We are always available and extremely responsive.
Here are 4 Scenarios in which an organization learns of an infection
Keep in mind as you read the scenarios below that just because an organization identifies one infected host encrypting files, it does not mean others have not been affected. If a single host within an organization is found to be infected, there is a high likelihood that additional hosts are also infected because the same vulnerability may exist through hosts across the entire enterprise. If you identify an infected host that is responsible for encrypting files, especially on a network share, monitor the shares very closely after you take the infected host offline in case there are other infected hosts that continue the encryption process.
Scenario one — A network user attempts to access a file on a network share and finds it encrypted
Once users are identified, their devices and access should be disabled to halt the encryption process in the shared location.
Scenario two – A user attempts to access a local file and finds it is encrypted
Scenario three – A user receives a ransom message on user’s computer
Scenario four — Massive file manipulation alert