Risk & Business Magazine Nesbit Agencies Spring 2020 | Page 12

HACKED SYSTEM 5 First Steps To Take WhenYour BY: WAYNE NESBIT, NESBIT AGENCIES System Gets Hacked Your initial response to being hacked might be to panic. Unfortunately, responding to a malware attack in a state of panic often worsens the effects and leaves your system in an even more vulnerable position. To prevent a bad situation from getting worse, we’ve put together five critical steps to take when your system gets hacked. Of course cyber liability coverage is also integral to mitigating the risk and effects of a ransomware attack. Just as important as it is to prevent an attack, it's always best to have cyber liability insurance when it is needed. STEP #1 – DON’T PANIC This step is the most important, but in most cases, far easier said than done. So how do you go about keeping calm when you find yourself in this sticky situation? As you feel the panic start to set in, take a step back for just one minute. Practice any calming technique that is effective for you, such as closing your eyes and taking a deep breath or taking a sip of cold water. Refrain from impulsive decisions, but understand that action must be taken quickly to prevent the virus from spreading to other devices. Taking a minute to gather your bearings before addressing the attack will be time well spent as you approach the next steps with a clear head. While it is important to keep calm, it is also important to be efficient. If you feel too anxious or too disoriented to go through this process, ask for assistance from another member of your team. STEP #2 – ISOLATE, THEN IDENTIFY, THE INFECTION Some viruses move very fast, so it is critical to detect and isolate infected devices quickly. Once you’ve identified an infection—or even suspect a device may be infected— disconnect the affected device from all networks, both wireless and wired, and terminate connections to any external storage devices. The virus will be actively seeking out outgoing connections from infected devices, so be thorough when carrying out this step. Any devices that may have shared a connection with an infected device should be quarantined as well, even if they have not shown any signs of infection. Malware viruses will often sit dormant to avoid detection. To minimize the impact on your system, ensure that any device that may have come into contact with the infection is isolated until it can be assessed by an expert. Most ransomware will identify itself upon infection followed by a request for ransom. This is designed to be a fear-mongering technique on the part of the hacker, but it is also a double-edged sword as it gives you an idea of what you are dealing with. In the event that this does not occur on its own, there are numerous sites that will aid in identification of the virus. A few examples of such websites include ID Ransomware, No More Ransomware! Project, and Crypto Sheriff. Once you’ve identified the ransomware you have in play, you will be better equipped to understand how it works, what types of files it targets, and your options for disinfection and removal. STEP #3 – REPORT THE ATTACK Although authorities may not have the power to fully resolve the effects of the infection, reporting all ransomware attacks provides intel for law enforcement to develop preventative measures and reduce the risk of future attacks on you and others. STEP #4 – ASSESS YOUR OPTIONS When your devices are infected with ransomware, you are presented with only three options: 1. Pay the ransom. 2. Attempt to remove the malware. 3. Wipe systems and start from scratch. Paying the ransom is not recommended. At the very least, it will render you more susceptible as a target for future attacks. Additionally, in most cases, victims are not successful in unlocking the encrypted files even after paying the ransom. This leaves you with the two remaining options: restore your system or start from scratch. STEP #5 – TO RESTORE OR RESTART Although attempting to remove the malware may seem the most logical 12