7 Steps To Recover From A Ransomware Attack

7 Crucial Steps To Recover From A Ransomware Attack in Malaysia

Ransomware is a type of cyberattack that malicious actors often use against companies of all sizes. Once the victim downloads the malware to their device, it seeks out and holds corporate data hostage. It does this by locking you out or encrypting the data so that it is indecipherable. Your organisation then must pay a ransom to restore your access and recover your data from the attack – hence the name ransomware.


Threat researchers at SonicWall Capture Labs finding that there was a record-breaking 495.1 million ransomware attacks in 2021. This 148% year-on-year increase over 2020 means that last year was the most costly and dangerous year for organisations worldwide. And with ransomware demands surging by a staggering 518% in just the first half of 2021, that represents a major threat to any business.


But Veeam believes that the best offence is a good defense, and their 2021 Ransomware Retrospective report has the data to back this up. The study, designed to understand the impact of ransomware on the global IT community and its customers, found that an impressive 92% of Veeam customers didn’t have to pay any ransom to restore their data.


And recovering from a ransomware attack cost 85% of Veeam customers polled less than US$25,000 overall. With measurable data like this, it just goes to show how valuable having an effective backup process is. Having secure, timely and reliable backups for your corporate data is crucial, but it’s only part of an effective Ransomware Recovery Plan.


Read on to find out our 7 steps to recovering from a ransomware attack.

What Are The 7 Steps?

Step 1: Have a Comprehensive Cybersecurity Incident Response Plan (CIRP) in Place

While the hope is always that you will never have to deal with a cyber-attack of any kind, an attack takes place every 39 seconds. And so, while it may seem like an odd thing to have in a ransomware recovery plan, your first step should be ensuring you have a detailed cybersecurity strategy that is comprised of three main layers.

The first, of course, is protecting yourself from an attack in the first place. The second layer is a comprehensive Cybersecurity Incident Response Plan – a strategy that lays out exactly what your staff should do when an attack is in progress. The main goal with your CIRP is to mitigate the damage that a cyberattack can cause as well as help begin your recovery process.

This recovery phase is the third layer of your cybersecurity strategy and arguably the most important in terms of the actual cost of an attack. The reason is the longer it takes to restore your data and get your systems back online, the more it impacts your bottom line.

Read More: Developing an Effective Incident Response Plan for Cloud Environments in Malaysia

Step 2: Implement Backup Plans for All Your Corporate Data

With digital workspaces and a remote workforce becoming the norm for the modern workplace, many companies have made the switch to using the powerful services offered by Microsoft Office 365. But while Microsoft has resilience at the heart of these tools, something they don’t offer is a comprehensive backup solution.


And yet many overlook this shortfall, with 81% of IT professionals saying that they experienced data loss in Office 365. When you consider that companies are storing as much as 60% of their sensitive data in cloud-based Office documents – 75% of which they don’t currently back up – that is a worrying statistic. And so, your second step should be deploying solutions like Backup for Microsoft 365 across your organisation.

Read More: Overcoming the Remote Work Challenges with Microsoft 365 Office Cloud Backup

Step 3: Employ the 3-2-1 Data Backup Rule

The 3-2-1 rule is nothing new. In fact, Veeam have been advocating the concept since their very first days in business. And while IT professionals, and anyone tasked with keeping corporate data safe, have been using the principle since the beginning of time – we can thank photographer Peter Krogh for the phrase.


The 3-2-1 rule isn’t complicated and simply states that you should have three (3) copies of data stored on two (2) different types of media and one (1) copy should be off-site. Now while the most critical data sets of today often have 4 or even 5 backup copies in place, the basic rule is your best starting point.

Step 4: Be Ready to Report any Cyberattack Incidents

When a cyberattack occurs, the first instinct of many organisations tends to be to investigate, learn what occurred, and close the security loophole. However, countries and international organisations like Interpol are increasingly encouraging – or even regulating – the disclosure of cyberattacks. This step is necessary to protect companies and consumers as well as to ensure judicial resources can be bought in to assist organisations that may not have the capacity to do so, as well as to seek prosecution of cybercriminals where possible.

Step 5: Protect Your Workloads and Processes with DRaaS Solutions

With cyberattacks being as prevalent as they are, having an effective Disaster Recovery solution in place is an essential part of any cybersecurity strategy. This used to mean having an offsite facility where your data was backed up on expensive storage gear, but Disaster Recovery as a Service (DRaaS) solutions have changed the game for businesses of all shapes and sizes.


DRaaS solutions like Veeam® Backup & Replication™ use a cloud-based data protection approach where your organisation’s physical services and/or virtual machines (VMs) are replicated, stored and hosted using public or private cloud resources. This essentially means that you will instantly be able to recover files, NAS shares, entire VMs, databases and more.

Step 6: Undertake Security Awareness Training for Your Employees

Your employees are the weakest link in your cybersecurity strategy. And despite 90% of organisations claiming that their employees have undergone phishing awareness training, according to Verizon’s 2022 Data Breaches Investigations Report, 82% of data breaches involved the human element. And many successful cyberattacks on organisations start with phishing emails.

Step 7: Test Your Ransomware Recovery Plan

Many ideas and plans are great on paper but tend to fall apart when it comes to execution. Nowhere is this more true than with cybersecurity. Business is evolving every day, and the cyber threat landscape is evolving right along with it.

If you’re not testing your entire cybersecurity strategy regularly, including your ransomware recovery plan, you will never know if there are interdependencies, gaps and areas that need improvement. Cyberattacks can take any number of forms, and your ransomware recovery plan needs to be agile enough to respond to whatever that may be.

Read MoreRansomware Trends and Prevention Strategies: Learning From the Past

How can Aegis help?

With over a decade of experience, Aegis offers data protection and cloud disaster recovery services in Malaysia that continuously monitors IT systems and identifies information security gaps. We ensure 24×7 proactive monitoring and support all year round with unlimited disaster recovery resources and certified DR drills.

When it comes to Ransomware, a good cloud backup and disaster recovery plan will ensure you get your business back up and running with minimal time and data loss. Aegis Cloud Disaster Recovery (CDR) is the ideal managed, automated backup solution for your organisation. Choosing an expert partner with extensive experience helping businesses recover from cyberattack, data deletion or loss is the best protection for your business.

Related Posts

Need help?