SlideShare a Scribd company logo
1 of 13
MSP360.COM
MSP360.COM
Ransomware:
A Doomsday Prepper Guide
David Gugick
VP Product Management, MSP360
MSP360.COM
Ransomware
2021 Indicators of the Year
● Attacks up 105%
● Phishing directly linked to later-stage
ransomware
● Targeted attacks are up
● Higher ransoms and longer downtime
● Double & triple extortion threats
● Ransomware-as-a-Service (RaaS)
● Top security concern (with phishing)
MSP360.COM
Conti’s
step-by-step
guide to
network
dominance
~Akamai
MSP360.COM
Pen testing, monitor
logs, know your data
flow, impact of
cybersecurity events
NIST Cybersecurity Framework
Guidance for organizations to better
manage and reduce cybersecurity risk
Identify assets /
risks, inventory,
cybersecurity roles
Access (least privilege),
encryption, backups,
firewalls, EDR, OS
updates, training
Test & update
response plans,
coordinate with
stakeholders
Restore, communicate
stakeholders, update
recovery plans, PR
MSP360.COM
A Cyber Incident Response Plan
Create one and you’ll be ready
● Create a Cyber Incident Response Team
(CIRT)
● Develop a 24/7 Contact List for Response
Personnel and Partners
● Compile Key Documentation of Business-
Critical Networks and Systems
● Outline your Incident Reporting Requirements
● Develop Technical Response Procedures:
Investigate, contain, eradicate, and recover
● Develop Legal Response Procedures
● Exercise the Plan, Train Staff, and Update the
Plan Regularly
MSP360.COM
Customer Training
And just maybe an additional revenue stream
● 88% of data breaches are caused by
employee mistakes, distractions
● Cyber insurance requirements - phishing and
security awareness training
● Conduct regularly scheduled training to
educate and test cybersecurity awareness
● Conduct organization-wide phishing tests
● Improve password / credential management
● Work laptops are for work
● Configuring home network routers
● How to report suspicious emails, phone calls,
activity
Malicious!
MSP360.COM
Backup
and restore, obviously…
● 2 Location, always encrypted, 1 offline /
cloud
● Use cloud immutability / object-lock
● Back up what you need, using the right type
of backup to meet RPOs and RTOs
● Adjust retention to meet compliance needs
● Regularly test your backups & restores
● Document how to restore key systems in
the event of a ransomware attack
● Use more than one solution, if needed
MSP360.COM
Remediation
And getting back to business
● Identify affected endpoints
● Consider backing up affected systems to avoid
removing evidence
● Identify any compromised accounts
● Turn off infected machines (or everything if you're not
sure)
● Identify the ransomware family – look for a decryptor
● Improve / review security and training
● Remove or reimage affected systems
● Restore data
● Perform a root-cause-analysis – your post-mortem
Backup and IT Management Simplified
MSP360.COM
Useful Links
To free stuff…
● CISA U.S. Cybersecurity & Infrastructure Security Agency
https://www.cisa.gov/stopransomware
● NIST National Vulnerability Database https://nvd.nist.gov
● NIST – Ransomware Tips & Tactics:
https://csrc.nist.gov/CSRC/media/Projects/ransomware-protection-
and-
response/documents/NIST_Ransomware_Tips_and_Tactics_Infogra
phic.pdf
● NIST – Small Business Cybersecurity Corner:
https://www.nist.gov/itl/smallbusinesscyber (planners and
workbooks)
● NIST - Enterprise Patch Management Planning: Preventive
Maintenance for Technology
https://csrc.nist.gov/publications/detail/sp/800-40/rev-4/final
● Public Power Cyber Incident Response Playbook
https://www.publicpower.org/system/files/documents/Public-
Power-Cyber-Incident-Response-Playbook.pdf
● SonicWall 2022 Cyber Threat Report
https://www.sonicwall.com/2022-cyber-threat-report
* Please note that third-party links and web sites have not been vetted by MSP360
MSP360.COM
Phishing Simulators
Attack Simulation Training
● Office 365 - Attack simulation training in
Defender for Office 365
https://docs.microsoft.com/en-us/microsoft-
365/security/office-365-security/attack-
simulation-training-get-started
● Infosec IQ - Free Phishing Risk Test
https://www.infosecinstitute.com/form/iq-
demo
● Gophish - Open-Source Phishing Framework
https://getgophish.com
● Lucy - Phishing Attacks with Simulations &
Training Courses(community and commercial)
https://lucysecurity.com/phishing-attack-
training/
* Please note that third-party links and web sites have not been vetted by MSP360
MSP360.COM
Ransomware Decryptors
They’re out there…
● Check your security vendor web site for decryption tools
● Nomoreransom.org - Ransomware Identification and
Decryption Tools https://www.nomoreransom.org
● ID Ransomware – https://id-
ransomware.malwarehunterteam.com/
● Emsisoft - https://www.emsisoft.com/ransomware-
decryption-tools
● Avast - https://www.avast.com/ransomware-decryption-
tools
● McAfee - https://www.mcafee.com/enterprise/en-
us/downloads/free-tools/ransomware-decryption.html
● BitDefender -
https://www.bitdefender.com/blog/labs/tag/free-tools
* Please note that third-party links and web sites have not been vetted by MSP360
MSP360.COM
MSP360.COM
Thank you!

More Related Content

Similar to MSP360: Ransomware Prepper Guide

Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 

Similar to MSP360: Ransomware Prepper Guide (20)

ISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdfISACA -Threat Hunting using Native Windows tools .pdf
ISACA -Threat Hunting using Native Windows tools .pdf
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Cisa ransomware guide
Cisa ransomware guideCisa ransomware guide
Cisa ransomware guide
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web Applications
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
ExpertsLiveNL - Post Breach Security with ATA or ATP
ExpertsLiveNL - Post Breach Security with ATA or ATPExpertsLiveNL - Post Breach Security with ATA or ATP
ExpertsLiveNL - Post Breach Security with ATA or ATP
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
SanerNow a platform for Endpoint security and systems Management
SanerNow  a platform for Endpoint security and systems ManagementSanerNow  a platform for Endpoint security and systems Management
SanerNow a platform for Endpoint security and systems Management
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 

More from MSP360

More from MSP360 (20)

Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360
 
Seamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiSeamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + Wasabi
 
Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024
 
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINALWebinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
 
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
 
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware Economy
 
Getting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best PracticesGetting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best Practices
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
 
Cybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational InstitutionsCybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational Institutions
 
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
 
Getting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptxGetting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptx
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
 
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
 
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
 
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatCyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
 
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
 A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber... A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
 
What’s New at MSP360?
What’s New at MSP360?What’s New at MSP360?
What’s New at MSP360?
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 

MSP360: Ransomware Prepper Guide

  • 1. MSP360.COM MSP360.COM Ransomware: A Doomsday Prepper Guide David Gugick VP Product Management, MSP360
  • 2. MSP360.COM Ransomware 2021 Indicators of the Year ● Attacks up 105% ● Phishing directly linked to later-stage ransomware ● Targeted attacks are up ● Higher ransoms and longer downtime ● Double & triple extortion threats ● Ransomware-as-a-Service (RaaS) ● Top security concern (with phishing)
  • 4. MSP360.COM Pen testing, monitor logs, know your data flow, impact of cybersecurity events NIST Cybersecurity Framework Guidance for organizations to better manage and reduce cybersecurity risk Identify assets / risks, inventory, cybersecurity roles Access (least privilege), encryption, backups, firewalls, EDR, OS updates, training Test & update response plans, coordinate with stakeholders Restore, communicate stakeholders, update recovery plans, PR
  • 5. MSP360.COM A Cyber Incident Response Plan Create one and you’ll be ready ● Create a Cyber Incident Response Team (CIRT) ● Develop a 24/7 Contact List for Response Personnel and Partners ● Compile Key Documentation of Business- Critical Networks and Systems ● Outline your Incident Reporting Requirements ● Develop Technical Response Procedures: Investigate, contain, eradicate, and recover ● Develop Legal Response Procedures ● Exercise the Plan, Train Staff, and Update the Plan Regularly
  • 6. MSP360.COM Customer Training And just maybe an additional revenue stream ● 88% of data breaches are caused by employee mistakes, distractions ● Cyber insurance requirements - phishing and security awareness training ● Conduct regularly scheduled training to educate and test cybersecurity awareness ● Conduct organization-wide phishing tests ● Improve password / credential management ● Work laptops are for work ● Configuring home network routers ● How to report suspicious emails, phone calls, activity Malicious!
  • 7. MSP360.COM Backup and restore, obviously… ● 2 Location, always encrypted, 1 offline / cloud ● Use cloud immutability / object-lock ● Back up what you need, using the right type of backup to meet RPOs and RTOs ● Adjust retention to meet compliance needs ● Regularly test your backups & restores ● Document how to restore key systems in the event of a ransomware attack ● Use more than one solution, if needed
  • 8. MSP360.COM Remediation And getting back to business ● Identify affected endpoints ● Consider backing up affected systems to avoid removing evidence ● Identify any compromised accounts ● Turn off infected machines (or everything if you're not sure) ● Identify the ransomware family – look for a decryptor ● Improve / review security and training ● Remove or reimage affected systems ● Restore data ● Perform a root-cause-analysis – your post-mortem
  • 9. Backup and IT Management Simplified
  • 10. MSP360.COM Useful Links To free stuff… ● CISA U.S. Cybersecurity & Infrastructure Security Agency https://www.cisa.gov/stopransomware ● NIST National Vulnerability Database https://nvd.nist.gov ● NIST – Ransomware Tips & Tactics: https://csrc.nist.gov/CSRC/media/Projects/ransomware-protection- and- response/documents/NIST_Ransomware_Tips_and_Tactics_Infogra phic.pdf ● NIST – Small Business Cybersecurity Corner: https://www.nist.gov/itl/smallbusinesscyber (planners and workbooks) ● NIST - Enterprise Patch Management Planning: Preventive Maintenance for Technology https://csrc.nist.gov/publications/detail/sp/800-40/rev-4/final ● Public Power Cyber Incident Response Playbook https://www.publicpower.org/system/files/documents/Public- Power-Cyber-Incident-Response-Playbook.pdf ● SonicWall 2022 Cyber Threat Report https://www.sonicwall.com/2022-cyber-threat-report * Please note that third-party links and web sites have not been vetted by MSP360
  • 11. MSP360.COM Phishing Simulators Attack Simulation Training ● Office 365 - Attack simulation training in Defender for Office 365 https://docs.microsoft.com/en-us/microsoft- 365/security/office-365-security/attack- simulation-training-get-started ● Infosec IQ - Free Phishing Risk Test https://www.infosecinstitute.com/form/iq- demo ● Gophish - Open-Source Phishing Framework https://getgophish.com ● Lucy - Phishing Attacks with Simulations & Training Courses(community and commercial) https://lucysecurity.com/phishing-attack- training/ * Please note that third-party links and web sites have not been vetted by MSP360
  • 12. MSP360.COM Ransomware Decryptors They’re out there… ● Check your security vendor web site for decryption tools ● Nomoreransom.org - Ransomware Identification and Decryption Tools https://www.nomoreransom.org ● ID Ransomware – https://id- ransomware.malwarehunterteam.com/ ● Emsisoft - https://www.emsisoft.com/ransomware- decryption-tools ● Avast - https://www.avast.com/ransomware-decryption- tools ● McAfee - https://www.mcafee.com/enterprise/en- us/downloads/free-tools/ransomware-decryption.html ● BitDefender - https://www.bitdefender.com/blog/labs/tag/free-tools * Please note that third-party links and web sites have not been vetted by MSP360

Editor's Notes

  1. Good afternoon everyone. Thanks for being here. I'm David Gugick, the VP of Product Management over at MSP360. And today, we're going to do a quick prepper guide on how you can best recover from a ransomware attack – either at the MSP or at a customer. As many of you have experienced, it’s usually not a matter of if, but when you'll have to recover from some cybersecurity incident like ransomware. So today’s topics will include a brief overview of the NIST Cybersecurity Framework, but we'll concentrate with the limited time we have on the recovery side. Because preparation is key to a faster recovery Maybe: These are the topics that MSPs we work with have said have helped them better prepare for dealing with ransomware events Now, we only have limited time, and there's a lot of material, so I've included some slides on the submitted slide deck with useful cybersecurity links, phishing simulators, and ransomware decryptors - so go ahead and download when you're back in the office