Ransomware Hit Our Business What to Do Right Now

If ransomware has hit your business, the next few hours matter more than anything else. The decisions you make now will determine how quickly you recover, how much data you lose, and what your legal obligations require you to do.

This guide gives you the immediate steps to take, in the correct order, based on NCSC guidance and UK incident response practice.

Do Not Pay the Ransom Read This First

The NCSC, UK law enforcement, and the National Crime Agency all advise against paying ransomware demands. Paying does not guarantee you will get your data back. It funds criminal organisations and marks your business as a willing payer, increasing the likelihood of future attacks.

If your organisation has already been impacted, it is critical to understand the correct response steps. Before making any decision, review this detailed guide on what to do if ransomware hits your business to ensure you are following the right incident response process.

Even businesses that do pay frequently find their data was already exfiltrated before encryption, that decryption tools provided by attackers are unreliable, and that their systems remain compromised after payment.

Do not pay until you have exhausted all other options and taken specialist legal advice.

Immediate Steps First 30 Minutes

Speed matters here. Every minute of inaction allows ransomware to spread further across your network.

1. Disconnect infected devices immediately

Pull the network cable. Turn off Wi-Fi on affected machines. Disconnect from any shared drives or cloud sync services. Do not shut the devices down, forensic evidence is preserved in memory and may be needed later.

2. Isolate your network

If the attack appears widespread, consider disabling your core network switches and disconnecting from the internet at the router or firewall level. This is disruptive but it stops lateral spread to unaffected systems.

3. Do not wipe anything yet

Resist the urge to immediately reinstall systems. Forensic analysis of infected machines may be required, by your insurer, by law enforcement, or by an incident response specialist. Wiping evidence too early can void insurance claims and obstruct investigation.

4. Alert your IT team or security provider

If you have a managed security provider or an incident response retainer, activate it now. If you do not, contact the NCSC’s cyber incident reporting service at report.ncsc.gov.uk and consider engaging a CREST-certified incident response firm immediately.

5. Document everything

Write down what you saw, when you saw it, which machines are affected, and what actions you have taken so far. Time-stamped notes matter significantly in insurance claims, regulatory notifications, and legal proceedings.

Next Steps First 2 to 4 Hours

Once containment is underway, shift to assessment and notification.

Assess the scope

Work with your IT team or incident response provider to understand which systems are affected, whether data has been exfiltrated in addition to encrypted, whether backups are intact and uncompromised, and how the ransomware entered your environment.

Check your backups immediately

Your recovery timeline depends entirely on whether you have clean, recent backups that were stored offline or in a separate environment the ransomware could not reach. If backups are compromised or nonexistent, recovery becomes significantly more complex and expensive.

Scan any backup before connecting it to a clean system. Ransomware frequently infiltrates networks weeks before activating, meaning backups taken during that window may also be infected.

Notify your cyber insurer

If you hold cyber insurance, notify your insurer as early as possible. Most policies require prompt notification and give the insurer the right to direct remediation through their approved incident response partners. Acting before notifying your insurer can jeopardise your claim.

Identify your legal reporting obligations

Under UK GDPR, if personal data has been accessed, exfiltrated, or destroyed as part of the attack, you have 72 hours from becoming aware of the breach to notify the ICO, unless the breach is unlikely to result in a risk to individuals. This clock starts when you first became aware, not when you fully understand the scope.

If you operate under PCI DSS and cardholder data may be involved, your acquiring bank must be notified promptly and a forensic investigation may be required.

Recovery Days 1 to 7

Rebuild from clean backups

Before restoring any backup, verify it is free from malware. Only connect backup media to systems you are confident are clean. The NCSC guidance is clear: restore only when you are very confident both the backup and the device receiving it are uncompromised.

Rebuild compromised systems from scratch

Do not attempt to clean and reuse infected systems in most cases. Reinstall the operating system from a known-good image. Restore data from verified clean backups. Rebuild configurations from documented baselines.

Reset all credentials

Reset passwords for every account, particularly administrator accounts, service accounts, and any cloud services that were accessible from compromised systems. Enable multi-factor authentication everywhere it is not already active.

Patch the entry point

Before reconnecting anything to the internet, identify and remediate the vulnerability that allowed the ransomware to enter. Common entry points include unpatched remote desktop protocol (RDP) exposures, phishing emails, and vulnerable VPN appliances.

Communicate with staff, clients, and stakeholders

Prepare a brief, factual communication for your team explaining what happened, what you are doing, and what they should or should not do. If client data was involved, legal advice on client notification is essential before any communication goes out.

After the Incident Prevent Recurrence

Once systems are restored, the work is not finished.

Conduct a post-incident review to understand how the attack entered, how it spread, and what slowed your response. Every gap you identify is a gap you can close before the next attempt.

This is also the point at which every UK business needs a tested cybersecurity incident response plan in place becomes impossible to argue against. Businesses that had a plan, tested backups, and a retained incident response provider recovered in days. Businesses without these fundamentals in place took weeks, or did not recover at all.

If your business does not currently have a formal incident response plan, the priority after recovery is building one. Understanding the hidden risk UK businesses face without a cyber business continuity strategy is often the lesson organisations take away from a ransomware attack that could have been avoided.

Key UK Contacts During a Ransomware Incident

OrganisationWhen to ContactHow
NCSCReport the incident and get guidancereport.ncsc.gov.uk
Action FraudReport as a cybercrimeactionfraud.police.uk
ICOIf personal data was breached (within 72 hours)ico.org.uk
Your cyber insurerImmediately, before engaging IR firmsYour policy documents
CREST-certified IR firmIf you need specialist recovery supportcrest-approved.org

Frequently Asked Questions

Should we pay the ransom if we have no backups? 

The NCSC advises against payment in all cases. Payment does not guarantee recovery, funds criminal groups, and makes your business a repeat target. Exhaust all free decryption resources at nomoreransom.org and take legal advice before considering payment.

Do we have to report a ransomware attack to the ICO? 

Only if personal data was accessed, lost, or destroyed. If that is the case, you have 72 hours from becoming aware of the breach to notify the ICO under UK GDPR.

How long does ransomware recovery take for a UK SME? 

With clean, offline backups and a rehearsed incident response plan, recovery can take 2 to 5 days. Without backups or a plan, recovery commonly takes 3 to 6 weeks and may be incomplete.

Can we recover files without paying the ransom? 

Sometimes. The No More Ransom Project at nomoreransom.org provides free decryption tools for certain ransomware variants. A CREST-certified incident response firm can assess whether decryption is possible for your specific variant.

How did ransomware get into our network? 

The most common UK entry points are phishing emails that delivered malware or harvested credentials, exposed Remote Desktop Protocol (RDP) connections, unpatched VPN appliances, and compromised third-party access. Forensic analysis of the incident will identify the specific vector.

What should we do differently after recovering from ransomware? 

Start with building a cyber incident response plan that meets UK regulations before an attack happens again, ensure backups are offline and tested regularly, enable MFA on all accounts, and patch all internet-facing systems on a regular cycle.