What is a ransomware attack?
A ransomware attack is when criminals gain access to your systems, encrypt files (or lock you out), and demand payment for a decryption key or to prevent data being leaked. Many modern ransomware groups also steal data first (“double extortion”), meaning the risk isn’t just downtime — it can include data exposure, fraud, and reputational damage.
First 15 minutes: immediate actions
The goal here is to stop the spread and protect evidence.
Isolate affected devices immediately
Disconnect from the network (unplug ethernet, turn off Wi-Fi).
If it’s a server, isolate the host/network segment rather than powering off everything blindly.
Do not reboot, wipe, or “factory reset” yet
Preserve evidence for investigation and insurance requirements.
A rushed wipe can destroy logs that show how the attacker got in.
Document what you’re seeing
Screenshot ransom notes, file extensions, error messages.
Record the time you noticed it and which users/devices are affected.
Stop automated spread
Disable affected user accounts temporarily (especially admin).
If you suspect active encryption across the estate, consider temporarily disabling shared drives.
First hour: assess the blast radius
Now you’re working out what’s impacted and what’s at risk next.
Check:
Endpoints: which laptops/desktops are encrypted?
Servers & file shares: are shared drives affected?
Backups: are backups online/connected and potentially encrypted too?
Identity: any signs of compromised admin accounts, MFA changes, unusual logins?
Email / Microsoft 365: forwarding rules, unusual sign-ins, malicious OAuth apps.
Data exfiltration: evidence of large outbound transfers, new remote tools, unusual VPN activity.
This is where most organisations realise ransomware is rarely “one PC” — it’s often tied to credential theft, remote access, and lateral movement.
What NOT to do (common mistakes)
Don’t pay immediately. Paying doesn’t guarantee recovery and can encourage repeat attacks.
Don’t announce details publicly too early. Keep comms controlled until facts are confirmed.
Don’t restore before containment. If you restore while the attacker still has access, you can be reinfected.
Don’t assume backups are clean. Backups can be encrypted or poisoned if attackers had time.
Who to contact (and in what order)
Every business will be different, but a sensible order is:
Your IT/security provider (or incident response partner)
Cyber insurance provider (if applicable) Insurers often require using approved incident-response partners.
Law enforcement / reporting routes In the UK, many organisations report cybercrime via Action Fraud and follow NCSC guidance.
Legal/compliance support Especially if personal data or regulated data might be involved.
Regulatory considerations (UK)
If there’s a chance personal data is compromised, you may need to assess whether this is a reportable breach (e.g., to the ICO) and whether individuals need notifying. This depends on the type of data, likelihood of harm, and confirmed exposure — not just the presence of ransomware.
(Note: this is general guidance, not legal advice.)
Recovery: Contain → Eradicate → Restore (the safe order)
Containment
Block known malicious IPs/domains (where identified).
Remove remote tools the attacker used (or isolate systems until forensics is complete).
Eradication
Patch exploited vulnerabilities.
Remove persistence mechanisms (scheduled tasks, new admin accounts, malicious GPOs).
Reset credentials (prioritise admins, service accounts, shared passwords).
Review MFA, conditional access, and admin permissions.
Restoration
Restore from known-good offline/immutable backups.
Validate restored systems before reconnecting to the network.
Monitor aggressively for re-entry attempts.
Post-incident hardening (so it doesn't happen again)
Most successful ransomware attacks exploit gaps in a few common areas:
MFA everywhere (especially admin + remote access)
Remove unnecessary admin rights and segment admin accounts
Patch management for endpoints, servers, VPNs, firewalls
Email security and user training for phishing
Network segmentation (limit lateral movement)
Backups: 3-2-1 strategy, offline/immutable copies, regular restore tests
Logging/monitoring: central logs + alerting
Signs you may still be compromised
Even after recovery, watch for:
New admin accounts
MFA method changes you didn’t approve
Unusual login locations
New email forwarding rules
Unknown scheduled tasks/services
Endpoint tools disabled unexpectedly
If any of these appear, treat it as an active incident until proven otherwise.
People Also Ask
What should I do first in a ransomware attack?
Isolate affected devices from the network, document what you see, and begin assessing what systems/accounts are impacted. Avoid wiping or restoring until you’ve contained the threat.
Should you pay a ransomware ransom?
Paying is risky: it doesn’t guarantee recovery and can lead to repeat targeting. Decisions should be made with specialist advice, legal/compliance input, and your insurer (if applicable).
Can ransomware spread to Microsoft 365?
Ransomware typically encrypts local and network files, but attackers may also target cloud data by compromising accounts, deleting files, or encrypting synced folders. Identity security is critical.
How do you know if data was stolen?
Look for signs of large outbound transfers, unusual remote tools, and attacker activity before encryption. A proper investigation (logs + forensics) is often required to confirm exfiltration.
How long does recovery take?
It depends on the size of the environment, backup quality, and whether attackers maintained access. Many businesses underestimate the time needed for secure restoration and verification.
TL;DR
Act fast: isolate infected devices immediately (wifi off / unplug network).
Don’t pay or negotiate until you’ve assessed what’s affected and spoken to specialists/insurer.
Preserve evidence: don’t wipe machines yet—capture notes/screenshots and keep logs.
Check what’s hit: endpoints, servers, Microsoft 365, backups, and admin accounts.
Contain → eradicate → recover: restore from clean backups, rotate credentials, patch gaps.
Report if required: consider legal/regulatory duties (e.g., ICO if personal data is impacted).
If you need help, contact an incident response provider.


Written by:
Steve Harper
Commercial Director
Sources
NCSC (UK), ICO (UK), Action Fraud (UK), Microsoft Security documentation, CISA (US), NIST incident handling guidance, ENISA guidance, industry incident-response best practices.
Relating Insights
So, why IT Desk?

Proactive & Reactive Support
In 2024, we achieved an average response time of 13 seconds. Most IT support providers respond anywhere between 30 seconds and 1 minute.
Not only this, 99.5% of our feedback we received was rated 4 out of 4, making this one of our best years yet!

Award Winning
Recognised by Three Best Rated as one of the 'Three Best Rated' IT Service Providers in the Rotherham area. Our feedback definitely reflects this!
Acknowledged by Barnsley & Rotherham Chamber of Commerce over the years for Excellence in Customer Service and Commitment to People Development.

Experienced & Certified
Awarded the 'Investors in People' certification, which is an industry standard that shows IT Desk as being actively committed to developing and supporting it's employees.
From apprentices to managers to solution engineers, our team of people is truly unique - often described by them as a 'family'!

Reliable & Consistent
Founded in Rotherham in 2006, we started out offering IT support to local businesses. Over the years, we've expanded to serve clients throughout the UK.
With over a decade of experience, we offer exceptional localised IT support, particularly in South Yorkshire, and specialise in assisting SMEs.
Innovative Solutions for Businesses
19+
Years of Experience
A legacy of excellence IT services.
70%
Increase in Efficiency
Streamlined operations and improved workflow.
99.9%
Client Satisfaction Rate
Trusted by businesses across all sectors for superior service.
1200+
Projects Completed
Delivering cutting-edge solutions for a seamless digital future.

.png)










