📋 Ransomware Response Guide  ·  Ransomware Response · Step 5 of 7

Who you notify — and when — has legal and financial consequences

Ransomware notification obligations are complex and time-sensitive. Missing a notification deadline can turn an IT problem into a legal and regulatory crisis. Here's who needs to know and when.

Get the Full PDF Guide Our Cybersecurity Services

Notifications are legally required — and time-sensitive

A ransomware attack is not just an IT incident. Depending on your industry, the type of data affected, and your jurisdiction, you may have legal obligations to notify regulators, affected individuals, law enforcement, and your cyber insurance carrier — all within specific timeframes. Missing these windows can result in regulatory fines, insurance claim denials, and legal liability that significantly compounds the cost of the attack.

Internal leadership and legal counsel — immediately

Your executive leadership and legal counsel should be notified as soon as the attack is confirmed — before most other notifications. Legal counsel needs to be involved early to:

  • Assess which regulatory notification obligations apply
  • Preserve attorney-client privilege over incident communications where possible
  • Guide decisions about ransom payment (which has legal implications under OFAC regulations)
  • Advise on communications to employees, clients, and vendors

Cyber insurance carrier — promptly, per your policy

Most cyber insurance policies require prompt notification after a covered incident — often within 24–72 hours. Review your policy immediately and contact your carrier or broker. Delayed notification is one of the most common reasons cyber insurance claims are denied or reduced.

Your carrier will typically provide access to their incident response panel — forensic investigators, legal counsel, and sometimes a public relations firm. Using these resources is usually covered under your policy and can significantly reduce out-of-pocket costs.

Law enforcement — FBI IC3

Report the attack to the FBI's Internet Crime Complaint Center at ic3.gov. Law enforcement reporting is voluntary but strongly recommended. The FBI has ransomware decryption keys for some variants, can share threat intelligence, and tracks ransomware groups — your report contributes to investigations that may ultimately disrupt the attackers.

Local law enforcement may also be appropriate depending on the nature and scale of the attack.

Regulatory notifications

If any personal, financial, or health information may have been exposed, you may have mandatory regulatory notification obligations:

NYDFS Part 500 (NY-licensed financial entities)

Covered entities must notify NYDFS of a "cybersecurity event" within 72 hours of determining it qualifies as a reportable event. A ransomware attack affecting nonpublic information almost certainly qualifies. The notification is made through the NYDFS Cybersecurity portal.

HIPAA (healthcare organizations)

A ransomware attack affecting PHI (Protected Health Information) is presumed to be a breach under HIPAA unless you can demonstrate a low probability that PHI was compromised. You must notify HHS within 60 days of discovering the breach. If 500 or more individuals in a state are affected, you must also notify prominent media outlets in that state. Individual affected patients must be notified without unreasonable delay.

CT Breach Notification Law

Connecticut requires notification to affected Connecticut residents "in the most expedient time possible" following discovery of a breach of computerized data containing personal information. You must also notify the Connecticut Attorney General if the breach affects more than 500 Connecticut residents.

NY SHIELD Act

New York's SHIELD Act requires notification to affected New York residents "in the most expedient time possible and without unreasonable delay" following discovery of a breach of private information.

Affected clients, patients, or partners

Beyond regulatory requirements, your legal counsel will advise on whether direct notification to affected clients or partners is appropriate. In many cases, proactive communication — before you're legally required to notify — can preserve trust and reduce long-term reputational damage.

Quick Reference Checklist

  • Notify internal leadership and engage legal counsel immediately
  • Contact cyber insurance carrier — check your policy for notification window
  • File a report with FBI IC3 at ic3.gov
  • Assess NYDFS, HIPAA, CT, and NY notification obligations with legal counsel
  • Preserve all incident documentation for insurance claims and regulatory filings
  • Do not make public statements without legal counsel review
  • Do not pay ransom without consulting legal counsel (OFAC implications)
← Step 4: Attack Vector ↑ Back to guide overview Step 6: Legal & Compliance →

All 7 Steps

  1. Step 1: Isolate
  2. Step 2: Assess Scope
  3. Step 3: Preserve Evidence
  4. Step 4: Attack Vector
  5. Step 5: Notifications
  6. Step 6: Legal & Compliance
  7. Step 7: Harden
📄 Download Full PDF Guide
Need Help Right Now?

We've helped businesses recover from ransomware before

If you're dealing with an active incident or want to make sure you're protected before it happens, call us directly. We pick up.

Schedule a Free Consultation (646) 791-2137
0
Skip to Content
Moore Technology Consulting
Home
About
Services
Pricing
Client Stories
Free Consultation
Moore Technology Consulting
Home
About
Services
Pricing
Client Stories
Free Consultation
Home
About
Services
Pricing
Client Stories
Free Consultation

Contact Us

646-791-2137info@mooretechnologyconsulting.com

MTC_logo_R2-01.png

New York Locations
New York City, NY Manhattan | Brooklyn | Queens | Bronx | Staten Island

White Plains, NY 44 S Broadway, White Plains, NY 10601

Connecticut Locations
Stamford, CT 700 Canal Street, Stamford, CT 06902



Westport, CT 55 Post Rd W, Westport, CT 06880

©2026 Moore Technology Consulting.

All Rights Reserved.

Privacy Policy | FAQ

Moore Technology Consulting

Cybersecurity-first managed IT for SMBs across CT, NY & NYC.

(646) 791-2137 ✉ info@mooretechnologyconsulting.com 📍 Stamford, CT · White Plains, NY · Westport, CT
Services
  • Managed IT Services
  • Cybersecurity
  • Microsoft 365
  • Cloud Services
  • Backup & DR
  • Compliance & vCIO
Resources
  • Free Consultation
  • Ransomware Guide
  • About MTC
  • Client Stories
  • Contact Us
Stay Informed

Practical IT & cybersecurity insights for business owners. No spam, no fluff — just useful intel.

We respect your inbox. Unsubscribe anytime.

Powered by an Enterprise-Grade Stack

Microsoft Partner · Datto Partner · Huntress Partner · ThreatLocker Partner
Cisco Meraki · Fortinet · Cloudflare · Pax8

Moore Technology Consulting is headquartered in Stamford, CT and certified as a Minority Business Enterprise (MBE) by the New York City Department of Small Business Services (SBS) and New York State Empire State Development (ESD). We deliver managed IT and cybersecurity services to small and mid-sized businesses across Fairfield County, Westchester, and the greater New York metro area.

© 2026 Moore Technology Consulting. All rights reserved.
Privacy Policy Terms of Service Accessibility