七色视频

Skip to Main Content Skip to bottom Skip to Chat, Email, Text

How to prevent ransomware

Michael Feder

Written by Michael Feder

Kathryn Uhles

Reviewed by听Kathryn Uhles, MIS, MSP,听Dean, College of Business and IT

Frustrated woman working at desk, hand to forehead

Among other forms of malware,听ransomware blocks you from accessing your files, passwords or additional personal information until you pay a ransom to regain control.听, doubling its frequency in a year.

While malware such as viruses, spyware and bots can injure your device鈥檚 productivity, ransomware will lock you out of your system until you pay to remove the malicious program. Find out how ransomware can compromise your computer systems and how you can avoid it.

Where does ransomware come from?

Ransomware may come from numerous sources. Whenever a user visits a听compromised webpage, opens a malicious email attachment, downloads an infected program, or communicates with another user whose device is infected with malware, ransomware can attach itself to their device.

Often, ransomware can reach your device through popular digital communication tools like email and instant messaging phishing attacks. In other cases, ransomware can spread through insecure public internet access.

At times, ransomware can also reach your device when you visit a malicious website. Known as 鈥,鈥 this ransomware attack occurs when you unknowingly reach an infected website. Even if you only visit that website for a few seconds, ransomware can attach to your device.

How does ransomware affect your devices?

Ransomware attacks don鈥檛 usually begin听. It works first by infecting your device, then by locking 鈥 often encrypting 鈥 your data. This usually means you can still turn your device on but cannot access information stored in documents or databases.

After an attacker uses ransomware to lock down your data, users typically听receive a ransom demand. This offer can be made in several ways. You might notice that your background image has changed to the ransom demand. In other cases, hackers will replace your files with a copy of the ransom note.

Many types of ransomware also work to听maximize damage听after they infect a device. For example,听听scans your files and steals valuable data even if a ransom is paid. Another ransomware variant,听, also uses your device to search for other devices it can attack and encrypt.

Ransomware prevention

Whether you鈥檙e an organization or a private device user, ransomware is an intimidating form of malware. Fortunately, there are several steps you can take to protect your devices from malicious attackers. These same steps can also help you limit damage if your device is infected.

Develop an IT disaster recovery plan

An important first step in preventing ransomware is developing an IT听disaster recovery plan. This plan helps your entire organization protect against ransomware, while identifying critical first steps in the event of a ransomware attack.

The right IT听disaster recovery plan听helps with far more than post-attack recovery, and should also include the following elements:

  • Prevention 鈥 Actions your IT team and your entire organization can take that help to deter ransomware and perform surveillance on all important devices.
  • Mitigation 鈥 Measures that help reduce the chance of a ransomware attack ever taking place.
  • Preparedness 鈥 Activities that help users remain vigilant against ransomware threats, including anticipatory ransomware response training.
  • Response 鈥 Plans that outline how users respond in the event a ransomware attack occurs, either on a single device or across an organization.

Your IT disaster recovery plan can look different from another organization鈥檚 plan. It鈥檚 important to听customize your plan听to the size and strengths of your organization and ensure all employees are aware of the plan鈥檚 steps in the event of a ransomware infection.

Keep systems up to date

Updating device systems is an even simpler approach to preventing ransomware attacks.听, or with outdated device operating systems, because their security parameters can be less protected.

After听updating your device鈥檚 systems, it鈥檚 also important to update the programs you use. After a sizable operating system update, for example, your device鈥檚 programs might require an update to maintain compatibility. Hackers may find vulnerabilities to target with a ransomware attack if your updated device uses outdated programs.

Maintain backups

Whether you store your information on a server or the cloud, it鈥檚 important to maintain backup files. Store backup files in a听separate location, preferably on a different device, to keep them accessible if you ever need them.

During a ransomware attack, backup files can often save your organization thousands, if not millions, in lost payments. Without backup files, your organization may need to spend time, and money, pursuing IT strategies that help restore file access.

You must frequently听update your backup files听to ensure they reflect any changes. Many device users trust听cloud computing听to back up their files securely since cloud storage solutions are typically secure 鈥 and you can set them to automatically back up your device鈥檚 files regularly.

Increase security on your devices

You can improve security on your devices in various ways. Many of these strategies are preventive:

  • Don鈥檛 hand out your personal information.
  • Log out of websites after you make a payment.
  • Turn off both Wi-Fi and Bluetooth connectivity when not in use.

You can also take听proactive steps to improve your device鈥檚 security:

  • Use a VPN to encrypt your connection when using a public network.
  • Read reviews and verify the reputation of an application before downloading.
  • Diversify your passwords and change them frequently.
  • Set up two-factor authentication across all devices.
  • Only use trusted device charging stations.
  • Disable any app or program permissions for your camera or microphone.
  • Get trained on how to spot malicious links.

These and other measures can help keep your information safe, particularly when you use shared or public networks.

Use an intrusion detection system

As attackers grow more advanced in their ransomware deployment methods,听IT teams are developing new ways to prevent malware, including ransomware, from reaching sensitive information. One emerging cybersecurity strategy 鈥 an听intrusion detection system听(IDS)听鈥 consists of programs that proactively alert IT personnel to security threats.

An 听typically relies on both signature-based and anomaly-based intrusion detection. Signature-based protection compares ransomware threats to trends in your network to identify possible threats before they affect device performance.听Anomaly-based detection听uses machine learning to classify all device activity as normal or risky, depending on how users on your network normally operate.

Consult professionals

IT professionals can help you with every phase of ransomware protection, including proactive device protection, backing up your files, regularly scanning device activity and even mitigating issues after an attack.

If you yourself are considering听joining the evolving world of cybersecurity, you鈥檒l need to complete a few initial steps. Many employers prefer candidates with at least an undergraduate degree in technology. Students sometimes prefer听online technology degrees, given the greater flexibility and the freedom to work while they learn.

Aspiring cybersecurity professionals may choose to pursue a听bachelor鈥檚 degree in information technology, which can help prepare them to mitigate and prevent IT risks like ransomware attacks and other malware. This degree sharpens key skills in systems analysis, information systems, operations and cybersecurity.

Explore information technology programs

Whether you鈥檙e seeking to gain a basic understanding of information technology or cybersecurity, or you鈥檙e a working professional looking to expand your skill set, 七色视频 (UOPX) offers听online course collections, bachelor鈥檚 degrees and master鈥檚 degrees.听Learn more about undergraduate and graduate听online technology degrees from UOPX听and start your IT journey today!

  • Bachelor of Science in Information Technology听鈥 In this program you鈥檒l learn skills including business process, cybersecurity, information systems, operations and systems analysis.
  • Bachelor of Science in Cybersecurity鈥斕齌his online program teaches skills such as security policies, network security, cybersecurity and more.
  • Master of Science in Cybersecurity听鈥 This online program explores in depth such skills and topics as cybersecurity, security policies and vulnerability.
  • 鈥 This course collection can help you prepare to sit for the EC-Council Certified Ethical Hacker (CEH) certification exam. Topics include the phases of ethical hacking, recognizing weaknesses and vulnerabilities of a system, social engineering, IoT threats, risk mitigation and more.
  • 鈥 This course collection can help you prepare to sit for the EC-Council Certified Incident Handler (ECIH) certification exam. This specialist certification focuses on how to effectively handle security breaches.听
  • 鈥 This course collection can help you prepare to sit for the entry-level EC-Council Certified Network Defender (CND) certification exam. Courses focus on protecting a network from security breaches before they happen.
  • Computer Hacking Forensics Investigator Course Collection鈥 This course collection can help you prepare to sit for the EC-Council Computer Hacking Forensics Investigator (CHFI) certification exam.听You鈥檒l learn about the latest technologies, tools and methodologies in digital forensics, including the dark web, IoT, malware, the cloud and data forensics.
Headshot of Michael Feder

ABOUT THE AUTHOR

A graduate of Johns Hopkins University and its Writing Seminars program and winner of the Stephen A. Dixon Literary Prize, Michael Feder brings an eye for detail and a passion for research to every article he writes. His academic and professional background includes experience in marketing, content development, script writing and SEO. Today, he works as a multimedia specialist at 七色视频 where he covers a variety of topics ranging from healthcare to IT.

Headshot of Kathryn Uhles

ABOUT THE REVIEWER

Currently Dean of the College of Business and Information Technology,听Kathryn Uhles has served 七色视频 in a variety of roles since 2006. Prior to joining 七色视频, Kathryn taught fifth grade to underprivileged youth in Phoenix.

checkmark

This article has been vetted by 七色视频's editorial advisory committee.听
Read more about our editorial process.

Read more articles like this:听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听 听听