Ransomware attacks can be extremely stressful. We understand just how detrimental they can be to your systems and are here to offer advice in remediating the situation, should you find yourself under attack.

If you’ve been hit by ransomware, there are a few key steps you should follow:

  1. Contain and Neutralize

The first step with any sort of ransomware attack is to determine if the attack is still happening and to react as quickly as possible. If you don’t have a solution in place to stop the attack, then you’ll need to isolate where the attack is. Unplug the network cable or turn off the WiFi for the network segments that are affected and consider shutting down devices if you’re unable to do so.

At this point you should inform your teams of what has happened (do so offline in the event your communication is at risk) and assess the damage. Figure out what systems have been affected and if there is any loss. You’ll want to get your IT team working immediately to get a comprehensive understanding of what has been breached.

  1. Investigate

With your systems neutralized, it’s time to do a deep dive to see what exactly happened so you can not only understand how your business has been comprised and to also put a solution in place to reduce the risk of this happening again. Somethings you’ll want to know:

  • How long were your systems under attack?
  • What method was used to breach your network?
  • How many accounts were compromised?
  • Were backdoors installed in your network?
  • Are your backups up to date and uncompromised?
  • What data was exfiltrated?
  • Was your security disabled?
  1. Enhance Your Security

With ransomware attacks constantly evolving, it’s important to have a solution in place that is up to date and proactively protecting your system. There is no one size fits all solution when it comes to security. You want a solution that is in-depth and covers your unique business needs. Consider a cloud-based solution with multi-factor authentication and role-based administration. It is critical to always have updated backups as well.

If this seems overwhelming, know that the NSA Touch is here to help. We have over 35 years experience helping businesses just like yours stay protected from today’s latest ransomware threats. If you’re ready to put a solution in place to protect your business, don’t hesitate to contact us today.

WebPresented provides a fully-integrated CRM, Quoting, and BI tool built specifically for the wholesale distribution industry.

WebPresented CRM, or WPCRM, uses the existing data in your ERP to provide key information to the sales reps so they can work better and smarter - whether that’s saving time, closing more business, or increasing margins. WPCRM was designed for the sales reps to be easy-to-use, valuable, and accessible.

billtrust logo
Customers often ask how Microsoft deploys its own technologies. What were the initial catalysts for change? The challenges? The benefits? You’ll find those answers here. Microsoft IT Showcase provides what no one else can—the inside story of how Microsoft does IT. By detailing how Microsoft rolls out technology solutions across its own enterprise environment, we will inspire and equip you with the resources to inform your most crucial IT business decisions.

We love to talk about IT. It’s our passion. And we’re armed with some of the best technical minds in the industry. Our IT experts know what they’re doing and pride themselves on digging in to get the most out of technology. Our entire platform is based on their knowledge and we’re better for it.

sparxiqBusiness Intelligent and Pricing Analytics.SPARXiQ delivers analytics, software, and training to help companies get the most out of both their data and people. SPARXiQ provides data-driven price optimization solutions that enable companies to quickly and easily improve margins and profitability. With the launch of an entry-level pricing solution, Switch™, clients can get results more quickly than ever using integrated modules for leading electrical industry ERP systems. Since our inception in 1993, SPARXiQ (formerly SPA) has generated billions of dollars of profitable growth for hundreds of organizations, including twenty-five Fortune 500 companies. For more information, contact Brian Weaver at NSA.

billtrust logo
We know that a proper security strategy must include networks, servers and devices—all devices—managed easily through the cloud. Sophos products allow you to secure every end point of your network, from laptops to virtual desktops and servers, to web and email traffic and mobile devices. What’s more, securing these devices is made possible through products that fit your precise needs. We can ensure your network’s security by providing the one thing no one else can: Single sourced simplicity.

Sophos began producing antivirus and encryption products nearly 30 years ago. Today Sophos products help secure the networks used by 100 million people in 150 countries and 100,000 businesses, including organizations such as Pixar, Under Armour, Xerox, Ford, Avis, and Toshiba. As IT networks grow in complexity, we wanted a solution for our clients that was focused on keeping IT security simple and reliable.