• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Top 12 Effective Ransomware Protection Tips

by wing

What is ransomware?

Ransomware belongs to the family of malware used to take control of users’ machines and the users get back control of the machine when the victim pays a ransom to the attackers.

There are a number of preventive steps that a user can take to avoid ransomware attacks. But before delving depth into the ransomware prevention techniques, you need to know a bit about the types of ransomware and how they spread.

How does ransomware spread?

Your computer may get infected with ransomware in several ways such as via email attachment, via the compromised website, Trojan horses, by clicking pop up ads, etc.

ransomware network

To trick the users, the malicious program or emails will pretend as if it came from a legitimate source such as the user has been caught visiting illegal websites and thus he need to pay penalty. Some other techniques used to spread ransomware are showing the users a fake windows activation screen and asking them to pay using crypto-currency such as bitcoin. Sometimes users prompted to click on popup ads when they are offer free antivirus or antimalware software. Once you click the link the ransomware will be auto downloaded in your system.

Two common types of ransomware

The two most common types of ransomware are ransomlock and cryptolocker.  Ransomlock takes control of the computer screen by locking them while the cryptolocker encrypts users’ data including images, videos etc. The files are encrypted with a public key and once the victim pay the ransom, a corresponding session key is given to the user to decrypt the data.

Here are our top tips to defend against ransomware

  1. Do not click pop up ads.

If you see an attractive pop-up ads claiming to be an antivirus/anti-malware software, don’t click on it. Sometimes, you may see messages in the ads that say, “your system is infected, or “FBI warnings: your system is be used for illegal activities”. Never click on such ads. When you come across such should immediately exit the webpage and remove cookies of that site. Avoid clicking on the links or buttons inside the pop-up, do not even try to close the ads, which may trigger the ransomware installation script.

  1. Download files only from the secured sources

You may need to use open-source software for various reasons. Always download software from the ordinal developer’s website, not from any free software download website.

  1. Avoid visiting  unknown websites

Most people browser internet for searching information, reading reviews, buying staff only. If you are looking for information in Google search or any other search engines, Google may show up contents from the unknown or compromised sites in their first page. At first click on the links that is from reputed domains such as news sites, Wikipedia,  .edu blogs etc.

  1. Whitelisting apps/trusted application mode:

If someone in your network downloads and execute an .exe file that contains ransomware code, your all computers in the network will be at the risk of getting infected. If you have an endpoint device, make sure you have you only run trusted applications on your computer? Most of the personal endpoint solution (antivirus, internet security software etc.)

Trusted application means your computer will only allow the applications that are trusted by the database of your endpoint solution provider. Even if you download a rogue app by mistake, your endpoint will block it. So, consult your send point solution provider to learn about how to whitelist apps or how to enable trusted application mode in endpoint security.

  1. Patching

Ransomware can be installed on your machine by taking advantage of the known vulnerabilities of your operation system. As soon as your vendor (Microsoft, Apple) releases OS security patches, you need to apply them to your system as soon as possible. Always make sure all the applications on your system are updated.

 

  1. Back up data and system

You can take regular system and data backup. System backup means you will have the capability to restore your operating system to a previous system when it gets corrupted. Think about taking an offline backup, which means to keep a copy of your site in a separate external hard disk. If possible store your backup in encrypted form, thus making sure even if your backup copy get lost or falls into the wrong hand, no one will be able to decrypt your data. Also, keep an off-site backup copy, which means keeping a copy of backup in a separate physical location. You may discuss with data backup experts or vendors to learn about what backup solution is appropriate for you.

Remember that backup works like insurance. Every if you opt for a paid backup solution, it is worth considering if you have valuable data that you need for your work. For instance, during the ransomware attack on San Franciso’s transportation system, the company decided not to pay to the hacker and restore all infected computer from backup, which saved them $70,000 ransom.

  1. Start using strong Internet security solutions-

if you need Internet for your daily works, it is essential that you have an Internet security solution. It does not cost much to have a premium Internet security product that includes anti-viruses as well.

  1. Learn about malwares and how they enter in your computer

keep your eyes open on the latest trends on malware development. You can visit Sophos, Norton’s, McAfee or Trend Micro’s blog to keep abreast of ransomwares. 

  1. Scan before copying files

Scan the external drive before copying anything to your computer. A pen drive may contain a Trojan which may be copied over to your system and it might open a backdoor to install ransomware remotely on your computer.

  1. Macros

Don’t turn on macros- macro auto-execution disable on Windows by default. If downloaded file/apps ask you to turn-on, don’t do it.

  1. Microsoft office view

If you have to open a Microsoft word or Excel that you receive from someone, you can view it with Microsoft office viewer before opening it.

  1. Privilege user account

Avoid using privileged account. Create a second account on your computer with less privilege and only use your administrative credentials when you have to install anything. Avoid browsing and downloading anything when you log in with your admin account.

What to do if my computer gets infected with ransomware?

Despite taking all preventive measures if your computer gets infected with ransomware, you can try to roll back your computer from backup. If it fails you can seek professional assistance from malware removing service provider.

Related posts:

  1. Definition of 7 Types of Malware
  2. HSRP Configuration(Hot Standby Routing Protocol)
  3. MySQL Security Settings Checklist and Issues
  4. What are Cookies in Web Browser

Filed Under: Internet Security and Safety Tagged With: malware, ransomware

Primary Sidebar

Please help us sharing

Categories

  • AWS
  • Basics
  • Containers
  • Cryptocurrency
  • Cyber
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Law & Human Rights
  • Network Security Tips
  • Off Track
  • Social Media Governance
  • Tech Comparisons
  • Tech Stack Suitability
  • Telecom
  • Tutorial

CISSP Sample Test

Take a CISSP Sample Test

CISA Sample Test

CISA IT governance Sample test

Please Follow Us

Contact us for Ads

Go to Contact Form

Search

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

audit AWS backup basics browser check cisco cloud computer configuration cyber data database email gmail hsrp ids iis informaiton internet kubernetes linux load balancing malware microsoft network protection redundancy risk router security security tips server social media SSL switch test tools vpn vrrp web webserver website windows wordpress

Copyright © 2010-2025 ·All Rights Reserved · SecurityWing.com