Logo

The Computing Australia Ransomware Guide

Ransomware 101

Ransomware 101 for businesses and teams

What it is, how it breaks in, how to prevent it, and exactly what to do if you’re hit – plus a pragmatic recovery checklist and training plan – are all covered in this ransomware guide. This expanded guide modernises your original post with actionable steps, clear priorities, and enterprise-grade best practices adapted for SMBs and mid-market organisations.

What Is Ransomware?

Ransomware is malicious software that encrypts your files or otherwise locks you out of systems, then demands a ransom-usually in cryptocurrency-to restore access or to prevent the release of stolen data. Modern variants frequently use “double” (and sometimes triple) extortion:

Impacts range from a single locked laptop to entire networks: servers, endpoints, cloud accounts, phones, IoT devices, and line-of-business apps.

How Ransomware Enters Your Business

Attackers take the easiest reliable path. Common initial access routes:

1. Phishing emails & malicious links/attachments

2. Compromised credentials

3. Unpatched vulnerabilities

4. Exposed remote access (RDP/SSH/VNC)

5. Third-party & supply chain

6. Malvertising & drive-by downloads

The Modern Ransomware Playbook (What Actually Happens)

1. Initial Foothold – Via phishing, credential abuse, or a vulnerable service.

2. Persistence – New admin accounts, scheduled tasks, registry keys, or cloud tokens to survive reboots.

3. Privilege Escalation – Credential dumping (e.g., LSASS memory), keylogging, Kerberoasting; goal is Domain Admin or equivalent cloud super-admin.

4. Discovery & Lateral Movement – Mapping shares, identity stores, hypervisors, cloud storage; moving via RDP/PSExec/WinRM, abusing misconfigured identity and legacy protocols.

5. Exfiltration – Sensitive data zipped and exfiltrated to attacker infrastructure or cloud buckets.

6. Impact – Mass encryption, deletion or corruption of backups, system destruction, ransom note dropped across endpoints.

Understanding this chain helps you place controls where they break the sequence.

Prevention: Controls That Actually Move the Needle

Below are layered controls-start with the Foundations and work up.

Foundations (Non-negotiable)

Hardening (High ROI)

Governance & Insurance

End-User Habits That Reduce Risk

Your people are your biggest attack surface. Train and reinforce:

If You’re Hit: A Calm, Step-By-Step Incident Response

The goal in the first hours is containment and preservation-stop the bleeding, keep evidence, and avoid making it worse.

1. Record Everything

2. Isolate Affected Systems

3. Disable Potentially Abused Accounts

4. Secure Backups Now

5. Engage Specialists

6. Do Not

7. Communications

Recovering From a Ransomware Attack

Ransomware - Computing Australia Group

Once contained, move through these phases:

1) Triage & Forensics

2) Eradication

3) Restoration (Clean-Room Approach)

4) Post-Incident Hardening

Should you pay? Paying does not guarantee full decryption or data deletion and can attract repeat targeting. Decisions should be made with legal, law enforcement, and insurance input and only after exploring recovery options.

Business Continuity: Backups, Testing & Tabletop Exercises

Backups succeed at restore, not at “completion.” Make them boring, automated, and proven:

Tabletop Exercises

Twice yearly, simulate scenarios: email account takeover, ransomware outbreak, cloud credential compromise. Practice escalation, decisions, notifications, and restores.

Training: Build a Human Firewall

Ransomware defence isn’t about a single tool-it’s about layers: strong identity, hardened endpoints, segmented networks, bulletproof backups, trained people, and a tested plan. With those in place-and a trustworthy partner like The Computing Australia Group-you dramatically reduce the chance of a breach and, just as importantly, speed recovery if one occurs.

Call Chris on 0438 855 884 or email sales@computingaustralia.group

FAQ

No. Decryptors can be faulty; data may still be leaked; you may be targeted again. Exhaust recovery options first and consult legal/insurance.

Cloud reduces some risks but doesn’t eliminate them. Attackers can encrypt synced files or steal cloud credentials. Apply MFA, conditional access, least privilege, and versioned/immutable backups.

Align to business needs. Many opt for hourly incrementals on key systems and daily fulls, with 90-day retention plus monthly/yearly archives.

MFA everywhere plus EDR on every device-these stop a large percentage of real-world attacks.

Far fewer people than you think. Use just-in-time elevation and audit admin actions.