After recovering from a ransomware attack triggered by a phishing email, the FIRST step the IT administrator should take is:
B. Restrict administrative privileges and patch all systems and applications.
Restricting administrative privileges helps mitigate the impact of future attacks by limiting the ability of malware to spread and execute malicious actions with elevated privileges. Patching all systems and applications ensures that known vulnerabilities are addressed, reducing the attack surface and strengthening the overall security posture of the IT environment.
While options such as scanning for residual malware, taking new backups, rebuilding workstations, and implementing application whitelisting are important security measures, addressing administrative privileges and patching systems and applications are immediate priorities to prevent similar attacks from occurring again.