Cybersecurity

How to Recover From a Ransomware Attack: The IT Center 3-Phase Protocol

Back to Blog

It's Tuesday morning. Your accounting manager walks in, sits down, and her screen looks wrong. The desktop wallpaper has been replaced with a message in red text. Every file she tries to open returns an error. At the bottom of the screen: a countdown timer, ticking down from 72 hours, and a demand for $85,000 in Bitcoin.

What do you do in the first 60 seconds?

Most business owners have no answer to that question — and that silence is exactly what ransomware gangs count on. The first minutes after discovery are the most consequential of the entire incident. Decisions made in panic can destroy forensic evidence, spread the infection to additional machines, or signal to the attacker that you're scrambling. Decisions made from a prepared playbook contain the damage and shorten the recovery timeline from months to days.

This article walks through IT Center's Post-Breach 3-Phase Incident Response Protocol in full detail — the same framework our team activates within minutes of getting a ransomware call from a client. Read it now, while you don't need it, and you'll be exponentially better positioned when you do.

What Ransomware Is and How It Reaches You

Ransomware is malicious software that encrypts your files — making them completely inaccessible — and then demands payment in exchange for the decryption key. What began in the late 1980s as a novelty delivered by floppy disk has evolved into a multi-billion-dollar criminal industry, complete with affiliate programs, dedicated help desks for victims, and sophisticated negotiation teams on the attacker's side.

The United States is the number-one target for ransomware attacks globally. American businesses represent the most profitable victims: higher average ransoms, greater likelihood of cyber insurance coverage, and more pressure to restore operations quickly. Small and mid-sized businesses are now the primary target — not enterprises — because attackers know that SMBs are less likely to have mature defenses.

Ransomware reaches your network through three primary vectors that have remained remarkably consistent for over a decade because they keep working:

  • Phishing attachments and links — A convincing email arrives from what appears to be a vendor, client, or shipping company. An employee clicks a link or opens an attachment. A credential is captured, or a loader is silently installed. The attacker then moves laterally through your network over hours or days before triggering the encryption. The 2024 Verizon DBIR found that phishing remains the leading delivery method for ransomware.
  • RDP brute force — Remote Desktop Protocol exposed directly to the internet is one of the most abused attack surfaces in modern cybercrime. Automated tools attempt thousands of password combinations per minute. Once they succeed, the attacker has direct interactive access to your network — no phishing required. If your RDP is open to the internet without a VPN in front of it, credential-stuffing tools are scanning it right now.
  • Supply chain compromise — An attacker compromises a software vendor you use, pushing a malicious update that installs a backdoor when you apply what appears to be a legitimate patch. The SolarWinds and Kaseya incidents demonstrated how effectively this model scales. Your own security posture is only as strong as the weakest vendor in your stack.

The Mistake That Costs You Everything: Do Not Pay the Ransom

When employees are locked out and operations are grinding to a halt, the path of least resistance feels obvious: just pay. Restore the files. Get back to work. Avoid the ordeal.

Do not pay the ransom.

This is not a moral argument, though there are moral dimensions. It is a pragmatic one, supported by data that consistently shows payment is the worst financial decision you can make in this situation.

65%
of businesses that pay a ransomware demand successfully recover all their data — meaning 35% pay and still lose files permanently. (Sophos State of Ransomware 2024)

Even in the best case where decryption works, you have not solved the problem. You have demonstrated to the attacker that you pay. That information circulates in criminal forums. Your company profile — size, industry, willingness to pay — becomes a known quantity. Businesses that pay are significantly more likely to be targeted again within 12 months, often by the same group or an affiliate that purchased your profile.

There is also a legal dimension. Since 2021, the U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has designated multiple ransomware groups as sanctioned entities. Paying a ransom to a designated group — even without knowing it — can expose your company to federal penalties for sanctions violations. Your payment could become a separate legal crisis layered on top of the original attack.

The correct path is containment, assessment, and recovery through your own infrastructure — with professional incident response support if your internal team is not equipped. That path is what the 3-Phase Protocol below describes.

The IT Center 3-Phase Post-Breach IR Protocol

When a client calls IT Center with an active ransomware incident, we immediately activate this three-phase protocol. The phases are not sequential suggestions — they are a tightly sequenced operational framework where each phase's outputs enable the next phase's decisions. Every action has a reason, and the order matters.

Phase 1
0–12 Hours
Phase 2
12–72 Hours
Phase 3
1–4 Weeks
1
First 12 Hours
Contain — Stop the Spread Before Anything Else

The single goal of Phase 1 is containment. You cannot recover what you cannot stop from spreading. Every action in this phase is designed to isolate the infection and preserve evidence — in that order.

  • Disconnect infected machines from the network immediately — physically unplug ethernet cables or disconnect from Wi-Fi. Do not shut the machines down. Powered-off machines destroy volatile memory that forensics teams use to identify the ransomware variant, encryption keys held in RAM, and attacker activity logs. Disconnected but running machines preserve that data.
  • Change ALL passwords from a clean, unaffected device — not from any machine that was connected to the compromised network. Start with domain administrator accounts and any accounts with elevated privileges. Change every service account, every shared credential, and every user password across the organization. Assume all credentials stored on affected machines are compromised.
  • Notify your bank immediately — call the fraud line, not the standard customer service line. Request a freeze on outgoing wire transfers and flag any pending transactions for review. Ransomware actors frequently time their encryption events to coincide with fraudulent wire transfers initiated with previously stolen credentials. Your financial accounts may be the second target.
  • Revoke all active email sessions — in Microsoft 365, go to the admin center and force a sign-out of all active sessions. This terminates any sessions the attacker may be riding using stolen credentials, including sessions on mobile devices and browsers that remember login state. Do this before resetting passwords, or the attacker will simply use the active session to reset the new password themselves.
  • Send the customer notice template if there is any possibility that customer or partner data was accessed — do not wait for confirmation. Proactive notification is both legally protective (it demonstrates you acted in good faith) and relationship-protective. Customers who learn about a breach from news coverage rather than from you rarely return.
  • Suspend compromised user accounts — do not delete them. Disable the accounts in Active Directory or your identity provider so they cannot be used, but preserve the account and its audit history. Deleted accounts lose the logs needed to understand what the attacker did, what they accessed, and when.
2
12–72 Hours
Assess — Find the Infection, Close the Door

With the immediate bleeding stopped, Phase 2 is about understanding exactly what happened. You cannot build a clean environment on top of an environment that still contains the attacker. This phase must be methodical and documented.

  • Service enumeration across all running systems — produce a complete inventory of every process, service, and scheduled task running on every machine that was connected to the network during the incident window. Unusual processes running under system accounts, processes with randomized names, or legitimate Windows tools being used in unusual ways are all indicators of active attacker presence.
  • Persistence hook check — ransomware actors routinely install persistence mechanisms before triggering encryption, ensuring they can re-enter your environment even after you rebuild. Check Windows registry Run keys, scheduled tasks, startup folder items, WMI subscriptions, and any scripts in startup directories. These hooks are often disguised as legitimate-looking Windows system entries.
  • AV health verification — determine whether your antivirus was disabled, modified, or blinded prior to the attack. Modern ransomware loaders frequently disable or quarantine AV tooling as their first action after gaining access. If your AV was tampered with, the log gap tells you approximately when the attacker gained elevated privileges.
  • Firewall audit — review all inbound and outbound firewall rules, looking specifically for rules that were added or modified in the weeks before the incident. Identify the initial entry point: was RDP exposed? Was there an unpatched VPN vulnerability? Was a new rule added to allow outbound communication to a command-and-control server? Close every anomalous rule before beginning recovery.
  • OS patch status validation — document the patch level of every system. This serves two purposes: it identifies which known vulnerabilities may have been the entry point, and it establishes a baseline that your recovery plan will need to address before systems are returned to production.
3
1–4 Weeks
Harden — Rebuild on a Foundation That Won't Break Again

Phase 3 is where most businesses make their second critical mistake: they restore from backup and declare victory without addressing the underlying conditions that allowed the attack to succeed. Phase 3 ensures that the environment you restore into is fundamentally more resilient than the one that was compromised.

  • Deploy EDR/MDR on all endpoints — endpoint detection and response tools analyze behavioral patterns in real time and catch threats that signature-based antivirus cannot detect. Modern ransomware is specifically engineered to evade signature detection. EDR tools detect the behavior of encryption — a process rapidly writing to hundreds of files — regardless of whether the ransomware variant has ever been seen before. IT Center deploys and manages EDR/MDR as part of our cybersecurity stack for every managed client.
  • Microsoft 365 migration if not already on it — local Exchange servers, on-premises file servers, and aging email infrastructure are disproportionately represented in ransomware incidents. M365 provides cloud-native email with advanced threat protection, SharePoint and OneDrive with version history and ransomware recovery features, and centralized identity management through Entra ID (formerly Azure AD). Moving to M365 eliminates an entire class of attack surface.
  • MFA enforcement on all accounts without exceptions — multi-factor authentication is the single highest-return security control available to SMBs. It stops the majority of credential-based attacks even if credentials are fully compromised. MFA must be enforced on every account — email, VPN, cloud platforms, banking portals, and line-of-business applications. Carve-outs for "convenience" are carve-outs for attackers.
  • Patch management cadence — implement an enforced patch cycle with documented SLAs: critical patches deployed within 14 days of release, standard patches within 30. Use your RMM platform or IT Center's managed patching service to automate deployment and generate compliance reports. Manual patching is not a process — it is a hope.
  • User awareness training — your employees are both your largest attack surface and, when trained, your most powerful early-warning system. Phishing simulation campaigns — where you send controlled fake phishing emails to your own employees and track click rates — identify your highest-risk users and give you data to improve training. The goal is not to punish people who click; it is to build the organizational muscle memory of skepticism before the real attack arrives.

The Backup Question: Your Recovery Timeline Depends on This

There is a question we ask every prospective client: "When did you last restore something from your backups?" The answer tells us almost everything we need to know about their actual recovery posture.

Most businesses believe they have backups. Fewer have verified those backups are complete and current. Fewer still have actually tested a restore under simulated pressure. And some discover, only at the moment they need them most, that their backup job has been silently failing for months.

The industry standard for backup architecture is the 3-2-1 rule:

3
Copies of Your Data
One primary, two backups — so a single failure never leaves you with no copy
2
Different Media Types
Cloud and local, or cloud and tape — so a single storage failure cannot wipe all copies
1
Offsite or Air-Gapped Copy
A copy that ransomware cannot reach — immutable cloud storage or physically separated media

IT Center verifies backup integrity monthly for all managed clients — not just confirming that backup jobs are reporting success, but performing actual file-level restore tests on a rotating subset of data. This distinction matters enormously. A backup job that reports "completed successfully" can still produce a corrupt or incomplete archive. The only way to know your backup works is to restore from it.

If your backups are current, verified, and accessible from a clean environment, your recovery timeline from a ransomware attack is measured in hours to days. If you are rebuilding from scratch because your backups were also encrypted (many ransomware variants specifically target and destroy backup infrastructure), your recovery timeline is measured in weeks to months — and the business impact compounds daily.

The critical detail most businesses miss: Many ransomware variants search for and encrypt mapped network drives and connected backup devices before triggering their visible payload. If your backup destination is a network share that your servers can see, it can be encrypted. Offsite and immutable backups are not optional — they are the difference between a recoverable incident and an existential one.

After Recovery: The Hardening Checklist

Surviving a ransomware attack is not the same as being protected against the next one. The post-recovery period is when your organization is most motivated to invest in the controls that would have prevented the incident — and most tempted to declare victory and move on once systems are back online. Do not move on without completing this hardening checklist.

  • EDR/MDR deployed and actively monitored on every endpoint, server, and laptop in the organization
  • MFA enforced on all accounts — email, VPN, banking portals, cloud platforms, and line-of-business applications with no exceptions
  • Automated patch management with documented SLAs for critical and standard patches, verified by RMM reporting
  • 3-2-1 backup architecture with immutable or air-gapped offsite copy, verified monthly by actual restore test
  • Firewall rules audited and documented — Netgate/pfSense or equivalent with all unnecessary inbound exposure closed
  • RDP inaccessible from the internet — VPN required for all remote access, with MFA enforced on VPN login
  • Incident response plan documented, distributed, and tested — every employee knows who to call and what not to touch
  • User awareness training scheduled quarterly with phishing simulation campaigns and tracked click-rate improvement
  • Dark web monitoring active — alerts when company email domains, employee credentials, or business data appear in breach databases

Ransomware and Cyber Insurance

If your business carries a cyber insurance policy, your insurer needs to be notified within the timeframe specified in your policy — often 24 to 72 hours of discovery. Failing to notify within that window can affect your ability to make a claim, regardless of coverage terms.

Most cyber insurance policies cover some combination of ransom payment (though IT Center advises against paying), forensics and IR costs, business interruption losses, legal and notification costs, and credit monitoring for affected individuals. Understanding exactly what your policy covers — and what its exclusions are — before an incident is the only way to avoid unpleasant surprises during one.

Many insurers now require documented security controls as a condition of coverage. Businesses without MFA, without tested backups, or without a written incident response plan may find claims denied on the grounds that required controls were not in place. IT Center can help you understand what your insurer requires and implement the controls that both protect your business and maintain your coverage.

For a deeper look at what cyber insurance covers and where the gaps typically are, see our guide: What Cyber Insurance Actually Covers (and What It Doesn't).

60% of small businesses that experience a major cyberattack close within six months. The ones that survive are not necessarily the ones with bigger IT budgets — they are the ones with a plan. The IT Center 3-Phase Protocol exists because surviving an attack requires a playbook, not improvisation.

Don't Wait for the Countdown Timer

IT Center provides ransomware readiness assessments for Southern California businesses — a structured review of your backup posture, endpoint protection, network exposure, and incident response preparedness. We will tell you exactly where you are vulnerable and what it takes to close those gaps before an attacker finds them.

Request a Readiness Assessment Call (888) 221-0098

IT Center — IT Center | 1159 Pomona Road Suite B, Corona, CA 92882 | Founded 2012 | (888) 221-0098