Ransomware Protection Guide
Home 9 Data Security 9 Ransomware Protection Guide

Ransomware has become an epidemic in today’s IT world. It has locked down hospitals, universities, small businesses, and individuals all over the world. We’ve updated our Ransomware Protection Guide to include additional tips to help you protect yourself and your business.

What is Ransomware?

Ransomware is malware that infects your computer by locking access to your files until you pay a ransom – usually in Bitcoin. The malware typically gets on your computer through a malicious email or website. Hackers can also deliver it straight to your computer if it’s already been compromised.

Ransomware is replacing credit card theft as the number one scam for cyber criminals. Unfortunately, antivirus software alone is not enough to protect you from this threat.

How Can I Protect My Data from Ransomware?

ACT recommends multiple layers of protection to defend against the latest risks. Here are some best practices to protect your network against ransomware:

  • Backups

    • If set up and maintained correctly, backups are the only guaranteed defense against ransomware. This goes beyond a periodic copy of your data. Best practices include snapshot image-based backups that are captured multiple times per day and kept securely both on-site and off-site.
  • Antivirus and Anti-malware Software

    • This is technology 101. Everyone needs to be running antivirus software on all their appliances…yes I said all. Desktops, laptops, iPhones, Androids, Macs, etc. Nothing is off-limits these days.
  • Firewall with UTM

    • In the old days, firewalls were the doors that kept the bad guys out. The problem now is that end-users are clicking on malicious emails and websites unknowingly, opening the door and inviting them in. Many firewalls today contain unified thread management features (UTM) that provide a suite of protection against today’s threats.
  • Operating System Security Updates and Service Packs

    • When was the last time your servers or workstations were updated? Microsoft is regularly releasing updates, patches, and security fixes to keep their operating systems up-to-date against vulnerabilities. Make sure you are installing them timely.
  • Email Security Software

    • If you find yourself weeding through dozens of junk emails on a daily basis, then it’s time to upgrade what you are using for email security. Cloud-based email security systems can stop threats before they ever make it to your company’s mail server. Spam, viruses, and malicious URLs are some of the easiest ways for ransomware to infect users.
  • Password Policies

    • Enforce strong password policies, encouraging passphrases, forcing employees to change passwords periodically, and not allowing them to reuse past passwords.
  • Multi-Factor Authentication

    • Use multi-factor authentication (MFA) for an extra layer of network security. Even if your passwords are stolen, MFA should prevent hackers from gaining access.
  • Domain Name System (DNS) Intelligence

    • DNS is the starting point for internet connectivity across all devices. Providers are now using DNS to secure networks in ways beyond the standard security products out there. This gives clients another layer of security across all platforms in their organization by protecting them from malware, botnets, phishing, and others.
  • Security Policies

    • One quick and easy way to help reduce the risk of ransomware on your network is to limit employees’ access to the network. There are a number of ways to do this. For example, you can remove permissions to specific files and folders, lock down desktops, and remove administrator roles for standard users, just to name a few. Keep in mind that malware can only access what the infected employee has access to. Thus, limiting employee access minimizes the threats.
  • Education

    • Employees are the front line to most businesses. Any email they open, attachment they click, or website they browse could be compromising the business. Many ransomware attacks can be prevented through employee education and training. This can be as simple as creating handouts for employees to review periodically, or maybe an occasional lunch-and-learn session. Remember, know before you click!
  • Did I Mention Backups Backups Backups?

    • Backups are so important that it has made the list twice. And don’t forget, the only way to truly know if your backups are working is to run a periodic test. Don’t wait until your network is compromised to find out that your backup may have failed.

So ask yourself: Is your business safe? contact us to learn how a Security Assessment can help you determine how well your network is protected.

Recent Posts

Custom Solution Drastically Improves Workflow for Spinal Group

The Client and Their Challenge A fast-paced, specialized spinal surgery practice with more than 18 locations throughout New Jersey, New York and Florida, had a critical need to access patient images 24 hours a day, 7 days a week, 365 days a year. Their inability to do...

How ACT Helped a Large Orthopedic Group In New Jersey

We were contacted by the Practice Administrator of a large Orthopedic group in Central New Jersey. An industry expert referred us to her because the practice was using a PACS system at one of their sites and it was slowing their network down dramatically. The...

5 Benefits of Cloud Computing

Cloud computing has been around for decades, but change can be scary for many business owners. An International Data Group study says 69% of businesses already use Cloud technology in some capacity, and 18% say they plan to implement Cloud computing solutions in the...

What We Do

Managed IT Services

Learn More

Cloud Computing

Learn More

Backup & Disaster Recovery

Learn More

Network Services & Support

Learn More

Security Solutions

Learn More

Co-Managed IT

Learn More

Improve and grow your business with a smarter IT solution.