{"id":16179,"date":"2020-10-09T14:30:36","date_gmt":"2020-10-09T19:30:36","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=16179"},"modified":"2025-12-19T11:02:05","modified_gmt":"2025-12-19T16:02:05","slug":"ransomware-attack-clapback-how-to-prepare-if-youre-targeted","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/","title":{"rendered":"Ransomware Attack Clapback: How to Prepare if You&#8217;re Targeted"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"16179\" class=\"elementor elementor-16179\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a1686d7 e-flex e-con-boxed e-con e-parent\" data-id=\"3a1686d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85a08b9 elementor-widget elementor-widget-text-editor\" data-id=\"85a08b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Ransomware Attack 2020: Why Prepare<\/h1><p>It seems like every week in 2020, we hear about another major ransomware attack. While volume continues to grow in recent years, more troubling is the fact that ransomware is getting more targeted. Why is this more troubling? Because of its more targeted nature, it&#8217;s also getting more effective. Many ransomware cells now study their targets to pinpoint weaknesses, then customize attacks to exploit them. Not only that, they select targets and set ransom amounts based on knowledge of what those victims can pay.<\/p><p>And one more troubling fact to keep you up at night: <a href=\"https:\/\/www.sonicwall.com\/2020-cyber-threat-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">soft targets are particularly vulnerable<\/a>. That is, bad actors are placing local governments, school systems, nonprofit organizations, and even healthcare providers in the crosshairs. So even if your business avoids attack, a successful breach of one of these targets has major effects on day to day life. Enough preamble though. If you made it this far, you know the situation is serious. Here are three ways to prepare to <a href=\"https:\/\/www.merriam-webster.com\/words-at-play\/clapback-meaning-origin\" target=\"_blank\" rel=\"noopener noreferrer\">clapback<\/a>, so an attack won&#8217;t stop you in your tracks.<\/p><h3>Train Your Staff<\/h3><p>Your employees can be either the point of entry or the first line of defense for a ransomware attack. The choice is yours. Among the most common ways for ransomware to infect your network is once again through <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-attacks-that-start-with-phishing-emails-are-suddenly-back-in-fashion-again\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing emails<\/a>. If your network users don&#8217;t know what to look for, they may unsuspectingly click on an attachment that delivers the malicious payload. Simple training makes all the difference, sharing tips like:<\/p><ul><li>Double-check the domain name that sent the email<\/li><li>Look for spelling errors as well as numbers replacing letters<\/li><li>Review the signature &amp; legitimacy of the request<\/li><li>Hover over links &#8211; without clicking &#8211; to check where they lead<\/li><li>Don&#8217;t click on attachments unless you&#8217;re sure of the source<\/li><\/ul><p>There are applications available to let you test your employees &amp; reinforce training without the consequence being an actual breach. Check out Sophos <a href=\"https:\/\/www.sophos.com\/en-us\/products\/phish-threat.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Phish Threat<\/a> and Barracuda <a href=\"https:\/\/www.barracuda.com\/products\/phishline\" target=\"_blank\" rel=\"noopener noreferrer\">PhishLine<\/a> for a couple worthy examples. Oh and one other key piece of training? Teach your employees to <a href=\"https:\/\/www.wired.com\/story\/tesla-ransomware-insider-hack-attempt\/\" target=\"_blank\" rel=\"noopener noreferrer\">report any suspicious contacts<\/a> asking for a way into your network.<\/p><h3><a href=\"https:\/\/www.firewalls.com\/\" target=\"_blank\" rel=\"noopener\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-18860 size-full\" src=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality.jpg\" alt=\"Blog-Banner-General-Buy-Now-Red-High-Quality\" width=\"900\" height=\"150\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality.jpg 900w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality-300x50.jpg 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality-768x128.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/a><\/h3><h3>\u00a0<\/h3><h3>Layer Your Security<\/h3><p>The best approach to network security in 2020 is a layered one. As we just noted, well-trained employees are one layer, but there are many others to consider. If you haven&#8217;t heard by now, it all starts with <a href=\"https:\/\/www.firewalls.com\/category\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">the firewall<\/a>. Your firewall &#8211; operating the latest and greatest security services &#8211; should be the cornerstone of a protected network setup. A current generation firewall plus those security services protects against just about any threat that comes your way. Companies now commonly incorporate threat intelligence &#8211; both human and the artificial variety &#8211; plus machine learning into their security offerings. That means they&#8217;re on the cutting edge to recognize and stop ever evolving ransomware and malware varieties.<\/p><p>But with the workforce extended beyond the perimeter now more than ever, your security must do the same. That means endpoint protection and secure access to your network for remote employees are also musts. Endpoint protection not only gives you visibility into these remote devices, it also extends many of the same security services to them individually. Ensuring secure access via <a href=\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\">VPN<\/a> then brings your teleworkers back under the security of your firewall and network setup. And the layering shouldn&#8217;t stop there. Ensure you have email security in place to filter out suspicious messages before they even reach the eyes of an employee. And segment your network so a breach of one device doesn&#8217;t extend throughout. This may sound like a lot, but bundling services is surprisingly reasonable, and security costs much less than a successful ransomware attack ever will.<\/p><h3>Backup So You Can Rollback<\/h3><p>This could easily fall under the layers above, but when it comes to a ransomware attack, backup deserves a spotlight all its own. If you are successfully breached and your files encrypted, the smart money isn&#8217;t on paying the ransom, it&#8217;s on rolling back. Regular backups of your data allow you to get right back to work with minimal interruption, even if a ransomware attack occurs. A Sophos survey of 5,000 IT managers found more than half of firms whose data was encrypted by ransomware restored it through backups. Why is that? There are no guarantees when you pay the ransom. Plus, you don&#8217;t really want to support a criminal enterprise. And on a more practical note, Sophos also found that paying the ransom resulted in twice the remediation costs of restoring data from backups. Even if the ransomware cell you&#8217;re working with gives you the encryption key when you pay up, you still have to dedicate time and effort to restoration. So why not just have the restoration already available in house. Learn about <a href=\"https:\/\/www.firewalls.com\/brands\/barracuda-networks\/backup-servers.html\" target=\"_blank\" rel=\"noopener noreferrer\">Barracuda Backup<\/a> and <a href=\"https:\/\/www.firewalls.com\/brands\/sophos\/central\/intercept-x-advanced-with-xdr.html\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos Intercept X<\/a> with CryptoGuard for a couple of options to ensure you&#8217;re not caught flat-footed when a ransomware attack comes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Learn three ways to clapback against a ransomware attack. Spoiler alert, preparation is key to the right response when encryption threatens.<\/p>\n","protected":false},"author":5,"featured_media":27431,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[457,372,95,64,53,344],"class_list":["post-16179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-barracuda-backup","tag-intercept-x","tag-phishing","tag-ransomware","tag-sophos","tag-sophos-intercept-x"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Attack Clapback: How to Prepare if You&#039;re Targeted - Firewalls.com<\/title>\n<meta name=\"description\" content=\"Learn three ways to clapback against a ransomware attack. Spoiler alert, preparation is key to the right response when encryption threatens.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Attack Clapback: How to Prepare if You&#039;re Targeted - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"Learn three ways to clapback against a ransomware attack. Spoiler alert, preparation is key to the right response when encryption threatens.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-09T19:30:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T16:02:05+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/10\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"Ransomware Attack Clapback: How to Prepare if You&#8217;re Targeted\",\"datePublished\":\"2020-10-09T19:30:36+00:00\",\"dateModified\":\"2025-12-19T16:02:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/\"},\"wordCount\":840,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png\",\"keywords\":[\"barracuda backup\",\"intercept x\",\"phishing\",\"Ransomware\",\"Sophos\",\"sophos intercept x\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/\",\"name\":\"Ransomware Attack Clapback: How to Prepare if You're Targeted - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png\",\"datePublished\":\"2020-10-09T19:30:36+00:00\",\"dateModified\":\"2025-12-19T16:02:05+00:00\",\"description\":\"Learn three ways to clapback against a ransomware attack. Spoiler alert, preparation is key to the right response when encryption threatens.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png\",\"width\":1120,\"height\":630,\"caption\":\"Ransomware Attack Clapback: How to Prepare if You're Targeted\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Attack Clapback: How to Prepare if You&#8217;re Targeted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Attack Clapback: How to Prepare if You're Targeted - Firewalls.com","description":"Learn three ways to clapback against a ransomware attack. Spoiler alert, preparation is key to the right response when encryption threatens.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Attack Clapback: How to Prepare if You're Targeted - Firewalls.com","og_description":"Learn three ways to clapback against a ransomware attack. Spoiler alert, preparation is key to the right response when encryption threatens.","og_url":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-10-09T19:30:36+00:00","article_modified_time":"2025-12-19T16:02:05+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/10\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"Ransomware Attack Clapback: How to Prepare if You&#8217;re Targeted","datePublished":"2020-10-09T19:30:36+00:00","dateModified":"2025-12-19T16:02:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/"},"wordCount":840,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/10\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png","keywords":["barracuda backup","intercept x","phishing","Ransomware","Sophos","sophos intercept x"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/","url":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/","name":"Ransomware Attack Clapback: How to Prepare if You're Targeted - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/10\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png","datePublished":"2020-10-09T19:30:36+00:00","dateModified":"2025-12-19T16:02:05+00:00","description":"Learn three ways to clapback against a ransomware attack. Spoiler alert, preparation is key to the right response when encryption threatens.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/10\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/10\/Ransomware-Attack-Clapback-How-to-Prepare-if-Youre-Targeted.png","width":1120,"height":630,"caption":"Ransomware Attack Clapback: How to Prepare if You're Targeted"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/ransomware-attack-clapback-how-to-prepare-if-youre-targeted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Attack Clapback: How to Prepare if You&#8217;re Targeted"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/16179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=16179"}],"version-history":[{"count":13,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/16179\/revisions"}],"predecessor-version":[{"id":27432,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/16179\/revisions\/27432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27431"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=16179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=16179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=16179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}