Ransomware Defense Plan: 5 Steps to Protect Your Maryland Business

Ransomware Defense Plan: 5 Steps to Protect Your Maryland Business
image source: https://unsplash.com/photos/a-combination-lock-rests-on-a-computer-keyboard-WUJmdr8pNwk

Ransomware isn't a jump scare. It's a slow-motion disaster.

The attack started three weeks ago with a single phishing email. An employee clicked a link and entered their credentials on a fake login page. The attacker quietly explored your network, escalated privileges, and mapped your systems.

This morning: Every file displays ".encrypted" and a $500,000 Bitcoin ransom demand appears on every screen.

By the time you see the ransom note, the battle was already lost weeks ago.

At Lewis IT, we help Maryland businesses understand a critical truth: ransomware defense isn't about stopping encryption—it's about preventing attackers from gaining the access that makes encryption possible.

According to Microsoft's threat intelligence, "In most cases attackers are no longer breaking in, they're logging in." Your firewall isn't failing. Employees are handing over credentials to skilled social engineers, and those credentials work perfectly because they're legitimate.

The Ransomware Attack Chain: Why Prevention Beats Recovery

Lewis IT investigates ransomware incidents regularly for Maryland businesses. The pattern is always the same five-stage sequence:

Stage 1: Initial Access (The Quiet Entry)

  • Phishing email harvests credentials
  • Attacker logs in using legitimate authentication
  • Traditional security sees nothing wrong

Stage 2: Privilege Escalation (Gaining Power)

  • Standard user account elevated to admin privileges
  • Domain administrator credentials compromised
  • Full control over network infrastructure achieved

Stage 3: Lateral Movement (Expanding Reach)

  • Attacker maps entire network architecture
  • Identifies critical systems and backups
  • Spreading invisibly while appearing as normal admin activity

Stage 4: Data Exfiltration (The Insurance Policy)

  • Customer databases, financial records, intellectual property stolen
  • Attacker now has leverage beyond just encryption
  • Sets up for double extortion

Stage 5: Impact—Encryption (The Visible Attack)

  • Ransomware deployed across maximum systems simultaneously
  • Backup systems encrypted or deleted
  • This is when most businesses first realize they've been breached

The Critical Reality: From initial access to domain admin compromise takes just 3-7 days. Data exfiltration happens over 1-2 weeks. Average dwell time before encryption: 2-4 weeks.

Businesses that stop ransomware detect and disrupt stages 1-4. By stage 5, you're in disaster recovery mode.

Why Paying Ransom Doesn't Work

Law enforcement agencies including the FBI, CISA, and NIST consistently advise against paying ransoms:

  • No guarantee of data recovery (30-40% who pay never get decryption keys)
  • No guarantee attackers delete stolen data (double extortion continues)
  • You've identified yourself as willing to pay (targeted again)
  • Funds criminal enterprises enabling future attacks

Lewis IT has helped multiple Maryland businesses recover from ransomware without paying ransom—but only because they had proper defenses in place BEFORE the attack.

The Lewis IT 5-Step Ransomware Defense Plan

After helping dozens of Maryland businesses prevent and recover from ransomware attacks, Lewis IT has developed a systematic defense framework.

Step 1: Deploy Phishing-Resistant Authentication

The Problem: Traditional MFA using SMS codes or authenticator apps can be compromised through real-time phishing, MFA fatigue attacks, or SIM swapping.

Lewis IT Solution: Phishing-Resistant MFA

Authentication is cryptographically bound to specific domains—even if users try to authenticate on a fake site, it won't work because the domain doesn't match.

Implementation:

  • Hardware security keys (YubiKey, Titan) for all admin accounts, finance/HR personnel, and executives
  • Passwordless biometric authentication (Windows Hello, Touch ID) for general users
  • Disable legacy authentication that allows attackers to bypass MFA entirely

Conditional Access Policies:

  • Block access from high-risk countries
  • Require additional verification for unusual locations
  • Require managed, compliant devices for sensitive data
  • Block anonymous IPs and Tor browsers

Result: Even if attacker steals credentials, they can't use them without the physical security key or biometric authentication from an approved device.

Step 2: Enforce Least Privilege Access and Separation of Duties

The Problem: In most ransomware incidents, attackers don't need exploits—they use overprivileged accounts to do exactly what those accounts are authorized to do.

Lewis IT Solution: Least Privilege Implementation

Administrative Account Separation:

  • Standard user account for email and daily work (zero admin rights)
  • Separate admin account for server management only
  • Admin account requires hardware key, only works from secure jump server

Role-Based Access Control:

  • Help Desk Tier 1: Password resets only (no system access)
  • Help Desk Tier 2: Software installation (no domain control)
  • Server Administrators: Specific server management (no workstation access)
  • Domain Administrators: Directory services only (not daily use)

Just-In-Time Administration:

  • Admin privileges granted for specific tasks, 2-4 hours maximum
  • Automatically revoked after time expires
  • All actions logged and audited

Result: Attacker who compromises standard user account can't escalate to domain admin, can't access backup systems, can't move laterally—attack contained at initial foothold.

Step 3: Close Known Vulnerabilities and Harden Attack Surface

The Problem: Ransomware groups actively scan for known, patchable vulnerabilities and exploit them automatically.

Lewis IT Vulnerability Management:

Critical Vulnerabilities (24-48 Hours):

  • CVSS 9.0+ severity
  • Active exploitation in the wild
  • Affects internet-facing systems

High-Risk Vulnerabilities (1 Week):

  • CVSS 7.0-8.9 severity
  • Authentication bypass or privilege escalation

Standard Vulnerabilities (30 Days):

  • CVSS 4.0-6.9 severity
  • General security updates

Priority Targets:

  • Internet-facing systems (web servers, VPNs, email gateways)
  • Remote access infrastructure (RDP servers)
  • Critical internal systems (domain controllers, backup servers)
  • Third-party applications (Adobe, Java, browsers)

Attack Surface Reduction:

  • Disable unnecessary services and legacy protocols
  • Harden RDP access (require Network Level Authentication)
  • Implement network segmentation isolating critical systems
  • Restrict workstation-to-workstation communication

Result: Attackers can't exploit known vulnerabilities because systems are patched, can't easily pivot through network because of segmentation.

Step 4: Implement Early Detection and Rapid Response

The Problem: Most businesses discover ransomware when the ransom note appears—by then it's too late.

Lewis IT Detection Strategy:

Endpoint Detection and Response (EDR):

  • Monitors behavioral indicators, not just malware signatures
  • Detects rapid file modification, encryption operations, backup deletion attempts
  • Automated isolation of suspicious systems

Security Information and Event Management (SIEM):

  • Correlates logs across all systems
  • Detects patterns like multiple failed logins, unusual resource access, privilege escalation
  • Off-hours administrative activity triggers alerts

Automated Response:

  • Low-Risk: Log and monitor
  • Medium-Risk: Alert security team, increase monitoring
  • High-Risk: Automatic account suspension, network isolation, immediate notification

Lewis IT Managed Detection: For businesses without internal security teams, we provide 24/7/365 monitoring, expert threat analysis, and incident response coordination.

Result: Ransomware attackers detected during reconnaissance or privilege escalation phases, contained before encryption, damage limited to single system.

Step 5: Maintain Secure, Isolated, Tested Backups

The Problem: Ransomware groups specifically target backups for encryption—if you can't restore, you're more likely to pay.

Lewis IT Backup Strategy: 3-2-1-1-0 Rule

  • 3 copies of data (production + 2 backups)
  • 2 different media types (disk + cloud)
  • 1 offsite copy (geographically separated)
  • 1 offline/immutable copy (air-gapped or write-once)
  • 0 errors (verified restorable)

Backup Isolation Methods:

Tier 1: Network Segmentation

  • Backup infrastructure on separate VLAN with firewall rules
  • Better than nothing, but can be compromised by domain admin

Tier 2: Immutable Backups

  • Cloud storage with object lock enabled
  • Cannot be modified or deleted for retention period (typically 90 days)
  • Strongest practical protection

Tier 3: Offline/Air-Gapped

  • Tape or removable disk in secure offsite location
  • Completely offline except during backup/restore
  • Immune to network-based ransomware

Critical: Test Your Backups

Lewis IT emphasizes that untested backups are not backups:

  • Monthly: Automated verification, test restore of random files
  • Quarterly: Full system restore to isolated environment
  • Annually: Complete disaster recovery exercise

Restoration Priority Planning:

  • Priority 1 (4 Hours): Domain controllers, email, critical applications
  • Priority 2 (24 Hours): File servers, databases, productivity apps
  • Priority 3 (72 Hours): Archived data, non-critical systems

Result: When ransomware encrypts production, business recovers from immutable backups without paying, restoration is predictable not chaotic.

The Business Impact: Why This Matters

Direct Costs:

  • Average ransom demand: $200,000-$500,000 for small-medium businesses
  • Recovery costs even without paying: $150,000-$700,000
  • Average downtime: 21 days without proper backups

Regulatory Consequences:

  • HIPAA breach notification and potential fines
  • State privacy law penalties
  • Contractual violations

Reputational Damage:

  • Customer trust erosion
  • Negative press coverage
  • Competitive disadvantage

Lewis IT clients with proper defenses avoid these impacts entirely.

Common Mistakes to Avoid

Mistake 1: "We Have Backups, We're Safe"

  • Problem: Backups on network storage encrypted alongside production
  • Solution: Immutable, isolated backups ransomware cannot reach

Mistake 2: "Our Antivirus Will Stop It"

  • Problem: Ransomware groups test against common antivirus
  • Solution: Layered defense with authentication hardening, least privilege, segmentation

Mistake 3: "We're Too Small to Be Targeted"

  • Problem: Automated scans don't care about company size
  • Solution: Implement fundamentals regardless of size

Mistake 4: "We'll Deal With It If It Happens"

  • Problem: Unprepared incident response is chaos
  • Solution: Proactive planning, tested procedures, regular exercises

Take Action: Build Your Ransomware Defense Plan Today

Ransomware groups systematically scan for vulnerable businesses every day. The question isn't whether you'll be targeted—it's whether your defenses will stop the attack before encryption begins.

Lewis IT helps Maryland organizations implement proven ransomware defense strategies that disrupt attacks early, contain damage if prevention fails, and ensure reliable recovery without paying ransom.

Don't wait for the ransom note. Build defenses today.

Strengthen Your Ransomware Defenses: Contact Lewis IT

Ready to assess your ransomware vulnerabilities? Lewis IT offers complimentary ransomware readiness assessments evaluating your current protections across all five defense steps.

We'll analyze your authentication, privilege management, patching, detection, and backup strategies—then provide a roadmap for hardening your defenses.

Email: info@lewisit.io
Phone: 240-784-1221
Website: www.lewisit.io/contact-us

Ransomware attacks are preventable. Contact Lewis IT today and transform your business from vulnerable target to hardened defense.


Lewis IT provides comprehensive ransomware defense services for businesses throughout Maryland and the Mid-Atlantic region. From phishing-resistant authentication and privilege management to backup strategy, incident response planning, and 24/7 security monitoring, we help organizations stop ransomware attacks before encryption begins.

Subscribe to Lewis IT Bin

Sign up now to get access to the library of members-only issues.
Jamie Larson
Subscribe
DigitalOcean Referral Badge