| estimated time icon 2 minutes minute read

Cyber extortion survival guide: 4 critical considerations for effective response

Cyber Extortion Survival Guide: 4 critical considerations for your cyber response strategy.

Overview and key points

Whether you are facing a real-time cyber attack or simply trying to bolster your business’ defenses addressing the following points as part of a cyber incidence response plan ensures your organisation is prepared should the worst arise.

Key takeaways

📂 Evaluate your backup and recovery options
🚔Involve law enforcement
🗪 Obtain legal and insurance advice
📋🔍 Agree incident response plan and forensics

1. Evaluate your backup and recovery options:

Assess whether you can restore data from backups. If your organisation has robust backups, paying the ransom becomes less necessary. (For advice on effective data backup protocols, click here).

2. Involve law enforcement:

Reporting the attack to law enforcement is important, even if you’re considering paying. They may provide guidance as well as help track down the perpetrators.

3. Obtain legal and insurance advice:

Check with legal counsel and your cyber insurance provider before taking action. Some insurance policies may cover ransom payments, and they may have specific protocols or restrictions on paying.

4. Agree an incident response plan and forensics:

Work with cybersecurity professionals to assess the extent of the breach and ensure that even if you regain access to data, the attackers don’t leave vulnerabilities in your system for future exploitation.

Summary

Paying a ransom should generally be a last resort and avoided wherever possible. It perpetuates the criminal activity and offers no guarantees. Cyber insurance is crucial in that it provides access to the technical and legal expertise you need to make a fully informed decision.

https://www.partnersand.com/resources/what-would-you-do-if-you-got-hacked/

Would you know what to do if you suffered a cyber attack?

Put your decision-making to the test with our online simulation. Uncover the risks and witness the results of your actions in a safe space. Experience a simulated cyber attack, the sequence of events and their potential impact on an organisation through our latest tool.

Do you have what it takes to deliver your team from crisis point?

TEST YOUR SKILLS USING OUR SIMULATION

For further insights and support on building cyber resilience into your organisation check out our cyber risk resources, here or speak with one of our team today!

Got a question? Want to know more?
Contact our expert