We take an in depth look at some of the most effective ransomware and cryptolocker prevention measures to keep your systems and documents secure.

The 4 most effective Cryptolocker Prevention measures

1. Always be backing up

Backups are the single best tool for cryptolocker prevention and recovery and should be part of your daily routine. Follow the 3-2-1 backup rule to ensure you are completely protected. This involves having 3 copies of all your data, stored on 2 separate storage media, with 1 copy being kept off site. The goal is to ensure that if your device were to become infected, or even lost or destroyed, your critical data would still be available to you. Also keep on hand operating systems and software you would need to rebuild your system if it were to become infected. There are backup tools available which can backup your entire system including operating system, applications and data for a simple restore, but if you are only backing up data you should be prepared to be able to wipe your entire computer and start again.

2. Keep everything up to date

Malware and viruses will often try to exploit security holes in the operating systems and applications that are running on your systems. As these vulnerabilities are discovered, updates are released to address them but until you apply the updates your systems will remain unprotected. Ensure you configure your operating system and all installed applications to automatically check for updates and apply them as soon as possible across all your devices. Also ensure you upgrade as new versions become available. Some software and operating system versions stop being maintained and provided with security updates as newer versions are released. Where possible, try to be on the latest version. Finally, make sure any protection tools such as antivirus and malware scanners are up to date with the latest version and definitions.

3. Double check your emails

Emails are still the number one method for ransomware and cryptolocker delivery and the means of attack can range from phishing emails purporting to be from trusted institutions asking you to click a link, through to attachments with malicious code embedded in them. For this reason you need to be extra careful with any emails from trusted institutions or people you may know that appear suspicious. Check for giveaway signs of a fraud email such as the reply email address being different to the sender, spelling and grammar mistakes, links asking you to provide/update information and unsolicited attachments. Even if the email is from someone you know, be wary as their account may have been compromised. If in doubt, double check.

4. Limit access

Limit access to files and folders as well as to systems. All users, whether in IT or not, should be logging in to systems with a regular user account with limited privileges. If administrator access is required, a second administrator account can be created and used when required for elevated privileges. This will prevent unauthorized applications and malware leveraging the permissions of the account to execute and install unwanted files and applications. With access to files and folders, structures should be put into place to organize the data in a manageable way. Access should then be granted on an as needed basis and limited to as little of the data that is needed as possible. In the unfortunate event of a ransomware outbreak, the damage done will be limited to only what the user can access. This will also help to enhance privacy and minimize the risk of data leakage in your organization.

These are just some of the best practices to keep your data and systems safe from ransomware. If you would like to find out more about ransomware prevention and how to protect your organization speak to the experts at Stanfield IT.

Considering Cryptolocker Prevention Measures?
Speak to the experienced team at Stanfield IT onĀ 1300 910 333