How To Protect Your Computer From Ransomware

Comments · 146 Views

Cyber attackers typically craft emails from a seemingly credible source like Human Resources or IT when they employ this ransomware delivery method.

Cybercriminals can also deploy ransomware through RDP, a communication protocol that grants IT admins access to systems. Hackers use port scanners to scour the web for exposed ports since RDP usually initiates its requests through port 3389. Once systems with exposed ports are identified, attackers can crack the login credentials and log in as admins.

  • Install An Excellent Firewall Program
  • Download files and software from trusted websites only
  • Do not open links, attachments, and suspicious emails from unknown sources.
  • Ensure that your PC runs the latest operating system version with all the latest patches for added security.
  • Store essential files in the cloud, as cloud storage services usually have built-in ransomware detection and recovery.
  • Use a secure, modern web browser like Google Chrome, Mozilla Firefox, or Microsoft Edge.
  • Restart your computer at least once weekly to ensure that the applications and operating systems are updated, helping your system run better.
  • Invest in removable drivers for backup.
  • Develop a consistent backup routine to ensure that you backup your files regularly.
  • Install a dedicated ransomware blocker.

A reported 97.25% of phishing emails contain some ransomware. Therefore, it is clear that email phishing campaigns are among the favorite ransomware delivered methods cyber attackers use. Email phishing involves using legitimate-looking emails to trick individuals into opening a ZIP file, Word, Excel, or PDF attachment. After opening these attachments, the ransomware encrypts and holds essential files for the cyber attacker. Also, attackers may trick individuals into clicking a malicious link. If successful, the URL redirects the user to a malicious site that triggers the ransomware download.

More info: Recovery Time Objective (RTO)

Comments