phone icon
|

7 Tips to Prevent Ransomware

Image

Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data.


Malicious software that uses encryption to hold data for ransom has become more prolific over the past few years. The purpose of this software is to extort money from victims in exchange for promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it. Ransomware, as it is known, has previously targeted high-profile victims like hospitals, public schools, and police departments. Now it has found its way onto home computers.

The ransomware business model has turned out to be a lucrative industry for criminals. As a result, law enforcement now teams up with international agencies to identify and bring down scam operators.

There are a few dos and don’ts when it comes to ransomware.

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound emails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up to date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.


Among other cyberattacks, ransomware is one criminal activity that can be easily worked around with the above-mentioned solutions. Norton 360 coupled with education about these threats is an excellent protection plan for today's cyber landscape.

 

Do you have a backup plan?

Secure Cloud Backup lets you quickly and easily recover your PC files in case of ransomware, hard drive crashes, or natural disasters. Keep copies of your irreplaceable digital photos and important files safe from loss with easy-to-use, professional-grade online backup.

Don’t have one of our Norton 360 plans yet?
Click here to upgrade.
Norton logo
  • Norton
Norton empowers people and families around the world to feel safer in their digital lives

Editorial note: Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc. 

Contents

    Want more?

    Follow us for all the latest news, tips and updates.