Approaching A Ransomware Compromise.
The chosen theme of field based devices and their ability to provide commodity services can only be successful if the core infrastructure and the devices themselves remain operational. Ransomware was a reoccurring theme at the cloud expo reported on a few blogs ago and can effect devices so that business services are diminished. Below are some points for review on responding to a ransomware compromise: Based on the size of your geographical network, a two, three or n tiered approach can be used to respond to ransomware attack. Prioritisation will be key to be effective, such as ; (i) Identify effected/reported core business networks, then engage in your DR plan to bring online backed-up data in a clean environment. This will let your business continue its operations, albeit within limits. Your…