You have trained your staff and improved your defenses. In spite of your best efforts, you have an active case of crypto-malware running on a system in your business. How do you recover?
Here are the steps to recovery:
- Disconnect the affected system from the network by removing the Ethernet network cable connection or turning off the Wi-Fi connection.
- Determine if the encryption process has completed.
- If so, leave the system running, but disconnected from the network. ...