Introduction
Ransomware attacks against Indian enterprises have increased by over 200% in the past three years. Manufacturing plants have been shut down, hospitals have lost access to patient records, and financial institutions have faced operational crises — all because of ransomware. The average ransom demand against Indian enterprises now exceeds ₹2 crore, with recovery costs often 5–10 times the ransom itself.
This guide provides a practical, comprehensive ransomware protection framework for Indian enterprises — covering the prevention controls, backup strategies, and recovery capabilities that collectively create ransomware resilience.
How Modern Ransomware Works
Understanding the attack lifecycle is essential for building effective defences. Modern ransomware attacks follow a predictable pattern called the ransomware kill chain:
| Stage | Description | Defender's Window |
|---|---|---|
| Initial Access | Attacker gains entry through phishing, RDP brute force, or VPN vulnerability | Prevention — strongest opportunity to stop the attack |
| Persistence | Attacker installs backdoor to maintain access | Detection — SIEM and EDR can identify unusual activity |
| Lateral Movement | Attacker moves across the network to find valuable targets | Detection and Containment — network segmentation limits spread |
| Privilege Escalation | Attacker obtains administrative credentials | Detection — PAM and behavioural analytics can identify this |
| Exfiltration | Attacker steals data before encryption | Detection — DLP and network monitoring |
| Encryption | Attacker deploys ransomware and encrypts files | Recovery — backups determine outcome |
| Extortion | Ransom demand with data leak threat | Recovery — backup and IR plan critical |
Ransomware Prevention Controls
1. Email Security
- Advanced email filtering with sandboxing
- DMARC, DKIM, SPF
- Anti-phishing AI detection
- Attachment stripping for high-risk file types
2. Vulnerability Management and Patching
- Monthly patching cadence
- 24-hour patching for critical vulnerabilities
- Automated vulnerability scanning
- External attack surface management
- CISA Known Exploited Vulnerabilities patching
3. Multi-Factor Authentication
Credential theft is a primary initial access method. MFA on all externally accessible services eliminates major attack vectors.
4. Network Segmentation
Micro-segmentation limits ransomware spread across networks and protects critical systems.
5. Endpoint Detection and Response (EDR)
EDR detects ransomware behaviour such as rapid encryption and abnormal processes.
The Backup Strategy That Saves You
The 3-2-1-1-0 backup rule for ransomware resilience:
- 3 — Keep 3 copies of important data
- 2 — Store on 2 different media types
- 1 — Keep 1 copy offsite
- 1 — Keep 1 copy offline (air-gapped)
- 0 — Zero errors on backup verification
The offline backup is the most critical element. Backup testing is equally important — test restores quarterly.
Ransomware Response Plan
- Isolate — Disconnect affected systems
- Assess Scope — Identify impacted systems
- Notify — Report to CERT-In within 6 hours
- Engage Forensics — Investigate and preserve evidence
- Restore from Backups — Recover systems
- Eradicate — Remove attacker persistence
- Review — Improve controls post-incident
Should You Pay the Ransom?
The official advice from CERT-In, Interpol, and cybersecurity authorities is: do not pay.
- No guarantee of data recovery
- Funds further attacks
- Risk of repeat targeting
- Potential legal implications
However, in extreme cases where data is irreplaceable, organisations may consider it with legal consultation.
How Vedtam Can Help
Vedtam helps Indian enterprises build ransomware defences, deploy EDR, design backup systems, and conduct response planning.
Visit vedtam.com/solutions/cyber-security/ for more information.
Assess your ransomware readiness today.
Free consultation: vedtam.com/contact/ | +91 98915 55588
Published by Vedtam Cybersecurity Team | Vedtam Tech Solutions, Ghaziabad, India


