Ransomware Response Guide
As of the start of 2016, there are now numerous different variants of ransomware in use. Some are very efficient and highly successful in rendering files inaccessible unless a ransom is paid, while other variants attempt to accomplish the same goal, but implement the encryption process poorly.
This guide explains the variants of Ransomware, takes you through the incident lifecycle and how to effectively respond to situations or incidents. The guide covers the key steps of:
- Detection and Analysis
- Containment, Eradication and Recovery
- Post Incident Activity