Ransomware Restore Readiness Checklist

A practical restore test plan: 15-minute minimum test + deeper restore rehearsal.

What this gives you

1) Minimum viable restore test (15 minutes)

Do this monthly. The goal is to prove you can restore something useful quickly.

  1. Restore one business-critical file to a safe location.
  2. Restore one email (or mailbox item) if you have SaaS backup, or export a sample mailbox item if not.
  3. Open the restored file and confirm it’s correct.
  4. Record the time taken + any issues.

2) Restore rehearsal (quarterly)

Pick one scenario:

Steps:

  1. Identify top 3 systems: e.g., file share, email, line-of-business app.
  2. Define target RTO/RPO (even rough): RTO ____ / RPO ____.
  3. Restore into a test location (or isolated VLAN/VM) and validate access.
  4. Capture screenshots + notes as evidence.
  5. Update the runbook with any improvements.

3) First-hour checklist (suspected ransomware)

TaskStatusNotes
Isolate affected device(s) from network (Wi‑Fi off / unplug Ethernet)
Do not power off servers unless instructed (preserve evidence)
Check for signs of spread (file shares, multiple PCs)
Pause scheduled jobs that might overwrite backups
Confirm backup integrity / immutability
Notify key stakeholders (management + finance + privacy lead)

4) Restore log (evidence template)

FieldValue
Date__________
Scenario__________
System / dataset restored__________
Restore methodBackup software / Snapshot / Cloud versioning / Other
Time to restore__________
Validation resultPass / Fail
Issues found__________
Follow-up actions__________

5) What “good” looks like (plain English)

Note: This document is general operational guidance and does not replace legal advice. It helps you establish a practical baseline and reduce common privacy risks.
👉 Free 30-minute consultation

No hard sell - just clarity and practical next steps.

hello@virtusgroup.biz
virtusgroup.co.nz
0800 847 887 (VIRTUS)

Book now