Home Tech Ten Best Practices To Secure Against Ransomware

Ten Best Practices To Secure Against Ransomware


Ten Best Practices To Secure Against Ransomware

Ransomware hits without discrimination or notice, penetrating through the web, email or removable media devices. It can bypass even the most advanced protection. The impact can be devastating, crippling businesses for days after.

Ten Best Practices To Secure Against Ransomware

With the rising threat of ransomware, I outlined ten steps that enterprises should take to reduce the risk of affected by it.

  1. Develop a backup and recovery plan – It’s necessary to have regular backups to
    counter ransomware, with the backup stored offline on separate devices. Fortinet also
    advises that the backup process should be “practical and diversified”.

How To Protect Against Ransomware

  1. Use professional email and web security tools – There are tools available that can analyze email attachments, websites, and files for malware, as well as block any ads or social media that may have been compromised and have no relevance to one’s business/company. It is recommended that any tool used should have sandbox functionality, which will ensure that unrecognized files can be scanned and analyzed safely.

How good is your internet security against Ransomware

  1. Keep your operating systems, devices, and software updated – Making sure your
    system and devices are always up to date will greatly reduce the number of exploitable

All You Need to Know about Next-Gen Virus Protection

  1. Ensure your device and network’s security measures are updated – Similar to the
    above. Keeping your antivirus, IPS, and anti-malware updated will mean better protection against the latest threats
  2. Use application whitelisting – This will keep out unauthorized applications from
    being downloaded or executed.

  3. Segment your network into security zones – By doing this, infections can be isolated
    and will not easily spread.

Ten Best Practices To Secure Against Ransomware

  1. Establish and enforce permission and privilege – The less who have access to
    critical applications, data or services, the more secure the network. Fortinet also
    recommends using strong passwords and changing them often

  1. Establish and enforce a BYOD (Bring Your Own Device) security policy – Create an effective policy that enforces inspection, making sure to deny devices the access to
    company network, so long as they do not meet security standards

  2. Deploy forensic analysis tools – This is to help determine where infections come from,
    the duration it stays within your network, whether you have successfully purged it on
    all devices, and to help secure your network from it in the future

  3. Do NOT rely on employees to keep you safe (CRITICAL) – Individual employees are the biggest security risk in organizations, so rather than rely on them being careful it is
    more important to have back up plans in the case of a security breach


Please enter your comment!
Please enter your name here