📋 Ransomware Response Guide  ·  Ransomware Response · Step 1 of 7

The first 60 seconds matter — isolate before you do anything else

The most important thing you can do when ransomware hits is stop it from spreading. Every second a compromised machine stays connected to your network, the attack can move laterally to new systems.

Get the Full PDF Guide Our Cybersecurity Services

Why isolation is the single most critical first step

Ransomware doesn't encrypt one machine and stop. Modern ransomware — LockBit, BlackCat, Cl0p, and dozens of variants — is designed to move laterally across your network as quickly as possible, encrypting as many systems as it can before being detected. Every connected machine is a potential target. Every shared drive is at risk. Every network-accessible backup is in danger.

The moment you suspect ransomware, your only job is to slow the spread. That means cutting the connection between infected machines and everything else — before you try to assess damage, before you call anyone, before you do anything else.

What to disconnect — and how

Affected workstations and servers

Physically unplug the ethernet cable from every machine you suspect is infected. Do not rely on disabling the network adapter through Windows — if the machine is compromised, the attacker may have tools that can re-enable it. Physical disconnection is the only certain method.

Also disable Wi-Fi on affected machines. On Windows, this means turning off the Wi-Fi adapter physically if possible, or using airplane mode as a second-best option.

Do not shut down infected machines

This is counterintuitive but critical: do not shut down or restart infected machines. Ransomware often operates in memory before writing to disk. The encryption keys, attacker communications, and forensic artifacts that investigators need may only exist in volatile memory (RAM). A shutdown destroys that evidence permanently. Leave machines running but isolated.

Isolate network segments

If you have network segmentation, isolate the affected segments at the switch level. Contact your MSP or network administrator to disable the affected VLANs or switch ports immediately. If you don't have segmentation, your priority is to identify and physically disconnect every machine that shows signs of infection.

Disconnect backup systems

If your backup storage — NAS, external drives, backup appliances — is network-connected, disconnect it immediately. Ransomware specifically targets backup systems to prevent recovery. If your backup is cloud-based, pause synchronization and contact your backup provider.

Signs a machine may be infected

  • Files with unfamiliar extensions (e.g., .locked, .encrypted, .WNCRY)
  • Ransom note files appearing on the desktop or in folders
  • Unusual CPU or disk activity with no apparent cause
  • Applications failing to open or files that can't be read
  • Pop-up windows demanding payment or displaying attacker communications
  • Unusually slow system performance across multiple machines simultaneously

What to do after isolation

Once affected machines are isolated, do not attempt to remediate them yourself. Do not run antivirus scans, do not delete files, do not attempt to decrypt anything. Your next steps are to assess the scope of the attack, preserve evidence, and get professional help involved.

Call your MSP or cybersecurity incident response team immediately. If you don't have one, Moore Technology Consulting has direct experience with ransomware recovery — call us at (646) 791-2137.

Quick Reference Checklist

  • Unplug ethernet cables on all suspected infected machines
  • Disable Wi-Fi on all suspected infected machines
  • Do NOT shut down or restart infected machines
  • Isolate affected network segments if possible
  • Disconnect or pause backup systems
  • Alert your IT team or MSP immediately
  • Document what you've done and when
↑ Back to guide overview Step 2: Assess Scope →

All 7 Steps

  1. Step 1: Isolate
  2. Step 2: Assess Scope
  3. Step 3: Preserve Evidence
  4. Step 4: Attack Vector
  5. Step 5: Notifications
  6. Step 6: Legal & Compliance
  7. Step 7: Harden
📄 Download Full PDF Guide
Need Help Right Now?

We've helped businesses recover from ransomware before

If you're dealing with an active incident or want to make sure you're protected before it happens, call us directly. We pick up.

Schedule a Free Consultation (646) 791-2137
0
Skip to Content
Moore Technology Consulting
Home
About
Services
Pricing
Client Stories
Free Consultation
Moore Technology Consulting
Home
About
Services
Pricing
Client Stories
Free Consultation
Home
About
Services
Pricing
Client Stories
Free Consultation

Contact Us

646-791-2137info@mooretechnologyconsulting.com

MTC_logo_R2-01.png

New York Locations
New York City, NY Manhattan | Brooklyn | Queens | Bronx | Staten Island

White Plains, NY 44 S Broadway, White Plains, NY 10601

Connecticut Locations
Stamford, CT 700 Canal Street, Stamford, CT 06902



Westport, CT 55 Post Rd W, Westport, CT 06880

©2026 Moore Technology Consulting.

All Rights Reserved.

Privacy Policy | FAQ

Moore Technology Consulting

Cybersecurity-first managed IT for SMBs across CT, NY & NYC.

(646) 791-2137 ✉ info@mooretechnologyconsulting.com 📍 Stamford, CT · White Plains, NY · Westport, CT
Services
  • Managed IT Services
  • Cybersecurity
  • Microsoft 365
  • Cloud Services
  • Backup & DR
  • Compliance & vCIO
Resources
  • Free Consultation
  • Ransomware Guide
  • About MTC
  • Client Stories
  • Contact Us
Stay Informed

Practical IT & cybersecurity insights for business owners. No spam, no fluff — just useful intel.

We respect your inbox. Unsubscribe anytime.

Powered by an Enterprise-Grade Stack

Microsoft Partner · Datto Partner · Huntress Partner · ThreatLocker Partner
Cisco Meraki · Fortinet · Cloudflare · Pax8

Moore Technology Consulting is headquartered in Stamford, CT and certified as a Minority Business Enterprise (MBE) by the New York City Department of Small Business Services (SBS) and New York State Empire State Development (ESD). We deliver managed IT and cybersecurity services to small and mid-sized businesses across Fairfield County, Westchester, and the greater New York metro area.

© 2026 Moore Technology Consulting. All rights reserved.
Privacy Policy Terms of Service Accessibility