Ransomware is a type of malicious software used to block access to your organization’s system or data. The cybercriminal holds your system or data hostage until the ransom is paid. The ransomware can spread to other systems and devices on your business network. If a ransom is not paid, the system or encrypted data will continue to be blocked and could be deleted.

Be Aware: Even after paying a ransom, the criminals may not return your data.

If you think your business has experienced a ransomware attack, we recommend that you act immediately by following our guidelines below, and then proceed to our ReportRecover and Reinforce sections for further assistance.

Some Immediate Action Steps to Take

  • Immediately remove infected computers or devices from your business network.
  • Consider temporarily taking your network offline to stop the spread of malware.
  • Isolate your backups immediately.
  • Disable all shared drives that hold critical business information.
  • Change all online account passwords and network passwords after removing the system from your network.
  • Help for Businesses: Find help with recovery by contacting one of our trusted partners.



These resources have been gathered, selected and vetted to help simplify the process of recovering after a cybercrime incident has taken place. You may need to contact organizations outside Results will vary depending on your circumstances.


Once you have notified the appropriate organizations and you are on the road to recovery, it is time to reinforce your cybersecurity using these resources and tools.

Implement Preventative Measures

  • Visit the Cyber Readiness Institute to create a Cyber Incident Response Plan.
  • Install the most up-to-date security software on all of your organization’s devices.
  • Always keep operating systems, security software, and apps up to date.
  • Keep your firewall turned on at all times to prevent hackers from stealing passwords or other sensitive information.
  • Routinely back up your business’s data.
  • Teach your employees to never click on a link or open an email attachment from someone they don’t know.
  • Learn how to understand and address cybersecurity risks with the Cybersecurity and Infrastructure Security Agency (CISA) Cyber Essentials Toolkits.

Community Resources