A Comprehensive Ransomware Mitigation Checklist for Organisational Resilience
In an era where ransomware attacks have risen to prominence with increased sophistication and frequency, organisations face a pressing need to fortify their cybersecurity measures. What was once a mere footnote in executive discussions has now transformed into a central concern across industries. High-profile incidents* demonstrate that the consequences of cybercrime extend far beyond financial implications; they imperil lives and livelihoods. While the risks are acknowledged, a gap persists in comprehending the security protocols required to both prevent and navigate these threats. A ransomware mitigation plan template that encompasses the before, during, and after phases of an attack can only be useful at this point.
Before: Laying the Foundations
Preparation is paramount in thwarting the growing threats posed by ransomware attacks. This phase, often overlooked by organizations with no prior exposure to such attacks, demands full company-wide commitment. To bolster defenses and ensure swift responses, consider the following five core areas:
- IT Hygiene: Prioritise data hygiene and a well-structured patch management program to deny threat actors the chance to exploit vulnerabilities. Critical patches should be deployed within 24 hours, while others should follow within 30 days.
- Multi-Factor Authentication: Combat weak password management practices by implementing multi-factor authentication, which adds an extra layer of security.
- Admin Credential Vaulting: Shield shared resources from vulnerabilities by vaulting admin credentials, ensuring passwords are auto-refreshed after each login.
- Consistent Logging: Maintain security and access logs to track indicators of compromise, aiding both preemptive identification and post-attack analysis.
- Fast Analytics: Employ real-time analytics on endpoints, networks, and users to identify suspicious behavior swiftly, enabling proactive threat eradication.
- Critical Employee Training: Establish Internet and email policies and impart targeted end-user awareness training. Extend training to executive management and boards through tabletop exercises for a comprehensive response strategy.
During: Managed Response
While the specifics of an organisation’s business continuity and disaster recovery plan will vary, certain universal steps must be taken. As an attack unfolds, implementing the following measures is crucial:
- Backup Communications Plan: Activate backup communication channels to inform leaders and stakeholders internally if primary systems are compromised.
- Emergency Response Team Mobilisation: Assemble an emergency response team comprising legal counsel, forensic experts, corporate communications, and relevant stakeholders.
- External Communications: Initiate external communication plans, informing authorities, cyber insurance providers, regulators, media, and affected parties promptly and accurately.
- Forensic Process Initiation: Begin the forensic process by triaging impacted devices, identifying the attack type, and determining severity to facilitate prompt patch application.
After: Swift Recovery
Following an attack, speed becomes paramount. In addition to prevention and response measures, effective recovery planning is essential. Key steps include:
- Prepared Recovery Environment: Maintain a staged, tested, and ready-to-deploy recovery environment to ensure rapid restoration of operations post-attack.
- Informed Decision on Ransom: In some cases, deciding whether to pay a ransom becomes necessary. Regardless of the decision, minimising damage and expediting restoration are paramount.
- Recovery Kit Availability: Establish a secondary recovery kit for production devices that may be compromised, ensuring uninterrupted recovery efforts.
- System Prioritisation: Based on your response plan, prioritise which systems to recover first, considering application dependencies.
- Collaboration with Authorities: Collaborate with regulatory agencies and authorities during the restoration process, ensuring compliance and proper procedures.
- Constant Communication: Maintain transparent communication with all stakeholders, including employees, customers, investors, and partners throughout the recovery process.
Looking Ahead
In today’s landscape, expecting an organisation to remain untouched by cyberattacks or breaches is naive. Cyber criminals continuously innovate, making ransomware attacks more sophisticated and damaging. While we cannot predict the next major attack, proactive cybersecurity strategies remain our strongest defense. By adhering to a comprehensive ransomware mitigation plan that encompasses prevention, response, and recovery phases, organisations can bolster their resilience against evolving cyber threats.
*Colonial Pipeline, Springhill Medical Center, and JBS Foods.











