Laserfiche WebLink
4. Contact law enforcement immediately to report a ransomware event and request assistance. <br />Start with your local field office for the FBI to report this crime and ask for the Duty Agent. For <br />the Minneapolis FBI office call (763)569-8000. <br />5. Report a ransomware infection to the Federal Bureau of Investigation Internet Crime Complaint <br />Center (I3C): https://www.ic3.gov/default.aspx along with the following information: Date of <br />infection and victim company information, ransomware variant, how the infection occurred (i.e.. <br />link in email or browsing the internet), ransom and amount paid (if any), attacker’s Bitcoin <br />Wallet address and overall losses associated with the ransomware infection. <br />Preventative measures for a ransomware attack: <br /> Educate your personnel and implement an awareness training program. <br /> Enable strong spam filters to prevent phishing emails from reaching end users. <br /> Scan all incoming and outgoing emails to detect threats. <br /> Configure firewalls to block access to known malicious IP addresses. <br /> Patch operating systems <br /> Set anti-virus and anti-malware programs to conduct regular scans automatically. <br /> Manage the use of privileged accounts <br /> Configure access controls <br /> Disable macro scripts from office files transmitted via email. <br /> Implement software restriction policies <br /> Consider disabling Remote Desktop if it not being used. <br /> Use application whitelisting which only allows systems to execute programs known and <br />permitted by security policy. <br /> Execute operating systems environments or specific programs in a virtualized environment. <br /> Categorize data based on organizational value and implement physical and logical separation of <br />networks and data for different organizational units. <br /> Back up data regularly, verify the integrity of those backups and test the restoration process to <br />ensure it is working. <br /> Conduct an annual penetration test and vulnerability assessment. <br /> Secure your backups and ensure they are not connected permanently to the computers and <br />networks they are backing up. <br />Every business should contact their insurance company and verify if their current insurance binder has <br />coverage for Cyber Ransom. The Cyber Ransom coverage should be broken down into three different <br />categories: 1) Ransom Coverage 2) Business Loss 3) Restoration. <br /> <br /> <br />