• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Ransomware  /  5 Tips for Preventing Ransomware
5 Tips for Preventing Ransomware
09 November 2016

5 Tips for Preventing Ransomware

Written by Ankita Ashesh
Ankita Ashesh
Ransomware

You will not realize the importance of the phrase ‘Prevention is better than cure’ any better till you or someone you know witnesses a ransomware attack first hand. As the name suggests ‘ransomware’ is a kind of a cyberattack where you’re only left with the option to submit a ransom amount to hackers for recovering your locked data. The risk of losing data is what convinces most people to give in to this cyberattack. Even after paying the ransom there is no guarantee if you will be granted access to your data. This is exactly why we actively endorse prevention to be the best approach for protection from cyberattacks. Here are some tips to protect you from a ransomware.

  1. Backup your data regularly

Most of us are eternal optimists and like to believe that nothing can go wrong with us until it actually does. For the sake of that imaginary moment when something goes wrong, back up all your important files in an external hard disk drive or cloud. Back up is like an insurance policy that you can fall back on in case of a cyberattack.

  1. Refrain from clicking any file that looks suspicious

Since childhood we are warned to be careful of strangers who are overtly nice and the same applies to cyber world as well. If you get emails from strangers promising you a share of their property or a huge sum of money for exchange of some information, get alerted immediately. Phishing mails these days are drafted so meticulously that they can confuse even the most observant people. This is why any mail which requires ‘a call to action’ from you should be checked thoroughly for its accuracy. Do not open attachments from unreliable sources. Social media is no exception, if you get unexpected, out of context messages from friends or trusted contacts it’s always a good idea to check if they sent those links before clicking on it.

  1. Patch. Update. Stay Safe. Repeat

In the technology world ‘Patch’ is the equivalent of a security update. Vulnerabilities left in outdated operating systems, hardware and software are one of the leading causes of cyberattacks. It is recommended to always patch and update all OS, hardware, and software. You can turn on ‘Automatic Updates’ if you tend to ignore or postpone them.

  1. Watch out for file extensions

The thumb rule is to stay clear of files with multiple extensions. For instance certain files will look like they have two extensions e.g. bankaccount.xlsx.scr or cute-viral-cat.avi.exe. Make sure you do not click on such suspicious files. A healthy practice would be to allow Windows functionality of showing complete file names to avoid confusion.

  1. Enhance your security

If you spot a suspicious activity on your computer immediately disconnect the Internet to interrupt the process. Enhance your cybersecurity by setting up additional Firewall protection. You can install a browser add-on to block popups which can sometimes pose an entry point for ransom Trojan attacks.

Individuals, small businesses and large organizations are all at the risk of ransomware bought extortion. Thus it is important to know that it is completely in our hands to avoid such a situation by following some simple steps. Rather than dealing with the consequences it’s always a good idea to invest in precautionary measures.

ar_2

If you wish to learn more about how to safeguard your Enterprise against Ransomware then you can visit our website.

 Previous PostSC Magazine Gives High Rating to Quick Heal Endpoint Security Tot...
Next Post  EPS Enterprise Suite earns AVLab Award for real-time ransomware p...
Ankita Ashesh

About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
  • How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

    March 11, 2025
  • Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks

    January 31, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies