Ransomware prevention best practices

  •  
     
  • -Select-
By clicking 'Download PDF', you agree to processing of personal data according to the Privacy Policy.

Thank you!

Your PDF will open in a new tab.

We hope you enjoy reading and sharing these best practices.

Ransomware is a sophisticated class of malware in which data is held hostage until a ransom is paid. Ransomware can be very dangerous for organizations, as failure to comply can result in exposure of or permanent loss of confidential business information. Some of the most common ways ransomware infiltrates organizations is through phishing emails, corrupted websites, and malicious extensions.

Ransomware is a sophisticated class of malware in which data is held hostage until a ransom is paid. Ransomware can be very dangerous for organizations, as failure to comply can result in exposure of or permanent loss of confidential business information. Some of the most common ways ransomware infiltrates organizations is through phishing emails, corrupted websites, and malicious extensions. 

  • Ransomware 350% is growing at a yearly rate of - Cisco 2017 Annual Cybersecurity Report -
     
  • From 2016 to 2017 there has been a 2,502% increase in the sale of ransomware on the dark web

    - The Ransomware Economy by Carbon Black -
     
  • Ransomware damage costswill exceed $5 billion in 2017up more than 15X from 2015

    - Cybersecurity Ventures -
     

8 best practices to prevent ransomware

 

Back up your files

The most effective way to handle ransomware attacks is to use the 3-2-1 backup rule: keep at least three separate versions of data on two different storage types with atleast one offsite.

 

Educate end users

Regularly train your employees on how to identify and avoid common ransomware pitfalls such as malvertisements, phishing emails, etc.

 

Patch vulnerabilities

Reduce the vulnerabilities in your operating systems, browsers, and other applications by regularly updating them.

 

Use an intrusion detection system

Cut off ransomware attacks in their early stages using continuous monitoring to detect signs of anomalous or malicious activity in real time.

 

Employ email filtering

Block malicious executables, spam, phishing emails, and other methods ransomware is known to use.

 

Whitelist applications

Add acceptable software to your whitelist and block unauthorized programs from running.

 

Provide the least amount of privilege possible

Use robust access management to restrict unwarranted access and reduce the number of access points through which malware can enter your organization.

 

Logically separate networks

Mitigate data loss in the event of a ransomware attack by separating your networks according to task or department.

Get DataSecurity Plus easily
installed, configured and running within minutes.

Get your free trial  
Email Download Link