\nThis process itself can be a problem because it takes time (often over a week) for an account and wallet to be verified by the exchange, and ransoms often have a limited window of time to make the payment.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da4dd64 elementor-widget elementor-widget-heading\" data-id=\"da4dd64\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">$ How do you avoid pay a ransom?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1368a9 elementor-widget elementor-widget-text-editor\" data-id=\"e1368a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>There are only two ways to avoid paying the ransom:<\/p><ol><li>Accept that you have lost your data, or<\/li><li>Recover your data from a backup<\/li><\/ol><p>If you prepared in advance, putting in place <strong>robust ransomware protection with the right backup<\/strong>, then the recovery should be both predictable and a matter of following a well-defined process.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-029b3cb elementor-widget elementor-widget-text-editor\" data-id=\"029b3cb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><strong>Before we continue&#8230;<\/strong><\/p><p>Achieving <strong>resilience<\/strong> through the right <strong>ransomware protection<\/strong> is attainable for every business&#8230;<\/p><p>But little mistakes and oversights can undermine the effectiveness of any backup and recovery plan.\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-bab6698 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"bab6698\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e601cd elementor-column elementor-col-33 elementor-inner-column\" data-id=\"9e601cd\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f97f65 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"0f97f65\" data-element_type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;were unable to do&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-headline\">\n\t\t\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">A recovery is what companies that pay ransoms<\/span>\n\t\t\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\"><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-130b8d0 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"130b8d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6898fce elementor-column elementor-col-33 elementor-inner-column\" data-id=\"6898fce\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25ba3ab elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"25ba3ab\" data-element_type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;should be able to do&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-headline\">\n\t\t\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">A recovery is something every company<\/span>\n\t\t\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\"><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-6916f2c elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"6916f2c\" data-element_type=\"section\" id=\"staying-safe\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9476031 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"9476031\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3c32c7 elementor-widget elementor-widget-heading\" data-id=\"c3c32c7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>5.0.<\/b> Staying safe and resilient to ransomware<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-f4e350c elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"f4e350c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b4dd85 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"6b4dd85\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dbc809 elementor-widget elementor-widget-heading\" data-id=\"9dbc809\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The 10 building blocks of a ransomware resilient business<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a63622 elementor-widget elementor-widget-text-editor\" data-id=\"9a63622\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Can every business be cyber-resilient by putting in the correct <strong>ransomware protections<\/strong>? Yes.<\/p><p>But firstly, it&#8217;s important to understand that\u00a0there is no silver bullet to fight ransomware. It\u2019s impossible to guarantee that you\u2019ll be protected against every attack in the future, because:<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f40aac pp-icon-list-traditional pp-icon-left elementor-widget elementor-widget-pp-icon-list\" data-id=\"9f40aac\" data-element_type=\"widget\" data-widget_type=\"pp-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"pp-list-container\">\n            <ul class=\"pp-list-items\">\n                                                            <li>\n                            \t\t\t<span class=\"pp-icon-wrapper\">\n\t\t\t\t<span class=\"pp-icon-list-icon pp-icon \">\t\t\t\t\t\t\t\t\t<i class=\"fa fa-user-circle\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\t\t\t<\/span>\n\t\t\t<span class=\"pp-icon-list-text\">Users will always make mistakes<\/span>                        <\/li>\n                                                                                <li>\n                            \t\t\t<span class=\"pp-icon-wrapper\">\n\t\t\t\t<span class=\"pp-icon-list-icon pp-icon \">\t\t\t\t\t\t\t\t\t<i class=\"fa fa-laptop\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\t\t\t<\/span>\n\t\t\t<span class=\"pp-icon-list-text\">Machines are never infallible - vulnerabilities and zero-days will always exist<\/span>                        <\/li>\n                                                <\/ul>\n        <\/div>\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc551fa elementor-widget elementor-widget-text-editor\" data-id=\"dc551fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>However, if you follow these 10 key steps to ransomware resilience, you\u2019ll safeguard your organization and its future by taking positive and effective steps towards both <strong>prevention<\/strong> and <strong>remediation<\/strong>.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1871263 elementor-headline--style-highlight elementor-invisible elementor-widget elementor-widget-animated-headline\" data-id=\"1871263\" data-element_type=\"widget\" data-settings=\"{&quot;marker&quot;:&quot;double_underline&quot;,&quot;highlighted_text&quot;:&quot;Prevention&quot;,&quot;_animation&quot;:&quot;slideInRight&quot;,&quot;headline_style&quot;:&quot;highlight&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-headline\">\n\t\t\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\"><\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">steps repel ransomware attacks<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e9e42e elementor-headline--style-highlight elementor-invisible elementor-widget elementor-widget-animated-headline\" data-id=\"5e9e42e\" data-element_type=\"widget\" data-settings=\"{&quot;marker&quot;:&quot;double_underline&quot;,&quot;highlighted_text&quot;:&quot;Remediation&quot;,&quot;_animation&quot;:&quot;slideInLeft&quot;,&quot;headline_style&quot;:&quot;highlight&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-headline\">\n\t\t\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\"><\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">steps enable a predictable recovery<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3847dca elementor-widget elementor-widget-text-editor\" data-id=\"3847dca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>\u00a0<\/p><p>Given that prevention is never 100% effective, we always recommend combining it with remediation as part of a holistic cyber-resilience strategy.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de11ee elementor-widget elementor-widget-heading\" data-id=\"2de11ee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">PREVENTION - How to repel ransomware<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd27dea elementor-widget elementor-widget-text-editor\" data-id=\"dd27dea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><span lang=\"EN-US\">The first seven steps are all about preventing a ransomware outbreak in the first place. The more of these steps you take, the less likely you are to be infected.<\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-94cd7d0 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"94cd7d0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36dc1e0 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"36dc1e0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9755ea6 elementor-widget elementor-widget-heading\" data-id=\"9755ea6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">1<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c216c8c elementor-widget elementor-widget-text-editor\" data-id=\"c216c8c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Use anti-virus software and email filtering<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-435e6a2 elementor-widget elementor-widget-text-editor\" data-id=\"435e6a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Have antivirus software installed on all machines. The software should be updated regularly and scan files that are opened and sent.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5eaf6a elementor-column elementor-col-50 elementor-inner-column\" data-id=\"d5eaf6a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37d6854 elementor-widget elementor-widget-text-editor\" data-id=\"37d6854\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><strong>ACTION : <\/strong>check that the antivirus on all servers and desktops is updating correctly.<\/p><p>Set up email filtering on your mail server. Email filters check for spam, emails from suspicious sources, known malware and ransomware, and can also check emails with attachments.<br \/><br \/><br \/><strong>ACTION : <\/strong>check that your email filtering is configured to protect you from ransomware. For example criteria that checks emails addressed to people in your domain that don\u2019t exist.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-9315be9 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"9315be9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23f6244 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"23f6244\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3dad5d elementor-widget elementor-widget-text-editor\" data-id=\"b3dad5d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>ACTION :<\/strong>\u00a0Put a process in place to review and implement security updates. Any high to extreme risk vulnerabilities should be patched in 48 hours.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cd42f3 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"0cd42f3\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa94e6 elementor-widget elementor-widget-heading\" data-id=\"8aa94e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">2<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ef2e5b elementor-widget elementor-widget-text-editor\" data-id=\"5ef2e5b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><b style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-US\">Patch and update your computers<\/span><\/b><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-017ac9a elementor-widget elementor-widget-text-editor\" data-id=\"017ac9a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">All server and desktop operating systems should be kept up to date with patches. These patches often include security enhancements based on new threats and exploits.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-0f200e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"0f200e3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e317a1f elementor-column elementor-col-50 elementor-inner-column\" data-id=\"e317a1f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-426dfb5 elementor-widget elementor-widget-heading\" data-id=\"426dfb5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">3<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-011ed74 elementor-widget elementor-widget-text-editor\" data-id=\"011ed74\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Patch and update your software<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab4841d elementor-widget elementor-widget-text-editor\" data-id=\"ab4841d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><span lang=\"EN-US\">Most applications include processes that access the internet making them open to exploitation by ransomware. <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c074fed elementor-column elementor-col-50 elementor-inner-column\" data-id=\"c074fed\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-065dced elementor-widget elementor-widget-text-editor\" data-id=\"065dced\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>ACTION :<\/strong>\u00a0Audit all applications to ensure they are securely configured and patched. Check for applications that are no longer supported, as they may need to be upgraded. Applications like Flash, web browsers, Microsoft Office, Java and PDF viewers in particular should be patched.\n<BR\/><BR\/>\n<strong>ACTION : <\/strong>Configure your web browsers to block Flash and Java if those features are not needed, and review any Microsoft Office macros that access the internet.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-8230e79 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"8230e79\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dec34c2 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"dec34c2\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f019535 elementor-widget elementor-widget-text-editor\" data-id=\"f019535\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>ACTION :<\/strong>\u00a0Consider implementing multi-factor authentication for remote access activities such as RDP and VPN connection. You can also implement this for access to important areas in your network. Check out <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/08\/protect-rdp-access-ransomware-attacks\/\">this resource<\/a> on how to secure RDP and this recent <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/08\/microsoft-warns-of-more-wormable-bugs-this-time-in-new-versions-of-windows\/\">example<\/a> from 2019.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b44da73 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"b44da73\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a87881d elementor-widget elementor-widget-heading\" data-id=\"a87881d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">4<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80b3b73 elementor-widget elementor-widget-text-editor\" data-id=\"80b3b73\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Secure any remote access points <\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfbf752 elementor-widget elementor-widget-text-editor\" data-id=\"bfbf752\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Remote tools like RDP (Remote desktop protocol) allow remote access to computers for remote work and system support. RDP is a frequent target of ransomware and must be configured securely.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-d1b82a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"d1b82a4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ccd3bc elementor-column elementor-col-50 elementor-inner-column\" data-id=\"7ccd3bc\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f32114 elementor-widget elementor-widget-heading\" data-id=\"0f32114\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">5<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-692f523 elementor-widget elementor-widget-text-editor\" data-id=\"692f523\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Do not use simple or default credentials<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d17547 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"5d17547\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3dfc1a elementor-widget elementor-widget-text-editor\" data-id=\"e3dfc1a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><strong>ACTION :<\/strong> Check your user password requirements and ensure all RDP passwords are <a href=\"https:\/\/blog.avast.com\/strong-password-ideas\">strong<\/a>.<br \/><br \/><br \/><strong>ACTION :<\/strong> Check that administration privileges have only been given to users and processes that need them, and that they are only used for tasks that need those privileges.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-290e5ef elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"290e5ef\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a705ee7 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"a705ee7\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41bd699 elementor-widget elementor-widget-text-editor\" data-id=\"41bd699\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>ACTION<\/strong> <strong>:<\/strong> Check how often data is moved or shared in your business or organization using removal drives, and if a safer option could be used &#8211; such as Dropbox or Google Drive.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4c63a6 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"d4c63a6\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-926c520 elementor-widget elementor-widget-heading\" data-id=\"926c520\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">6<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58c0823 elementor-widget elementor-widget-text-editor\" data-id=\"58c0823\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Be careful with attached devices<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f473bc elementor-widget elementor-widget-text-editor\" data-id=\"2f473bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Manage the use of removable storage devices such as thumb drives and USB drives on company computers. Restrict access to removable drives and devices that are used for backups and keep them safe.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-3bc5d3d elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"3bc5d3d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81e09e8 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"81e09e8\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0cde376 elementor-widget elementor-widget-heading\" data-id=\"0cde376\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">7<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a88b124 elementor-widget elementor-widget-text-editor\" data-id=\"a88b124\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Promote user awareness<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc95c6d elementor-widget elementor-widget-text-editor\" data-id=\"cc95c6d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Even though you will have anti-virus and email filtering software installed, no software is infallible. That means user awareness is also important to protect against ransomware that arrives through messages and emails that contain links or attachments. They are worded to encourage users to trust them and open the link or attachment. It is important for users to understand this threat and to exercise caution with all such emails.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8c1bb1 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"e8c1bb1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a9b02f elementor-widget elementor-widget-text-editor\" data-id=\"5a9b02f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><strong>ACTION : Develop a suspicious email checklist and distribute it to all staff<\/strong><\/p><p>This email checklist could include the following:<\/p><p>\u00a0<\/p><ul><li><em>Does an email\u2019s wording sound vague?<\/em><\/li><li><em>Does an email\u2019s address look correct for who the email purports to be from?<\/em><\/li><li><em>Does an email\u2019s address have modified spelling to make it look like a trusted source?<\/em><\/li><li><em>Are there any spelling errors in the main part of the email?<\/em><\/li><li><em>Is there a sense of urgency?<\/em><\/li><li><em>Do you recognize the attachment\u2019s file extension?<\/em><\/li><\/ul><p><em>If the answer to any of these is <strong>yes<\/strong>, then there is every reason to be concerned and your IT support should be informed. If you have the option, call the sender to verify the email.<\/em><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a8571d elementor-widget elementor-widget-heading\" data-id=\"7a8571d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">REMEDIATION - How to recover from a ransomware attack<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab02a31 elementor-widget elementor-widget-text-editor\" data-id=\"ab02a31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">The final three steps are all about being able to remediate your systems and continue operations without needing to pay the ransom.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-4812813 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"4812813\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0747c13 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"0747c13\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb69700 elementor-widget elementor-widget-heading\" data-id=\"bb69700\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">8<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0637f1c elementor-widget elementor-widget-text-editor\" data-id=\"0637f1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Back up all your important data<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-984cca4 elementor-widget elementor-widget-text-editor\" data-id=\"984cca4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Ensure that you have full, regular backups of all the servers, desktops and devices that you can\u2019t afford to lose.<strong>\u00a0<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025ab93 elementor-widget elementor-widget-text-editor\" data-id=\"025ab93\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>&#8221;\u00a0 \u00a0THIS POINT IS NOT OPTIONAL. <\/strong><strong>Recovering from backups is the only safe way to recover from ransomware.\u00a0 \u00a0&#8220;<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49dc6fa elementor-widget elementor-widget-text-editor\" data-id=\"49dc6fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">This means you should have identified what systems and data are critical to your business and must be restored or recovered in the event of an attack.\n\nYou should also ensure that you have the right backup system for your organization. We\u2019ll discuss this in more detail later in the article.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3a8f17 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"f3a8f17\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dc17a4 elementor-widget elementor-widget-text-editor\" data-id=\"9dc17a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>ACTION : <\/strong>To check that your backup strategy is adequate, perform test recoveries for your systems. This will confirm if your backup and recovery plan functions as intended.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-1682c42 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"1682c42\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36f7ef7 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"36f7ef7\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-172cce6 elementor-widget elementor-widget-text-editor\" data-id=\"172cce6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>The mistake many people make is setting up their backup system once, and letting it run for months or years without ever testing a recovery. The problem is that things can change over time:<br \/><br \/><br \/><\/p><ul><li>Administrators can add extra hard drives or Network Attached Storage but forget to change their backup configuration to add the new storage devices to the backup<\/li><li>Backup media \u2013 such as hard drives \u2013 can become worn out over time and stop working<\/li><li>Hackers can disable or sabotage the backups ahead of a ransomware attack, to make it impossible to recover.<\/li><\/ul><p>Monitoring and testing your backup system enables you to detect these and other problems ahead of time.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85ba2f4 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"85ba2f4\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1669950 elementor-widget elementor-widget-heading\" data-id=\"1669950\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">9<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-440109a elementor-widget elementor-widget-text-editor\" data-id=\"440109a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Monitor and test your backups regularly by doing recoveries<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca94733 elementor-widget elementor-widget-text-editor\" data-id=\"ca94733\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">It\u2019s vitally important to perform test recoveries from backup, to make sure that the backup is complete, effective and functioning properly.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-5654ee8 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"5654ee8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b846646 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"b846646\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d9698e elementor-widget elementor-widget-heading\" data-id=\"9d9698e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">10<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2703720 elementor-widget elementor-widget-text-editor\" data-id=\"2703720\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Have a Ransomware Response Plan<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cced48e elementor-widget elementor-widget-text-editor\" data-id=\"cced48e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>The difference between a panicked and efficient response can be the existence of a documented response plan. It does not need to be long or detailed, just the steps to go through when an infection is detected. What are the first 4 things you should do? Who should be contacted? How or when do you recover? How do you work out what has happened? All these questions have answers but they need to be thought through and agreed on.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dee00e6 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"dee00e6\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4089d8 elementor-widget elementor-widget-text-editor\" data-id=\"d4089d8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>ACTION : Create a document for a Ransomware Response Plan.<\/strong>\n\nA ransomware response plan explains what to do and will be different for every business or organization.<BR\/><BR\/>\n<ol>\n \t<li>Look at the section below for guidance.<\/li>\n \t<li>Look at online resources for guidance<\/li>\n \t<li>Get input from stakeholders and IT staff.<\/li>\n \t<li>Test your Ransomware Response Plan by performing the documented tasks<\/li>\n \t<li>Get approval across the business<\/li>\n \t<li>Distribute the Ransomware Response Plan and train staff in how to use it.<\/li>\n<\/ol>\n<strong>ACTION : Create a business continuity plan<\/strong>\n\nThe business continuity plan explains how you can continue to operate at a limited capacity while computer systems are unavailable.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-0891fa1 pp-icon-list-traditional pp-icon-left elementor-widget elementor-widget-pp-icon-list\" data-id=\"0891fa1\" data-element_type=\"widget\" data-widget_type=\"pp-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"pp-list-container\">\n            <ul class=\"pp-list-items\">\n                                                            <li>\n                            \t\t\t<span class=\"pp-icon-wrapper\">\n\t\t\t\t<span class=\"pp-icon-list-icon pp-icon \">\t\t\t\t\t\t\t\t\t<i class=\"fa fa-exclamation-triangle\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\t\t\t<\/span>\n\t\t\t<span class=\"pp-icon-list-text\">You cannot be Uncle Scrooge and ransomware resilient at the same time!<\/span>                        <\/li>\n                                                <\/ul>\n        <\/div>\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-036cefa pp-icon-right pp-icon-list-traditional elementor-widget elementor-widget-pp-icon-list\" data-id=\"036cefa\" data-element_type=\"widget\" data-widget_type=\"pp-icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"pp-list-container\">\n            <ul class=\"pp-list-items\">\n                                                            <li>\n                            \t\t\t<span class=\"pp-icon-wrapper\">\n\t\t\t\t<span class=\"pp-icon-list-icon pp-icon \">\t\t\t\t\t\t\t\t\t<i class=\"fa fa-check-circle\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\t\t\t<\/span>\n\t\t\t<span class=\"pp-icon-list-text\">If there's one lesson to learn from history, it's this: INVEST IN DATA PROTECTION<\/span>                        <\/li>\n                                                <\/ul>\n        <\/div>\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29c9dcb elementor-widget elementor-widget-text-editor\" data-id=\"29c9dcb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><span style=\"letter-spacing: -0.3px;\">There\u2019s a common thread among organizations that are taken down by ransomware, and a reason why so many public authorities are shut down by ransomware \u2013 underinvestment. As part of your IT budget, invest in staff training, system recovery exercises, and updating and maintaining hardware and software.<\/span>\n<br\/><br\/>\n<b>ACTION : Review this list and note any items worth following up for your business<\/b><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-af829c6 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"af829c6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c701f1 elementor-column elementor-col-20 elementor-inner-column\" data-id=\"6c701f1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac781ad elementor-widget elementor-widget-heading\" data-id=\"ac781ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">1<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbeeda2 elementor-widget elementor-widget-text-editor\" data-id=\"cbeeda2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><span lang=\"EN-US\">Have<\/span><span lang=\"EN-US\"> a specialist security consultant review your vulnerability to ransomware<\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cce05af elementor-column elementor-col-20 elementor-inner-column\" data-id=\"cce05af\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae84d6 elementor-widget elementor-widget-heading\" data-id=\"1ae84d6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">2<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ac5875 elementor-widget elementor-widget-text-editor\" data-id=\"7ac5875\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><!--[endif]--><span lang=\"EN-US\">Audit your systems to see if any of <\/span><span lang=\"EN-US\">them should be upgraded to <\/span><span lang=\"EN-US\">more secure versions<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-808fcb5 elementor-column elementor-col-20 elementor-inner-column\" data-id=\"808fcb5\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12620d8 elementor-widget elementor-widget-heading\" data-id=\"12620d8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">3<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1853911 elementor-widget elementor-widget-text-editor\" data-id=\"1853911\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Look at network and computer security training opportunities for your staff<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79fde88 elementor-column elementor-col-20 elementor-inner-column\" data-id=\"79fde88\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6758967 elementor-widget elementor-widget-heading\" data-id=\"6758967\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">4<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db9d398 elementor-widget elementor-widget-text-editor\" data-id=\"db9d398\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Budget for an annual system recovery exercise<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ab5be3 elementor-column elementor-col-20 elementor-inner-column\" data-id=\"6ab5be3\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-533c832 elementor-widget elementor-widget-heading\" data-id=\"533c832\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">5<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdd3e3e elementor-widget elementor-widget-text-editor\" data-id=\"cdd3e3e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Initiate a review to ensure all systems have adequate backups with secure destinations<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-256db74 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"256db74\" data-element_type=\"section\" id=\"zeroing-in-on-backups\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-246f51e elementor-column elementor-col-100 elementor-inner-column\" data-id=\"246f51e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64cb0ec elementor-widget elementor-widget-heading\" data-id=\"64cb0ec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>6.0.<\/b> Zeroing in on backups \u2013 do your backups deliver the right ransomware protection?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-881df99 elementor-widget elementor-widget-text-editor\" data-id=\"881df99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>In the previous section, recovering from a backup is the only sure way to get your data back without paying the ransom. A solid backup strategy is the cornerstone of any ransomware protection system.\u00a0<\/p><p>So let\u2019s see if your backup plan is up to scratch \u2013 by taking a quiz!<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-40dc7e0 elementor-widget elementor-widget-heading\" data-id=\"40dc7e0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How effective are your backups as a ransomware protection?<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d4a935 elementor-widget elementor-widget-text-editor\" data-id=\"0d4a935\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Ready your mouse \u2013 no cheating!<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-f2cc398 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"f2cc398\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52e01ef elementor-column elementor-col-33 elementor-inner-column\" data-id=\"52e01ef\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42fba5c elementor-widget elementor-widget-heading\" data-id=\"42fba5c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">I use the right backup type<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e48665 elementor-widget elementor-widget-heading\" data-id=\"3e48665\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">The right backup type for you will be one that successfully recovers a computer from a backup to a new or reformatted disk. \nIt is possible to recover from a file-based backup - that is, you back up only your files, but not your system. However if you do, you\u2019ll have to rebuild your machine, install the Operating System and all applications, and make any required configuration changes. This might be easy if your organization uses a Standard Operating Environment (SOE), but for SMEs who do not use SOEs, this is going to be troublesome and result in more downtime. \nIf that is the case, we recommend creating full image backups of your systems. An image is a snapshot of the operating system and all data on the disk, and it can be used for a bare-metal recovery.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f57ac51 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"f57ac51\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cd9c92 elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"5cd9c92\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tYES\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably will help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91e9687 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"91e9687\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77a4ed7 elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"77a4ed7\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tNO\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably won\u2019t help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-c2cffa8 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"c2cffa8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f428e1 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"3f428e1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd4ab46 elementor-widget elementor-widget-heading\" data-id=\"cd4ab46\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">I use a secure backup destination<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47b76b6 elementor-widget elementor-widget-heading\" data-id=\"47b76b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">If your backups use destinations you can browse to, then ransomware can infect them. The best option is to always use secure backup destinations. These are often called offline or air-gapped destinations. Examples are media that are disconnected after each backup and authenticated cloud destinations that ransomware cannot spread to.\n<br><br>\n<i>Warning: If you do use a destination that you can browse to, you must have additional backups that ransomware can\u2019t reach. E.g a weekly backup to a cloud destination, but this means your recovery point is a week old. The best option is to always use secure backup destinations.<\/i><\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-becbb86 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"becbb86\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f863b60 elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"f863b60\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tYES\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably will help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-639ce04 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"639ce04\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c211b8b elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"c211b8b\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tNO\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably won\u2019t help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-b9f0cb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"b9f0cb1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3114ccf elementor-column elementor-col-33 elementor-inner-column\" data-id=\"3114ccf\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56f3b5b elementor-widget elementor-widget-heading\" data-id=\"56f3b5b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">I know my Recovery Point Objective<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdb5915 elementor-widget elementor-widget-heading\" data-id=\"cdb5915\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">When a computer is recovered from backup, it will be recovered to how it was at the time the backup job started. If your mail server is recovered using a 3-day old backup, you will lose 3 days\u2019 worth of emails. Your recovery point objective (RPO) is how long a gap your business can afford to go back in time - and therefore how frequent your image backups to secure destinations should be made.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e68b elementor-column elementor-col-33 elementor-inner-column\" data-id=\"c50e68b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd31cb8 elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"cd31cb8\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tYES\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably will help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb9eaf6 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"bb9eaf6\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d075514 elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"d075514\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tNO\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably won\u2019t help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-ed680f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"ed680f0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85e2f3a elementor-column elementor-col-33 elementor-inner-column\" data-id=\"85e2f3a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9c0590 elementor-widget elementor-widget-heading\" data-id=\"e9c0590\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">I test my backups<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88846fc elementor-widget elementor-widget-heading\" data-id=\"88846fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Unless you have tested your backups, you don\u2019t know if they work. The only way to test your backups is to perform a full bare-metal server recovery, and to test that the recovered server works as intended.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8043bbc elementor-column elementor-col-33 elementor-inner-column\" data-id=\"8043bbc\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2e83bd elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"e2e83bd\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tYES\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably will help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ebcbed elementor-column elementor-col-33 elementor-inner-column\" data-id=\"0ebcbed\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3817c9a elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"3817c9a\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tNO\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably won\u2019t help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-e421712 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"e421712\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9372087 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"9372087\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d541ad elementor-widget elementor-widget-heading\" data-id=\"1d541ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">I train my staff<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e03464d elementor-widget elementor-widget-heading\" data-id=\"e03464d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Performing a recovery of a full system is a lot harder than restoring files. Your IT staff need to be familiar with the process. A ransomware attack is not the time to learn as you go.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4724857 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"4724857\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81839a4 elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"81839a4\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tYES\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably will help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd24301 elementor-column elementor-col-33 elementor-inner-column\" data-id=\"cd24301\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15cd20b elementor-flip-box--effect-flip elementor-flip-box--direction-up elementor-widget elementor-widget-flip-box\" data-id=\"15cd20b\" data-element_type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-flip-box\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i class=\"fas fa-star\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tNO\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tYour backups probably won\u2019t help with ransomware\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2d22de elementor-widget elementor-widget-text-editor\" data-id=\"b2d22de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">QUIZ RESULTS<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46bae13 elementor-widget elementor-widget-heading\" data-id=\"46bae13\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">If you selected NO for the first 2, your backups probably won\u2019t help with ransomware<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-233e8ef elementor-widget elementor-widget-heading\" data-id=\"233e8ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">If you selected NO for any - your backup plan may not give the result you had hoped for<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5889b4 elementor-widget elementor-widget-heading\" data-id=\"e5889b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">If you selected YES to all \u2013 congratulations, your backups can save you from ransomware<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e41faff elementor-widget elementor-widget-text-editor\" data-id=\"e41faff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>A quick note about the importance of testing backups<\/strong>\n\n\nPerforming a test recovery will reveal possible issues including:\n<ul>\n \t<li>If some of the backup are corrupted due to hardware or data transfer issues<\/li>\n \t<li>If the replacement drive fails to meet the requirements for a recovery<\/li>\n \t<li>That the process of replacing the current physical drive has no unexpected problems<\/li>\n \t<li>That the computer\u2019s firmware supports the recovery process<\/li>\n \t<li>That you are familiar with any networking and connectivity requirements<\/li>\n<\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-9059ea7 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"9059ea7\" data-element_type=\"section\" id=\"hitting-pause\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ef8f3e elementor-column elementor-col-100 elementor-inner-column\" data-id=\"3ef8f3e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5b486d elementor-widget elementor-widget-heading\" data-id=\"c5b486d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>7.0. <\/b>Hitting pause \u2013 a quick review of what we\u2019ve covered before looking at how to respond to a ransomware attack<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfaa166 elementor-widget elementor-widget-text-editor\" data-id=\"cfaa166\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">You can\u2019t pause things during an actual ransomware infection, so we\u2019ll take one now and recap a couple of things we\u2019ve covered before looking at how to respond to a ransomware attack.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7e8b62 elementor-widget elementor-widget-text-editor\" data-id=\"c7e8b62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>In the previous sections<\/strong> &#8211; we explained what ransomware is, how it works and how you can avoid it \u2013 and noted that every business or organization should have:<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-8f7ae52 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"8f7ae52\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-483c124 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"483c124\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49c76d1 elementor-widget elementor-widget-heading\" data-id=\"49c76d1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A Business Continuity Plan <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f6d493 elementor-widget elementor-widget-text-editor\" data-id=\"9f6d493\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>This is outside the scope of this document and there are plenty of resources online. The best way to begin is to go through each business function and look at ways it could be performed without computers. It could be using pen and paper, phone apps, relocating to a partner site or just deciding it can\u2019t be done and what that would mean. The main thing is that this is all considered, team by team, function by function, and documented.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-d0f0e8b elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"d0f0e8b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e007ce4 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"e007ce4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60a908a elementor-widget elementor-widget-heading\" data-id=\"60a908a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A Ransomware Response Plan <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bc1411 elementor-widget elementor-widget-text-editor\" data-id=\"0bc1411\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>This lays out the process to follow when a ransomware infection is detected. The goal is to minimize the impact and work quickly towards a solution. In the next section, we will go through <a href=\"#ransomware-response-plan\">4 steps to consider when formulating this plan<\/a>.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-e874309 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"e874309\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-395f219 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"395f219\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36d397c elementor-widget elementor-widget-heading\" data-id=\"36d397c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A Disaster Recovery Plan <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-770874f elementor-widget elementor-widget-text-editor\" data-id=\"770874f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>This explains the technical steps to follow when performing bare-metal recoveries of your systems from backups. This is a technical document, but in the section below we\u2019ll go through <a href=\"#the-disaster-recovery-plan\">5 steps to consider when formulating your plan<\/a>.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cefa38 elementor-widget elementor-widget-text-editor\" data-id=\"8cefa38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">These plans could be in the same or different documents and will be tailored to your own needs, based on the type and size of your business or organization.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-891c36a elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"891c36a\" data-element_type=\"section\" id=\"ransomware-response-resources\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84c5a54 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"84c5a54\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d86345a elementor-widget elementor-widget-heading\" data-id=\"d86345a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>8.0.<\/b> Ransomware protection resources \u2013 key products and tools to help you before, during and after a ransomware attack  <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff5dc14 elementor-widget elementor-widget-text-editor\" data-id=\"ff5dc14\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">There are companies that specialize in understanding and countering ransomware with detection, protection and decryption solutions. It is worth understanding the data protection products available, and the options you have during a ransomware attack. This section provides an overview of some key ransomware protection companies and resources.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-41cc02a elementor-widget elementor-widget-heading\" data-id=\"41cc02a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Before an attack \u2013 ransomware detection and protection solutions<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23f4135 elementor-widget elementor-widget-text-editor\" data-id=\"23f4135\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Most antivirus solutions will also try to detect ransomware. Here is a selection of 3 popular products and the types of features they provide. This is a good starting point when looking for data protection solutions and the types of features available.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-162eb80 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"162eb80\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50894bd elementor-column elementor-col-50 elementor-inner-column\" data-id=\"50894bd\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be1d25f elementor-widget elementor-widget-image\" data-id=\"be1d25f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/malwarebytes-seeklogo.com_.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e58a3c1 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"e58a3c1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9d502c elementor-align-left elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"b9d502c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detects and stops attempts to remotely execute code in your system.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitors files and network and process activity for signs of malicious behavior.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Looks for anomalies suspicious executables on your computer.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Record changes to your data and rolls back those changes to undo encryption.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-13facba elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"13facba\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa8d3bb elementor-column elementor-col-50 elementor-inner-column\" data-id=\"fa8d3bb\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8afd10c elementor-align-left elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"8afd10c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Provides intrusion detection for virtualized environments.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Uses machine learning to detect zero day threats.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Has real-time communication between the threat detection features.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Can include an integrated firewall to block persistent threats.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca14897 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"ca14897\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b87b9bf elementor-widget elementor-widget-image\" data-id=\"b87b9bf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/mcafee-seeklogo.com_.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-0eec6d7 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"0eec6d7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad45cc1 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"ad45cc1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb1d749 elementor-widget elementor-widget-image\" data-id=\"eb1d749\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/kaspersky_eps.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-143e4aa elementor-column elementor-col-50 elementor-inner-column\" data-id=\"143e4aa\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ddbb58 elementor-align-left elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"3ddbb58\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Record changes to your data and rolls back those changes to undo encryption.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Uses a file server agent to monitor activity and looks for signs of ransomware.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Blocks malicious websites and filter emails with malicious attachments.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Removes unsafe browser extensions.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-19afeb0 elementor-widget elementor-widget-heading\" data-id=\"19afeb0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">During an attack \u2013 ransomware identification and decryption solutions<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8325801 elementor-widget elementor-widget-text-editor\" data-id=\"8325801\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">If your systems have been encrypted by ransomware, you may be able to identify the strain from the on-screen message. If you cannot, take a photo of the screen and perform an image search or use an online tool like <a href=\"https:\/\/www.nomoreransom.org\/crypto-sheriff.php\">Crypto Sherriff<\/a> to identify the virus by uploading one of your encrypted files for analysis.\n<br\/><br\/>\nOnce you identify the ransomware, check if there\u2019s a decryption solution available. Two useful resources, <a href=\"https:\/\/www.nomoreransom.org\/\">WatchPoint<\/a> and <a href=\"https:\/\/www.nomoreransom.org\">nomoreransom.org<\/a>, can help determine if there is a decryptor available for your strain of ransomware. There are also decryptors available from <a href=\"https:\/\/www.avast.com\/c-ransomware\">Avast<\/a>, <a href=\"https:\/\/www.avg.com\/en-us\/ransomware-decryption-tools\">AVG<\/a>, <a href=\"https:\/\/noransom.kaspersky.com\/\">Kaspersky<\/a> and <a href=\"https:\/\/success.trendmicro.com\/solution\/1114221-downloading-and-using-the-trend-micro-ransomware-file-decryptor\">Trend Micro<\/a>.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c78a185 elementor-widget elementor-widget-heading\" data-id=\"c78a185\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Online resources<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6104ae7 elementor-widget elementor-widget-text-editor\" data-id=\"6104ae7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">The companies that lead the fight against ransomware also provide their own guides and reports. In particular, <a href=\"https:\/\/www.malwarebytes.com\/ransomware\/\">Malwarebytes<\/a> and <a href=\"https:\/\/us.norton.com\/internetsecurity-malware-ransomware-5-dos-and-donts.html\">Norton<\/a> provide guides to understanding ransomware. McAfee releases <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-au\/threat-center\/mcafee-labs\/reports.html\">quarterly threat reports<\/a> on the current state of virus, malware and ransomware. The Australian Government also has a great ransomware resource called the <a href=\"https:\/\/www.cyber.gov.au\/publications\/essential-eight-explained\">Essential eight<\/a>.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-4fec9c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"4fec9c8\" data-element_type=\"section\" id=\"ransomware-response-plan\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6984d09 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"6984d09\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b150fb2 elementor-widget elementor-widget-heading\" data-id=\"b150fb2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>9.0.<\/b> Ransomware Response Plan \u2013 What to do during a ransomware attack  <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e94e2a6 elementor-widget elementor-widget-text-editor\" data-id=\"e94e2a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Phone calls are being made, staff stand around looking at each other and screens show a red-bannered message. Your business has ceased operations, and the only certainty is that there will be a financial impact. The question is how big. So now is the time to keep calm, and work through your Ransomware Response Plan.\n<br\/><br\/>\nAs someone responsible for fixing the ransomware attack in an operational or IT capacity, the saving grace is that you have a plan, you\u2019ve tested it, and you have backups ready to go. But what should be in your response plan?\n<br\/><br\/>\nIn the previous section, we looked at the tools and technical resources that can be used during a ransomware response. In this section, we look at processes and decision points to consider when making a response plan.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-167680e elementor-widget elementor-widget-heading\" data-id=\"167680e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">For Small and Medium Business <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ea2c01 elementor-widget elementor-widget-text-editor\" data-id=\"0ea2c01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Below are 4 key steps in a ransomware response plan. Each one should be reviewed and tested before being applied to your business or organization.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-c3b2dec elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"c3b2dec\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5833bb8 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"5833bb8\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d095f6 elementor-widget elementor-widget-heading\" data-id=\"2d095f6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">1<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b3ab01 elementor-widget elementor-widget-text-editor\" data-id=\"7b3ab01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Communicate and coordinate <\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6520d66 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"6520d66\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3df7d44 elementor-widget elementor-widget-text-editor\" data-id=\"3df7d44\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Communication is critical. Get all the people who can make the decisions and will be performing the tasks in the same area (war room), stay calm and work towards a successful outcome. Easy to say but having a response plan means what to do is clearly laid out. Pass out hard copies. All parties involved on the response are now coordinated and following the response steps as documented.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-16ed6c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"16ed6c5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06994e2 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"06994e2\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ef21f3 elementor-align-left elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"8ef21f3\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Cauterize the wound<\/b><br>As soon as ransomware\u2019s detected, all machines should be disconnected from the network to prevent the infection from spreading by pulling out the network cables and turning off the machines. This includes connections to other networks, sites and remote devices.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Quarantine the backups<\/b><br\/>A recovery needs uninfected backups, so your backup plan should include backups that aren\u2019t online and therefore safe. Backup destinations like NAS devices and removable drives should also be isolated. Recall offsite backup media so they\u2019re ready to use.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e61962d elementor-column elementor-col-50 elementor-inner-column\" data-id=\"e61962d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79368c2 elementor-widget elementor-widget-heading\" data-id=\"79368c2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">2<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12849f1 elementor-widget elementor-widget-text-editor\" data-id=\"12849f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Isolate all machines and backups<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-aadc6e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"aadc6e9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7078dc4 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"7078dc4\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-209bd3f elementor-widget elementor-widget-heading\" data-id=\"209bd3f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">3<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-375e12c elementor-widget elementor-widget-text-editor\" data-id=\"375e12c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Understand your options<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-668b44e elementor-column elementor-col-50 elementor-inner-column\" data-id=\"668b44e\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-319c9ac elementor-widget elementor-widget-text-editor\" data-id=\"319c9ac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Now that the immediate actions have been taken to mitigate the impact, you can assess what\u2019s happened, determine the extent of the infection and work out the best way to move forward.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fd225b elementor-align-left elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"8fd225b\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Confirm the infection<\/b><br\/>Some malware claiming to be ransomware is just an onscreen message claiming to be ransomware and asking for a bitcoin payment. Turn on an infected machine and confirm it\u2019s a real ransomware and that data has been encrypted.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Understand the ransomware<\/b><br\/>Review everything known about your strain of ransomware. Learn from those who have faced it, specifically: are there known solutions and does this ransomware present any risks to backups and recoveries. If there is a ransom notice on screen, take a photo<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Know the damage<\/b><br>What has been infected and what may have been infected. Run a quick audit to identify the extent of the infection. See if any machines have not been infected.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-693b8da elementor-widget elementor-widget-text-editor\" data-id=\"693b8da\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Useful questions:<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b150b7 elementor-align-left elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"5b150b7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-question-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What machines are known to be infected<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-question-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What machines showed no sign of an infection but may be infected.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-question-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">If you have multiple sites or LANs, was ransomware found in the other locations.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-question-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Were any machines in the company turned off - these may be clean.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-3d71df2 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"3d71df2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9ae357 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"a9ae357\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1df524 elementor-widget elementor-widget-text-editor\" data-id=\"b1df524\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Once you know what was infected and have your backups and staff ready, you can recover your machines using their backups. This process should also be documented as part of your Ransomware Response Plan or as a standalone Disaster Recovery Plan.<\/p><p><strong>For best results, these are our recommendations for recovery: <\/strong><\/p><ol><li><b>Recover from backup to new hardware<\/b> &#8211; which minimizes the chance of reinfection. It is highly unlikely that newly purchased hardware will contain ransomware on it.<\/li><li>If existing hardware must be used, then <b>completely wipe the machine<\/b>, and either rebuild it from the Operating System up, or perform a bare metal disaster recovery (BMDR). However, <b>we cannot recommend\u00a0this method because there is still a risk that formatting the machine&#8217;s disks won&#8217;t fully remove the malware<\/b>\u00a0&#8211; malware has been known to infect BIOS \/ UEFI firmware, so it can reinfect the machine.<\/li><li>We strongly recommend against reusing a previously infected machine and relying on a malware removal tool to clean it. While these tools can be effective, they can never guarantee success.<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e7018a elementor-column elementor-col-50 elementor-inner-column\" data-id=\"4e7018a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a31ff6 elementor-widget elementor-widget-heading\" data-id=\"4a31ff6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">4<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42d8de8 elementor-widget elementor-widget-text-editor\" data-id=\"42d8de8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Begin recovering your servers and desktops<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-af1c922 elementor-widget elementor-widget-heading\" data-id=\"af1c922\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Larger Businesses<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f5cf3e elementor-widget elementor-widget-text-editor\" data-id=\"5f5cf3e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">With a larger business, there may also be shareholder, legal and market considerations. This means additional steps are often followed.\n<br\/><br\/>\nPossible steps to add for larger organizations:<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7e2425 elementor-align-left elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"d7e2425\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Set up an incident room and rooms in regional hubs to manage the response<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Inform stake holders<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Contact specialized consultants<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Contact specialized consultants<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-36fa59b elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"36fa59b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c098f8f elementor-column elementor-col-100 elementor-inner-column\" data-id=\"c098f8f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e8885d elementor-widget elementor-widget-text-editor\" data-id=\"1e8885d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Things to consider during the response<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07b17db elementor-align-left elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"07b17db\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">You don\u2019t know how long the ransomware infection has been on your network. Machines you think are safe may have ransomware installed.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Machines can be turned on to confirm an infection if they are isolated, but this can allow a partly complete infection to continue encrypting local data.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">You can start machines from external drives using virus detection tools to check for ransomware without the ransomware running, because the computer itself is not started.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Uninfected machines or LANs provide an opportunity to resume business functions BUT you would need to be very certain they are clean before connecting and using them.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\" >\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-alt-circle-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">The only way to be sure you have removed ransomware from your network is to perform a full recovery of all machines. In fact, you should also replace the hard drives first.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-1bbfc6a elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"1bbfc6a\" data-element_type=\"section\" id=\"the-disaster-recovery-plan\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-baf15a9 elementor-column elementor-col-100 elementor-inner-column\" data-id=\"baf15a9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8fe4945 elementor-widget elementor-widget-heading\" data-id=\"8fe4945\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>10.0.<\/b> This section explains 5 key disaster recovery steps in a ransomware scenario.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-41bcb2a elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"41bcb2a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-494153c elementor-column elementor-col-50 elementor-inner-column\" data-id=\"494153c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6e027d elementor-widget elementor-widget-heading\" data-id=\"e6e027d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">1<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9efe22 elementor-widget elementor-widget-text-editor\" data-id=\"b9efe22\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Decide what machines are to be recovered<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3d8035 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"f3d8035\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f2ff86 elementor-widget elementor-widget-text-editor\" data-id=\"7f2ff86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Work out the server and workstations that are the highest priority. This may be a domain controller and a workstation that you can use to run some functionality tests on.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc86828 elementor-position-top elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"cc86828\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"752\" height=\"501\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/cargo-ship-2.jpg\" class=\"attachment-medium_large size-medium_large\" alt=\"\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/cargo-ship-2.jpg 752w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/cargo-ship-2-300x200.jpg 300w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">CASE STUDY<\/h3><p class=\"elementor-image-box-description\">Being able to recover a domain controller is critical for business operations, as Maersk, the world\u2019s largest shipping conglomerate, found out when it was hit by a cyberattack and all 150 of its domain controllers were wiped. They relied on the servers acting as fallbacks for each other, and the company was only saved when one remaining domain controller was found in the Ghana office, because there had been a power outage at the time of the cyberattack.\n<br><br>\nDue to the poor network connection, an employee at the Ghana office was flown to Nigeria with the domain controller\u2019s drive, and then another employee flew with it to London \u2013 delivering the drive that the whole company needed to start the recovery process and allow 20% of global shipping to resume.\n\n\nRead the full amazing story.<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-caf3668 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"caf3668\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9efde82 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"9efde82\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c94ad13 elementor-widget elementor-widget-text-editor\" data-id=\"c94ad13\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Ransomware can perform actions that change access permissions, leave back doors and maybe even create spaces in which it can hide &#8211; including the BIOS \/ UEFI Firmware of the infected machines.\u00a0<\/p><p>For peace of mind, and if feasible, replace all infected machines with new hardware. This minimizes the chance of reinfection.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b63fbb elementor-column elementor-col-50 elementor-inner-column\" data-id=\"8b63fbb\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f459456 elementor-widget elementor-widget-heading\" data-id=\"f459456\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">2<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbdf530 elementor-widget elementor-widget-text-editor\" data-id=\"fbdf530\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><strong>Replace all infected machines<\/strong><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-39102af elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"39102af\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2dc4ac elementor-column elementor-col-50 elementor-inner-column\" data-id=\"e2dc4ac\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5091871 elementor-widget elementor-widget-heading\" data-id=\"5091871\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">3<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bd3b7d elementor-widget elementor-widget-text-editor\" data-id=\"5bd3b7d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><strong>Recover the selected machines<\/strong><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-644bf6d elementor-column elementor-col-50 elementor-inner-column\" data-id=\"644bf6d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-712f769 elementor-widget elementor-widget-text-editor\" data-id=\"712f769\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Use your bootable recovery media and image backups to recover the server and selected desktops. Once they have been recovered and started, check that they can communicate and that user credentials can authenticate.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50e7348 elementor-widget elementor-widget-text-editor\" data-id=\"50e7348\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>The <a href=\"https:\/\/www.databreachtoday.com\/ransomware-tale-mayor-describes-citys-decisions-a-13033\">ransomware attack on the city of New Bedford<\/a>, Massachusetts, is a good reminder that even if you are prepared and take the right steps, recovering from a ransomware attack takes time, money and planning. In this case, the city of New Bedford had followed many best practices with a compartmentalized network and activity monitoring. In July 2019, this monitoring detected signs of malware that led to the IT department shutting down the city\u2019s network, hampering a ransomware infection that was already spreading. This quick response meant only 158 computers were infected out of 3,500. However, to ensure the ransomware was removed, the IT department rebuilt the entire server network, replaced affected computers and recovered all applications from backups.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-674e5fe elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"674e5fe\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b09577 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"1b09577\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01b108f elementor-widget elementor-widget-text-editor\" data-id=\"01b108f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Once the first machines are recovered and functioning, check that no ransomware is present using the information you know about the ransomware that infected your network. If the ransomware exists, it would begin to encrypt data again.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f913aa elementor-column elementor-col-50 elementor-inner-column\" data-id=\"4f913aa\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d58b0a elementor-widget elementor-widget-heading\" data-id=\"1d58b0a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">4<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfac233 elementor-widget elementor-widget-text-editor\" data-id=\"cfac233\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><b style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-US\">Test for infection<\/span><\/b><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-79f47ab elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"79f47ab\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-123efd0 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"123efd0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1955553 elementor-widget elementor-widget-heading\" data-id=\"1955553\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">5<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e70cc55 elementor-widget elementor-widget-text-editor\" data-id=\"e70cc55\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><b style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-US\">Repeat the steps above<\/span><\/b><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4573c77 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"4573c77\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99adc67 elementor-widget elementor-widget-text-editor\" data-id=\"99adc67\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">Continue to recover more servers and workstations. As a precaution, you can isolate a domain controller and a workstation as a fallback point in the case of a reinfection.<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-961eb56 elementor-widget elementor-widget-heading\" data-id=\"961eb56\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-heading-title elementor-size-default\">On behalf of the BackupAssist Cyber Security team<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afb18fd elementor-widget elementor-widget-heading\" data-id=\"afb18fd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Thanks for reading our ransomware guide.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7f1fcc elementor-widget elementor-widget-text-editor\" data-id=\"a7f1fcc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>We would be happy to help you explore our solutions and answer any questions this article has raised during a free 15 minute consultation. No strings attached! At the end of the call we will provide you with download links and a 30-day evaluation key so that you can experience firsthand the peace of mind that BackupAssist provides.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-element elementor-element-28277e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"28277e0\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e6c959 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"3e6c959\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ebdea7 elementor-widget elementor-widget-text-editor\" data-id=\"1ebdea7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><b>Don&#8217;t wait, contact us now to request your one-on-one session with one of our Client Success team members.<\/b><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d29903 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"2d29903\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-881d1ce pp-buttons-halign-center pp-buttons-valign-middle pp-buttons-stack-none elementor-widget elementor-widget-pp-buttons\" data-id=\"881d1ce\" data-element_type=\"widget\" data-widget_type=\"pp-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div class=\"pp-buttons-group\">\n                            \n                <a href=\"mailto:sales@backupassist.com\" class=\"pp-button elementor-button elementor-size-sm elementor-repeater-item-54fa234 \">\n                    <div class=\"pp-button-content-wrapper\">\n                        <span class=\"pp-button-content-inner pp-icon-before\">\n                                                            <span class=\"pp-buttons-icon-wrapper\">\n                                    \t\t\t\t\t\t\t\t\t\t\t<span class=\"pp-button-icon pp-icon\">\n\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"pp-button-icon fas fa-check\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t                                <\/span>\n                                                            \n                                <span class=\"pp-button-title\">\n                                sales@backupassist.com                                <\/span>\n                                                    <\/span>\n                    <\/div>\n                <\/a>\n                    <\/div>\n    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-1502529 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-inner-section\" data-id=\"1502529\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3d479c elementor-column elementor-col-50 elementor-inner-column\" data-id=\"a3d479c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fcbb929 elementor-share-buttons--align-left elementor-share-buttons--view-icon elementor-share-buttons--skin-minimal elementor-share-buttons--shape-circle elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"fcbb929\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_email\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Share on email<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_print\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-print\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Share on print<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6556687 elementor-column elementor-col-50 elementor-inner-column\" data-id=\"6556687\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecebb6e elementor-share-buttons--align-right elementor-share-buttons--view-icon-text elementor-share-buttons--skin-gradient elementor-share-buttons--shape-square elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"ecebb6e\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_facebook\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Share on facebook<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tFacebook\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_google\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-google-plus-g\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Share on google<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tGoogle+\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_twitter\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Share on twitter<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tTwitter\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t<div class=\"elementor-share-btn elementor-share-btn_linkedin\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t\t<span class=\"elementor-screen-only\">Share on linkedin<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tLinkedIn\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Definitive Ransomware Protection Guide for Business in 2020. Ransomware is a huge threat to businesses. The best time to protect yourself from ransomware is before it strikes. Cyber-resilience requires the right ransomware protection\u00a0to save you from the panic and stress of unplanned downtime and potentially hundreds of thousands of dollars in ransom payments. Preparation &#8230; <a title=\"Ransomware Protection &#8211; Definitive guide for business in 2020\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide\">Read more <span class=\"screen-reader-text\">Ransomware Protection &#8211; Definitive guide for business in 2020<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1274","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Protection - Definitive guide for business in 2020<\/title>\n<meta name=\"description\" content=\"Ransomware is a huge threat to businesses. Resilience requires the right ransomware protection. Here&#039;s how to prepare, survive and recover from ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Protection - Definitive guide for business in 2020\" \/>\n<meta property=\"og:description\" content=\"Ransomware is a huge threat to businesses. Resilience requires the right ransomware protection. Here&#039;s how to prepare, survive and recover from ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-02T10:33:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"37 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide\",\"url\":\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide\",\"name\":\"Ransomware Protection - Definitive guide for business in 2020\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png\",\"datePublished\":\"2019-10-09T01:28:14+00:00\",\"dateModified\":\"2020-06-02T10:33:32+00:00\",\"description\":\"Ransomware is a huge threat to businesses. Resilience requires the right ransomware protection. Here's how to prepare, survive and recover from ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Protection &#8211; Definitive guide for business in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Protection - Definitive guide for business in 2020","description":"Ransomware is a huge threat to businesses. Resilience requires the right ransomware protection. Here's how to prepare, survive and recover from ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide","og_locale":"en_US","og_type":"article","og_title":"Ransomware Protection - Definitive guide for business in 2020","og_description":"Ransomware is a huge threat to businesses. Resilience requires the right ransomware protection. Here's how to prepare, survive and recover from ransomware.","og_url":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide","og_site_name":"Cyber Resilience Blog","article_modified_time":"2020-06-02T10:33:32+00:00","og_image":[{"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"37 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide","url":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide","name":"Ransomware Protection - Definitive guide for business in 2020","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png","datePublished":"2019-10-09T01:28:14+00:00","dateModified":"2020-06-02T10:33:32+00:00","description":"Ransomware is a huge threat to businesses. Resilience requires the right ransomware protection. Here's how to prepare, survive and recover from ransomware.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/Picture-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/ransomware-protection-guide#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Ransomware Protection &#8211; Definitive guide for business in 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/pages\/1274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=1274"}],"version-history":[{"count":193,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/pages\/1274\/revisions"}],"predecessor-version":[{"id":16097,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/pages\/1274\/revisions\/16097"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=1274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}