Great content delivered right to your mailbox

Thank you! Check your inbox for our monthly recap!

Our previous article explained how the Active Protection feature in Online Backup stops a ransomware attack. Because the malicious process is rolled back immediately, your users suffer no downtime and will continue to work without even noticing what happened. But, you can’t understand how innovative Online Backup Active Protection is if you don’t compare it to the usual process of recovering from a ransomware attack. In this article, I’ll show you the steps to follow when you don’t have Online Backup Active Protection.


1. Disconnect the Infected Device from Any Network Right Away

When ransomware strikes, this is the first step to take and it’s the most critical one. To avoid other computers from being infected through the network, make sure the infected PC or smart device is totally disconnected. No LAN, no Wi-Fi, no Bluetooth, no GPS. This is also relevant when the infected user is working remotely from a public or home network.


2. Unplug Any USB, SD or External Drive

You may still have a chance to save data on external drives from being infected, so the earlier you disconnect them, the better. Put the USB, SD or external drive away, but do not connect it to another computer right away.


3. Collect Information from the User

Most users will be scared and probably feel guilty about what just happened on their computer. Make them feel comfortable when asking questions about what just happened. Let them know every detail is precious and can save the whole company.


4. Inform Other Users

Act fast! If the infection started with a phishing email, other users in the company might have received the same type of message. So, it’s important to immediately remind all your users to remain alert. Inform them by all possible means and make them aware of how they could be infected.


5. Investigate the Infected Computer and Recover Files

If the ransomware has not totally locked the user out of the computer, you can further your investigations to identify the name of the ransomware.

  1. Because you never know how many malicious programs have been deployed on the computer with the attack and how many could be still dormant, execute a complete scan with your security tools. Again, do this on the isolated computer and do not reconnect it to the network.
  2. Uninstall any suspicious application that you might find in the programs list, especially if it was installed at the time of the attack or a few hours before.
  3. Websites like now provide decryption tools that can help you recover files encrypted by a ransomware. Download them from another computer and copy them to a dedicated USB, then install the decryption tools on the isolated infected computer. If you’re able to recover the files, copy them to another external storage.
  4. Unless you feel comfortable following the previous steps, the wisest option is to proceed with a re-installation and a restore of the system and data files from a backup. The files recovered with the decryption tools would be copied back to the reinstalled computer.



Recovering from a ransomware attack without paying cyber criminals is only possible with a proper backup and disaster recovery solution like Online Backup. The new Active Protection feature makes it possible to halt a ransomware attack immediately, which your usual security tools will not do. When you don’t have Online Backup Active Protection enabled, you’re able to recover data, but the process can take hours. If you have several PCs infected, this can have a serious impact on your productivity and consequently, on your revenue.

Written by Sadissa Babeni Marketing Content Writer @ SherWeb

Sadissa is an IT professional and joined SherWeb in 2013 as a technical writer and trainer. A former systems administrator, she brings her decade-long field experience to SherWeb's marketing department, with her broad knowledge of cloud computing and service management. Sadissa is a Microsoft Certified Solutions Associate in Windows Server and Office 365, and has earned other IT certifications over the years. She has a passionate interest in singing in vocal ensembles and learning foreign languages.