Skip to main content

Understanding Ransomware Part 2: How To Prevent Ransomware Attacks


Now that you read Part 1, you understand what Ransomware is and why it has become the single most costly problem in the world of IT security and business data protection, let’s take a look at several simple, easy-to- deploy solutions that can prevent an unwanted and costly ransomware intrusion in your business. 

Restrict User Administrative Access 

This is a very simple step to take. Users should have their administrative access restricted – ideally removing the ability to install new programs without the IT team’s supervision. This will help your business avoid the most common cause of infection: users downloading infected attachments from emails. 

Granted, this will not be popular with your users. If your users already have administrative rights to their workstations then you will have to drag them along kicking and screaming. That said, a past report confirms what many security professionals have long presumed: Removing administrator rights from everyday user accounts (especially Windows) slows down or stops almost all critical malware infections. The report determined that removing admin rights would mitigate 96 percent of critical vulnerabilities affecting Windows operating systems, 91 percent of critical vulnerabilities affecting Microsoft Office and 100 percent of vulnerabilities in Internet Explorer. 

Use Electronic Vaulting Solutions Like DataForce 

When an infection occurs, it’s often impossible to decrypt the files that are infected - but that doesn’t mean you’re completely out of options. Electronic vaulting is the process of electronically transporting data offsite to a secure location, usually in the cloud. These services provide users with a system for the backup, storage, and recovery of computer files. Sending backups off-site ensures systems and servers can be reloaded with the latest data in the event of a disaster, accidental error, or system crash. Electronic vaulting also allows you to set customized backups and restore points - this is like time travel for your business allowing you to turn back the clock and recover lost files. 

Electronic vaulting is beneficial for large organizations as part of their disaster recovery plan and it’s a great first step for small-office users. When Ransomware or a disaster strikes, and your backup data stored on external drives or USB drives is compromised along with the originals, you'll wish you'd implemented a remote electronic vaulting plan. 

The great news for businesses of all sizes is that electronic vaulting has become far more affordable. This is by far the strongest way to protect your business and it’s worth exploring. 

Show Hidden File Extensions On User Computers 

Most malware uses a hidden “.exe” extension tacked onto the end of a PDF or .docx document. If you enable the user to see the full file extension, it can be easier to spot suspicious files and eliminate them in the first place. By showing hidden file extensions on user computers, you can prevent users from being misled into downloading and running these programs. 

Filter Out .EXE Extensions 

In Emails No email with a .exe extension is a legitimate, important email. If your gateway mail scanner has the ability to filter files by extension, you may wish to deny mails sent with “.EXE” files, or to deny mails sent with files that have two file extensions, the last one being executable (“*.EXE” files). An .exe on an email is almost always a virus, so your IT team should work to filter out these extensions on all company email systems. 

Patch Your Software And Operating Systems Regularly 

A software vulnerability is usually a security hole or weakness found in an operating system or software program. Security vulnerabilities caused by outdated software and operating systems can allow rapid spread of ransomware viruses. You should take every precaution you can to prevent this by keeping your corporate software and operating systems patched and up-to- date. So even though software updates sometimes seem like a hassle, think of it as a preventative measure for your Internet safety. 

Run Comprehensive Antivirus & Malware Solutions On All Systems 

Antivirus and anti-malware solutions are helpful for identifying and destroying specific viruses. A leading anti-virus company was quoted as saying, “a good antivirus product has tools that will help you to schedule a time for a regular virus scan to take place automatically. It will monitor your system and check for viruses introduced by email attachments or through your browser actions, like when you click on links for downloading. It will create log reports that will give you information about what it has found, and if possible, it will attempt to repair any damage that the virus has done.” Ensure that you have a best in class Antivirus and Malware solution on your systems. 

Disable RDP To Reduce Infection Risks 

RDP, or “Remote Desktop Protocol” is a method by which ransomware can spread across multiple machines. RDP allows an infected computer with sophisticated ransomware to open up a connection to another target computer – or even a piece of IT infrastructure – and deploy the same infected files to that computer, locking it up and potentially spreading the virus further. This exploit requires the username/password credentials in the environment to be weak enough to compromise, but attackers are getting more and more sophisticated. End-users generally have no need for RDP, so it should be disabled on all of their computers to reduce infection risk. 

Avoidance Is The Best Protection & Don’t Negotiate If Infected 

As we mentioned in Part 1 of our post, if you are infected, don’t negotiate with your attacker. This just encourages the development and spread of these viruses – and paying a hacker doesn’t guarantee that your files will be decrypted. 

Instead, focus on implementing the simple, easy-to- deploy solutions mentioned above that can prevent an unwanted and costly ransomware intrusion in your business.

For over 15 years, the team at Circadian Force has served small to enterprise level businesses as well as IT Professionals in the areas of disaster recovery, cloud backups, and electronic vaulting. To learn more about their organization, head to www.circadianforce.com.





I hope you enjoyed this article about understanding the effects of ransomware on your small business.

Interested in more articles about data security & virus protection?

Read My Posts:

- Tips To Shield Your Company From Digital Thieves

- 5 Reasons Why All Companies Need Strong IT Departments

Edited & Published by Mike Schiemer
Owner of Bootstrap Business
Money - Marketing - Motivation
Digital Marketing | SEO | Social Media
Mike Schiemer Builds Better Business

Share This On Social Media:

Popular posts from this blog

Top 5 Plugins To Implement Contact Forms On WordPress Websites

Undeniably, a Contact Us page is one of the significant parts of a website. It not just makes the communication part easier, but also provides a chance to your customers to come with their queries and doubts anytime they want.  The entire inkling of putting a contact us page could be as old as the inkling of having a website for the business. However, throughout the years, the technique and design of this page have transformed tremendously, especially with the influx of contact forms.  Earlier, website owners were publishing email IDs and other contact details on this page. This technique brought more spams than genuine queries or doubts. Thus, contact forms are meant to keep you at bay from spammers, security threats, and even keep your website friendly enough for users.  And, if you are using WordPress as the platform for your website, you have the freedom to explore premium WordPress plugins that can help you display contact forms easily and elegantly. These plugins c...

8 Great Jack Welch Motivational Quotes

Words of wisdom from legendary businessman, entrepreneur, motivational public speaker , former CEO of GE, and influential investor Jack Welch: 1)  "Control your own destiny or someone else will." 2)  "If you don't have a competitive advantage, don't compete." 3)  "Willingness to change is a strength, even if it means plunging part of the company into total confusion for a while."  4)  "Face reality as it is, not as it was or how you wish it to be." 5)  "Strong managers who make tough decisions to cut jobs provide the only true job security in today's world. Weak managers are the problem. Weak managers destroy jobs." 6)  "Good business leaders create a vision, articulate the vision, passionately own the vision, and relentlessly drive it to completion." 7)  "An organization's ability to learn, and translate that learning into action rapidly, is the ultimate competitive advantage."  8)  "Change befo...

50+ Top Digital Tools & Software Programs For Marketers & Startups

Digital marketing, social selling, search engine optimization, financial management, and analytics reporting can be complex and time consuming. It's hard to keep everything organized and optimized, especially if you are a solopreneur or lean startup.  Luckily there are plenty of great free or affordable programs out there that can help you improve your business performance. When used correctly these programs will save you time, money, and frustration while increasing revenue. These apps, subscriptions and software programs can be life-savers. Here are some of the most effective apps and SaaS programs to help your company: CrazyEgg Founded by SEO and digital  marketing expert Neil Patel , CrazyEgg is a nifty tool that lets you track where visitors are scrolling and interacting.  It's based on a heatmap , scroll map, and overlay report insights. Combined with other analytics tools, it provides invaluable information that can help optimize your website and improve conversi...