The Definitive Guide to Ransomware Response


Download now

First name
Last name
Business email
Calling Code
  • (+1)
Business phone
Job title
Company name
  • Afghanistan
  • Albania
  • Algeria
  • American Samoa
  • Andorra
  • Angola
  • Anguilla
  • Antarctica
  • Antigua & Barbuda
  • Argentina
  • Armenia
  • Aruba
  • Ascension Island
  • Australia
  • Austria
  • Azerbaijan
  • Bahamas
  • Bahrain
  • Bangladesh
  • Barbados
  • Belarus
  • Belgium
  • Belize
  • Benin
  • Bermuda
  • Bhutan
  • Bolivia
  • Bosnia & Herzegovina
  • Botswana
  • Bouvet Island
  • Brazil
  • British Indian Ocean Territory
  • British Virgin Islands
  • Brunei
  • Bulgaria
  • Burkina Faso
  • Burundi
  • Cambodia
  • Cameroon
  • Canada
  • Cape Verde
  • Cayman Islands
  • Central African Republic
  • Chad
  • Chile
  • China
  • Christmas Island
  • Cocos (Keeling) Islands
  • Colombia
  • Comoros
  • Congo - Brazzaville
  • Congo - Kinshasa
  • Cook Islands
  • Costa Rica
  • Croatia
  • Curaçao
  • Cyprus
  • Czechia
  • Côte d’Ivoire
  • Denmark
  • Djibouti
  • Dominica
  • Dominican Republic
  • Ecuador
  • Egypt
  • El Salvador
  • Equatorial Guinea
  • Eritrea
  • Estonia
  • Eswatini
  • Ethiopia
  • Falkland Islands (Islas Malvinas)
  • Faroe Islands
  • Fiji
  • Finland
  • France
  • French Guiana
  • French Polynesia
  • French Southern Territories
  • Gabon
  • Gambia
  • Georgia
  • Germany
  • Ghana
  • Gibraltar
  • Greece
  • Greenland
  • Grenada
  • Guadeloupe
  • Guam
  • Guatemala
  • Guinea
  • Guinea-Bissau
  • Guyana
  • Haiti
  • Heard & McDonald Islands
  • Honduras
  • Hong Kong
  • Hungary
  • Iceland
  • India
  • Indonesia
  • Iraq
  • Ireland
  • Israel
  • Italy
  • Jamaica
  • Japan
  • Jordan
  • Kazakhstan
  • Kenya
  • Kiribati
  • Kuwait
  • Kyrgyzstan
  • Laos
  • Latvia
  • Lebanon
  • Lesotho
  • Liberia
  • Libya
  • Liechtenstein
  • Lithuania
  • Luxembourg
  • Macao
  • Madagascar
  • Malawi
  • Malaysia
  • Maldives
  • Mali
  • Malta
  • Marshall Islands
  • Martinique
  • Mauritania
  • Mauritius
  • Mayotte
  • Mexico
  • Micronesia
  • Moldova
  • Monaco
  • Mongolia
  • Montenegro
  • Montserrat
  • Morocco
  • Mozambique
  • Myanmar (Burma)
  • Namibia
  • Nauru
  • Nepal
  • Netherlands
  • New Caledonia
  • New Zealand
  • Nicaragua
  • Niger
  • Nigeria
  • Niue
  • Norfolk Island
  • North Macedonia
  • Northern Mariana Islands
  • Norway
  • Oman
  • Pakistan
  • Palau
  • Palestine
  • Panama
  • Papua New Guinea
  • Paraguay
  • Peru
  • Philippines
  • Pitcairn Islands
  • Poland
  • Portugal
  • Puerto Rico
  • Qatar
  • Romania
  • Russia
  • Rwanda
  • Réunion
  • Samoa
  • San Marino
  • Saudi Arabia
  • Senegal
  • Serbia
  • Seychelles
  • Sierra Leone
  • Singapore
  • Sint Maarten
  • Slovakia
  • Slovenia
  • Solomon Islands
  • Somalia
  • South Africa
  • South Georgia & South Sandwich Islands
  • South Korea
  • South Sudan
  • Spain
  • Sri Lanka
  • St. Barthélemy
  • St. Helena
  • St. Kitts & Nevis
  • St. Lucia
  • St. Martin
  • St. Pierre & Miquelon
  • St. Vincent & Grenadines
  • Suriname
  • Svalbard & Jan Mayen
  • Sweden
  • Switzerland
  • São Tomé & Príncipe
  • Taiwan
  • Tajikistan
  • Tanzania
  • Thailand
  • Timor-Leste
  • Togo
  • Tokelau
  • Tonga
  • Trinidad & Tobago
  • Tunisia
  • Turkmenistan
  • Turks & Caicos Islands
  • Tuvalu
  • Türkiye
  • U.S. Outlying Islands
  • U.S. Virgin Islands
  • Uganda
  • Ukraine
  • United Arab Emirates
  • United Kingdom
  • United States
  • Uruguay
  • Uzbekistan
  • Vanuatu
  • Vatican City
  • Venezuela
  • Vietnam
  • Wallis & Futuna
  • Western Sahara
  • Yemen
  • Zambia
  • Zimbabwe
  • Alabama
  • Alaska
  • American Samoa
  • Arizona
  • Arkansas
  • Armed Forces America
  • Armed Forces Europe
  • Armed Forces Pacific
  • California
  • Colorado
  • Connecticut
  • Delaware
  • District of Columbia
  • Florida
  • Georgia
  • Guam
  • Hawaii
  • Idaho
  • Illinois
  • Indiana
  • Iowa
  • Kansas
  • Kentucky
  • Louisiana
  • Maine
  • Maryland
  • Massachusetts
  • Michigan
  • Minnesota
  • Mississippi
  • Missouri
  • Montana
  • Nebraska
  • Nevada
  • New Hampshire
  • New Jersey
  • New Mexico
  • New York
  • North Carolina
  • North Dakota
  • Northern Mariana Islands
  • Ohio
  • Oklahoma
  • Oregon
  • Palau
  • Pennsylvania
  • Puerto Rico
  • Rhode Island
  • South Carolina
  • South Dakota
  • Tennessee
  • Texas
  • United States Minor Outlying Islands
  • US Virgin Islands
  • Utah
  • Vermont
  • Virginia
  • Washington
  • West Virginia
  • Wisconsin
  • Wyoming
  • Advertising & Marketing
  • Agriculture
  • Automotive
  • Consumer Packaged Goods
  • Education
  • Electrical & Electronics
  • Energy & Utilities
  • Financial Services
  • Food, Beverage & Restaurants
  • Gaming
  • Government
  • Healthcare & Life Sciences
  • Manufacturing
  • Media & Entertainment
  • Non-Profit
  • Professional & Business Services
  • Retail & Wholesale
  • Technology
  • Telecommunications
  • Tourism & Leisure
  • Logistics
  • Other
Sign me up to receive news, product updates, event information, and special offers about Google Cloud from Google.

I understand my personal data will be processed in accordance with Google's Privacy Policy.

Studies have shown that a majority of businesses lack confidence in their ability to recover following a ransomware incident. As such, when ransomware strikes – and it is striking more frequently than ever – the adage that every second counts is truer for this threat than arguably any other cyber risk, especially in the age of remote work and the expanded attack surface.

While history has clearly shown that ransomware is difficult to stop in its entirety, even on the most resilient networks, the impact can be controlled. The most glaring costs of a ransomware event – revenue loss, customer churn and reputation damage – can all be mitigated with a sound response plan.

And if the general premise of that plan is to respond faster, more efficiently and more effectively to ransomware, consider this a reference guide loaded with the tried-and-true tactics that will get you there. Written for security operations professionals by security operations professionals, and featuring the latest technical tidbits and industry resources for prevention, detection and remediation, this e-book is one guide you will want to keep close by.

What’s in the guide?

  • History of ransomware: Reflect on the evolution of this insidious threat to help you prepare for what today and the future holds.
  • Common vulnerabilities and infiltration methods: Consume the latest flaws being exploited to spread ransomware, and the pathways purveyors are leveraging to attack.
  • Preparation practices: Take in a refresher on running tabletop exercises and getting backups in order, and review the principles of early detection.
  • Crisis control: Learn the key points your communications template should include and explore free tools that can help mitigate an attack’s “blast radius.”
  • Primer on automation: Discover how SOAR is an ideal technology to address a rapidly and laterally spreading threat like ransomware.
Google Cloud