Chapter 9

Recovery

To achieve great things, two things are needed; a plan, and not quite enough time.

—Leonard Bernstein

Learning Objectives

  • Understand strategies for effectively restoring operations

  • Learn about processes for recovering data

  • Reduce the risk of data loss and potential reinfection

  • Effectively transition from crisis mode back to a “new normal”

Cyber extortion attacks can have a negative impact on the victim’s operations, either as a direct consequence (for example, in ransomware cases) or indirectly as a result of the containment and response activities. Throughout the entire crisis, responders must keep in mind the ultimate end goal: recovery.

“Recovery” in the context of this book is the process of regaining normal functionality ...

Get Ransomware and Cyber Extortion: Response and Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.