Ransomware for SMBs: The First 60 Minutes Playbook

Ransomware for SMBs: The First 60 Minutes Playbook

Ransomware: The 60-Minute Response Plan for SMBs (Do This When Minutes Matter)

When a ransom note appears, the clock is unforgiving. This first-hour playbook prioritizes containment, minimal viable communications, and safe recovery—plus an in-page, copy-and-use runbook and a quick tabletop invite.

First, what not to do

Don’t power everything off blindly (you can corrupt evidence).

Don’t negotiate or pay from personal accounts.

Don’t share technical details on insecure channels.

Minute-by-minute: the first 60 minutes

Minutes 0–10 — Identify & triage

Minutes 10–30 — Contain

Minutes 30–60 — Initial eradication & prepare to recover

In-Page Playbook: 1-Hour Ransomware Plan

Step

Owner

Tool/Proof

Status

Isolate affected endpoints/segments

NOC/Helpdesk

Switch/AP/VPN

Reset privileged credentials

IAM

AD/Azure AD/PAM

Block IOCs in EDR/Firewall

SecOps

EDR/NGFW

Validate clean backups

Infra

Backup console

Critical restore order

IT Lead

Runbook

Preserve evidence & logs

SecOps

SIEM/EDR

Use this operational table in your runbook. Print this table; keep a hard copy in your IR binder.

Minimum viable communications

Restore safely (and prevent repeat attacks)

Run a 30-minute tabletop

Want to rehearse this plan with your team? Book a free 30-minute tabletop to validate gaps and timings→ Book a tabletop