7 Strategies that How to Defend Ransomware | Antivirus Software

Defend Ransomware

Above all protection. We repeat it for the umpteenth time: “Never click on the links that accompany some emails and that we do not know where they lead”.


Defend Ransomware | Antivirus Software


It is one of the pests that currently affect computers and mobile devices. The infected computers lose most of the data since, if not all of them are the majority, the files are encrypted. From there, a message appears inviting you to pay a ransom to return everything to its previous state. This message is not valid, since it is materially impossible to undo what cyber criminals have done. The only solution left is to format the computer and install all the applications again. Documents, images, videos, and other personal files will be lost.

To combat ransomware we propose some suggestions focused on taking measures and, also, on the installation of some other protective tool.

7 Strategies to Prevent Ransomware

Ransomware is the latest IT security plague. But there are measures to at least contain the extortion software.

Attacks on individuals and companies with ransomware are increasing dramatically. New ransomware families like Locky, Cerber, Madeba, and Maktub are springing up like mushrooms. But how can you protect yourself from the hackers and their attempts at blackmail - usually the hard drive is encrypted and a ransom is demanded decryption? Computerworld has put together 7 measures that can minimize the risk of your own PC or company server falling victim to ransomware cybercriminals.

1. Patch, Patch, Patch

Very correct: As with regular malware, blackmailing cybercriminals also try to maneuver their encryption tools through unmatched software holes on the PC. Therefore, the software patches should be imported regularly. This applies in particular to patches from manufacturers of widely used programs such as Microsoft and Adobe. Because a popular method to break into systems are so-called exploit kits like anglers. These check the targets for several known holes. The more outdated the software on your own computer, the more likely one of the exploits from the kit will fit. Next page: Turn on UAC and block pop-ups       

2. Activate the User Account Control Under Windows

Windows has had the security feature User Access Control (UAC) since Windows NT and Vista. The PC can be set up in such a way that the user is informed whenever a program makes changes that require administrator rights. For daily needs such as surfing, using programs, and checking e-mails, you should be on the go as a standard user. This is even possible if you have logged in with an administrator password. It is therefore very advisable to use this additional security level under Windows.

3. Block Pop-Ups

Cybercriminals like to use pop-ups on often popular websites to deposit their malware there. If you surf the site, you become infected. Therefore, whenever possible, set the browser so that the automatic opening of pop-up windows is prevented. By the way: Computerworld has put together tips for anonymous and safe surfing on the Internet here. In this post, you will find useful browser plug-ins for a safe surfing tour. Next page: Remain skeptical and change the browser's user agent

4. Remain Skeptical

A healthy dose of skepticism is required when dealing with websites and e-mails. This includes that you should not click on attachments or links in emails from dubious senders. You should also refrain from surfing suspicious websites. That sounds a bit banal. The fact is, however, that the most common infections are initiated by user actions. Vigilance is therefore appropriate.

5. Change the Browser's User Agent

Anyone surfing the web provides information on the browser and operating system used on every website. These are identified by a header in HTTP called "User-Agent". Its contents are not only interesting information for the website, but also for hackers and for the exploit kits they use. But done, the information can be changed. For example, a “Firefox for Windows” user can pretend to be a “Firefox for Ubuntu” user. The advantage: The exploit kits will then attempt to misuse software vulnerabilities under Linux, but this does not work on a Windows system. The easiest way to install the information from the “User-Agent” is with the help of a corresponding add-on. For example, the “User-Agent Switcher”, which is available for Chrome and Firefox there. Once installed, any conceivable configuration can be selected from the drop-down menu. Next page: Support from professionals

6. Professional Protection

Companies and private users alike should use software and mechanisms to protect the network and end devices. Network monitoring tools, which are based on artificial intelligence and examine behavior in the network for anomalies, do a good job. This tool should pay particular attention to email and web traffic, as this is where most ransomware attacks are carried out. Also, as already mentioned, the end devices, i.e. the PC of the individual user, should be protected with the help of security solutions such as antivirus software. It is also important here: the application should be able to pay attention to behavior and not rely solely on the comparison of malware signatures. After all, it can't hurt to use threat intelligence, as offered by many large IT security providers.

7. Decent Back-Up Strategy

As is well known, the whole point of ransomware is to encrypt important data, the decryption key of which is only released (if at all) after a ransom has been paid to the cybercriminals. It is all the more important to have a proper backup plan so that the encrypted data can be replaced by unencrypted data. It can be crucial that the company data are saved offline. Because the attackers try to freeze any online backups at the same time. Part of a decent backup strategy is of course that the data is prioritized beforehand so that the information that is particularly important for the company is handled with particular care.

Comments