MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe


Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

5 Steps to Take After a Ransomware Infection

Posted July 5, 2018by Hunter Smith

5 Steps to Take After a Ransomware Infection

As a managed IT services provider, it is vital that you do everything you can to prevent your clients’ machines from getting infected with any malicious software. Letting them know that they can take some simple precautions—like having adequate security software (antivirus and anti-malware) installed on their computer, applying OS security patches, not clicking on suspicious email links they don't recognize and not opening unexpected email attachments—can be game-changing for your role as their MSSP, security partner and advisor.

The five following tips will ensure you’re able to effectively communicate to your clients how to deal with ransomware and keep them as best protected as possible with your MSSP services.

What to Do If You Find Yourself Infected

Even if your clients believe they are already protected against ransomware attacks, malicious code can still end up on their computer. If the computer does become a victim of ransomware (such as Cryptolocker) there are some steps they can take to mitigate the damage—so make sure you share these tips with your clients! 

1. Ignore the Ransom Demand

DO NOT even think about paying the ransom. The demand does not come from any legitimate authority and there is no guarantee that if you pay the money you will ever get your files unlocked. If you pay, you are just passing your money into the hands of criminal gangs and encouraging them to continue with their illegal activities.

2. Remove the Ransomware from Your Computer

Although ransomware may appear particularly threatening, it is just another form of malware. There are many companies online that offer low-cost phishing and ransomware tools, or malware removal tools, including Microsoft and Bitdefender. Both of these sites offer detailed instructions on how to eliminate the ransomware from your computer. It is wise to remove the ransomware as soon as possible. The longer that you leave it on your system, the more opportunity you are providing for the malware to spread, both encrypting your files further and potentially spreading to other computers connected to the network.

3. Update Your Antivirus, Anti-Malware Software and Patch Your OS

If your current antivirus protection lets the ransomware get on to your computer, then there is likely a problem with it. It may be corrupted, or perhaps it is not being updated regularly with the latest antivirus definitions. If you are going to properly protect your computer system in the future, it is vital that you have a working and advanced antivirus program installed. If your software isn’t up-to-date, either update it immediately or uninstall it and replace it with a new one that will offer you adequate protection from ransomware and other cyber threats. Once you have the new antivirus software installed, it is always a good idea to run a full scan of your system to make sure there are no further problems that need to be dealt with on your computer.

4. Update Your Passwords

Once you regain access to your computer, it is a sensible precaution to change all of the passwords that you use to access websites and other accounts. If your antivirus protection has been breached, you have no idea what information may have been gathered from your system. The safest approach is to change all of your passwords and access codes and then monitor your accounts for any indications of suspicious activities.

5. Always Back up Your Files

If your systems become infected with ransomware, it's likely that you are going to suffer some damage, corruption or loss to your computer files. The best preventative measure you can take is to regularly back up your files on an external system (either other hard drive or in the cloud—or both), so that if your computer is taken hostage, you have your files in another location. However, if you do find yourself infected, removing the malware quickly and following these simple steps can minimize the damage and reduce the risk of further infection as much as possible.

How to Avoid Ransomware in the Future

To address your clients' top cyber concerns, you need to be able to define exactly what you’re protecting them against. Luckily, Continuum's Profile & Protect product can help you ensure complete protection from today’s increasingly advanced threats by allowing you to creating advanced profiles and identify gaps in coverage on a per-site basis.

When you “profile” certain attack vectors using common attacks types like ransomware, you’ll be able to clearly communicate to clients exactly what it takes to protect against their biggest risks and which technologies are required to remain as secure as possible. The profiles you create should align with specific customer needs and tell you where exactly security gaps lie. That way, you can address those gaps and predict and manage risk on an ongoing basis with your MSP cybersecurity and threat management services.

 

What should your managed security solution offer? Discover more in our eBook:

Download Cyber Security eBook

As Chief Information Officer (CIO), Hunter is expected to take Continuum's IT operations to the next level of performance as our company continues its rapid growth and expansion. Most recently, Hunter served as Senior Vice President and Chief Technology Officer for Acadian Asset Management. Prior to Acadian, Hunter held positions at Plymouth Rock Companies as Director of Enterprise Technology Services as well as positions at Hobbs/Madison, MFS Investment Management and CSC Consulting. Hunter has a bachelor’s degree in computer science from Dartmouth College. He is responsible for all IT resources for Continuum’s U.S. and India locations.

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus