Prevent ransomware

How it happens

  1. User clicks on link or opens attachment in spam/spoofed email
  2. User unknowingly visits malicious/compromised website
  3. User plugs in infected device (e.g., USB key or USB hard drive)
  4. After successful compromise, cybercriminal installs malware
  5. Malware is released and infection spreads
  6. Computer is locked and message appears demanding payment to unlock files or system
  7. This can happen on a single computer or an entire network
  8. A message will warn that only the scammer can decrypt the files. Not true!

If your system gets infected with ransomware – you are the victim of a crime – report it to the police as soon as possible!

We strongly recommend that you do not pay the ransom. Take necessary mitigation measures with the help of IT professionals to minimize further harm.

Protect and prevent

Paying is not a guarantee that your computer or network will be unlocked. It is better to protect your systems with measures that help prevent infection.

Large businesses – a multi-point protection approach is best:

  • Email and web – block spam and access to malicious links
  • Server – protect servers from exploitable vulnerabilities
  • Network and endpoint – prevent ransomware from spreading and spreading and running on endpoint

Small businesses – a two-point approach to protection is effective:

  • Email and web – block spam and access to malicious links
  • Endpoint – block access to malicious/compromised sites and prevent ransomware from running

Home user – one step provides necessary protection:

  • Use a security solution that stops spam, prevents access to malicious links and stops infection

Follow good cyber hygiene rules

  • Use strong passwords – 12+ characters with numbers, symbols, upper and lower case letters
  • Install reputable antivirus and malware software; use network firewalls; secure your router
  • Use multi-factor authentication – such as a code sent to your cell phone after entering your password
  • Avoid opening emails from unknown addresses or clicking links embedded in them
  • Regularly update software to protect against the latest vulnerabilities. Follow instructions from software provider
  • Create backup copies on at least 2 different devices with 1 backup stored in a separate location

For more help visit:

Date modified: