Written October 30th, 2023
As discussed in Part I of this series, crypto-ransomware is quickly becoming the extortion tool of choice for cybercriminals. Even when an organization trains its employees to guard against social engineering, disables macros and configures ad-blockers, and takes an array of other steps to protect its data, it only takes one misstep for threat actors to hold data hostage. Part II of this series investigates what actions organizations can take after an attack and what they can do to remediate its effects.