Table of Contents
1 Cover
3 Introduction Who This Book Is For What Is Covered in This Book? How to Contact Wiley or the Author
4 Part I: Introduction Chapter 1: Introduction to Ransomware How Bad Is the Problem? Types of Ransomware Summary Chapter 2: Preventing Ransomware Nineteen Minutes to Takeover Good General Computer Defense Strategy Understanding How Ransomware Attacks Preventing Ransomware Beyond Self-Defense Summary Chapter 3: Cybersecurity Insurance Cybersecurity Insurance Shakeout Did Cybersecurity Insurance Make Ransomware Worse? Cybersecurity Insurance Policies The Insurance Process What to Watch Out For Future of Cybersecurity Insurance Summary Chapter 4: Legal Considerations Bitcoin and Cryptocurrencies Can You Be in Legal Jeopardy for Paying a Ransom? Is It an Official Data Breach? Preserve Evidence Legal Defense Summary Summary
5
Part II: Detection and Recovery
Chapter 5: Ransomware Response Plan
Why Do Response Planning?
When Should a Response Plan Be Made?
What Should a Response Plan Include?
Practice Makes Perfect
Summary
Chapter 6: Detecting Ransomware
Why Is Ransomware So Hard to Detect?
Detection Methods
Example Detection Solution
Summary
Chapter 7: Minimizing Damage
Basic Outline for Initial Ransomware Response
Stop the Spread
Initial Damage Assessment
First Team Meeting
Determine Next Steps
Summary
Chapter 8: Early Responses
What Do You Know?
A Few Things to Remember
Major Decisions
Early Actions
Summary
Chapter 9: Environment Recovery
Big Decisions
Rebuild Process Summary
Recovery Process Summary
Summary
Chapter 10: Next Steps
Paradigm Shifts
Improve Overall Cybersecurity Hygiene
Summary
Chapter 11: What Not to Do
Assume You Can't Be a Victim
Think That One Super-Tool Can Prevent an Attack
Assume Too Quickly Your Backup Is Good
Use Inexperienced Responders
Give Inadequate Considerations to Paying Ransom
Lie to Attackers
Insult the Gang by Suggesting Tiny Ransom
Pay the Whole Amount Right Away
Argue with the Ransomware Gang