Florida Restaurant & Lodging Magazine Winter 2022 v2

Page 33

TECHNOLOGY ISSUE

T

Six Steps to Recover After a Ransomware Attack By KATHY ENNIS, CPA, PARTNER AND LENA COMBS, CPA, PARTNER

R

ansomware is a type of cyberattack that can infect a system whenever a user interacts with a malicious link, website or file. In a ransomware attack, the hacker encodes data that can only be retrieved by paying a ransom and obtaining the encryption key used for decoding. Ransomware attacks are continuing to rise at an alarming rate, with cybercriminals targeting businesses across virtually all industries. If you get infected by ransomware, follow these tips on how to recover from a ransomware attack: » Discover what kind of ransomware is attacking you. The best way to do this is to ascertain how much of your data you still have access to. There are two common types of ransomware, screen-locking and encryption-based, with each operating a little differently. Depending on the type of ransomware impacting you, there’s a chance that data recovery is still possible, and there may be a way to decode the encrypted files without having to pay the ransom. If you don’t have the internal resources to diagnose the type of ransomware you’ve been infected with, engage a trusted cybersecurity firm for help. » Disconnect from everything. The most important thing you can do is restrict ransomware impact by disconnecting your device, turning off the Wi-Fi, and preventing the virus from spreading throughout the network.

» Take a picture of the ransomware screen. When attacked, a note identifying the ransom will be displayed, including the amount

to be paid and where to send the payment. Take a picture so the information is readily available when the appropriate authorities are contacted. » Enact your incident response plan. If you have one, enact your incident response policy immediately because this is a security breach. Follow the measures defined in your policy to ensure that the proper steps are taken, including notifying stakeholders of the breach. » Attempt restoration from backups. If possible, you may want to restore your systems from any backups you have available. However, be cognizant that the ransomware may have been in your system for some time, so any backups could be compromised as well. Before restoring, make sure to deploy antivirus software through your system. » Prevent it from reoccurring. Put measures in place to prevent future attacks. Protect your network with a phishing assessment and phishing awareness training. Understand your threat intelligence with an Open Source Intelligence Report (OSINT) Dark Web scan, and analyze your data privacy risks with Data Privacy Assurance. Ensure that you have an independent cyber insurance policy, and conduct a risk analysis. A proactive approach is the best way for businesses to help prevent a ransomware attack. In the event of a cyberattack, it is important for companies to investigate and immediately mitigate any impacts.

Withum is a forward-thinking, technology-driven advisory and accounting firm, committed to helping clients in the hospitality industry be more profitable, efficient and productive in the modern business landscape. For more information, visit www.withum.com FRL A .org

FLORIDA RESTAUR ANT & LOD GING

33


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Jack and Jill Foundation Paying it Forward

3min
page 59

CORE A Resource for Serving Up Hope

1min
page 58

Hall of Fame John Rivers, Peter Kacheris

3min
page 53

FPL Energy Natural Gas Prices Rising

2min
pages 44-45

Gas South Be a Fuel for Good

2min
pages 50-51

Boost Your Hiring Strategy

2min
pages 48-49

Chicken Sandwich Wars Competing Online

3min
pages 42-43

Cyber Insurance Can You Afford to Be Without It?

2min
pages 40-41

A La Carte Polpo, Versailles, In Passing

2min
page 52

Heartland Empowering Employees Unlock Potential

3min
page 46

Invest in the Future Embrace Technology

3min
page 39

Combatting Ransomware Safeguarding Your Business

9min
pages 36-38

The Digital World Protecting Information

2min
pages 30-31

Restaurant Robots The Newest in Restaurant Tech

2min
page 29

The Latest Advances Kiosks, Website Accessibility

2min
page 35

Workers’ Comp Achieving the Best Outcomes with Tech From Zenith

3min
page 34

Sunday Pay That Tab Fast

1min
page 32

Ransomware Attack 6 Steps to Recovery

2min
page 33

FNGA Natural Gas Means Business

3min
pages 26-28

Leadership Reports Letters from CEO, Board Chair

2min
pages 6-7

FRLA's 2022 Legislative Agenda Vacation Rentals and More

3min
pages 12-13

Path to Power The Motwani Family

11min
pages 8-11

Fuel Lighting The Latest in Outdoor Illumination

2min
page 24

Government Relations Richard Turner Retires

6min
pages 14-17

The Palm Beaches Kenneth Spillias Talks

3min
pages 20-21

Fiberbuilt Tips From an Old Professional

1min
page 25

MODSTREET Upgrade Your Outdoor Dining

2min
pages 18-19
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.