How to Prevent Ransomware: 7 Tips to Protect Your Business

Ransomware Attacks with Remote Access Tools

You may have seen in the press that there are continuing Ransomware attacks and there is a recurring theme and want to know how to prevent ransomware attacks. In particular with Remote Access and Ransomware. Used to be that attackers encrypted your information, relying on the fact that either the backup schedules you had in place weren’t up to scratch or your disaster recovery / business continuity processes took too long to invoke. Either way they wanted the money and you hoped that if you paid, you got the key.

These days it’s about extracting the data before they encrypt it, they hold a copy of that data and they threaten its release, where that would not only be damage to your business reputation, but could cause some issues for customers if that type of data is released or sold on the Dark Web.

Businesses have had their data stolen before encryption, and they ended up paying the fee in the agreement that the hacker will not release the data. Here you rely on the word of a criminal and hope they don’t come back to you asking for more money.

Entry points for these types of Remote Access and Ransomware attacks, apart from email, can be through insecure Remote Desktop Protocol (RDP). It’s a great tool for your users, but if the right security measures aren’t in place, unfortunately it’s only a matter of time before exploit and it puts your business at risk.

Computer backing up to the cloud

Tips on How to Prevent Ransomware and help Protect Your Business

If you are a business that relies on RDP or remote access tools, we have a few hints to help keep your business as secure as it can be.

  1. Backup your data. Ensure its tested and working and look at the time you need for your business to recover. Can your business work with the recovery time you have?
  2. Use a multi-factor authentication. Tools such as Microsoft Authenticator or Cisco Duo to secure your RDP connections. Where it supports it, you should use Multi Factor Authentication to secure your data.
  3. Apply a Firewall that will limit the access to RDP to specific IP addresses where you can. This will limit the attack surface for hackers.
  4. Block IP addresses that fail multiple log-in attempts. We see some RDP servers having in excess of 30,000 authentication requests per hour.
  5. Keep yourself and your workers updated and educated about the latest threats and information.
  6. Invest in an effective Anti-Malware solution. One that has the ability to look at behaviour of applications and the ability to roll back an infection to a known good state.
  7. Monitor the darker sides of the Internet for chatter about your business, its domains or IP addresses. This may pre warn of you of an impending attack.

Past Blogs

Copilot could soon auto-open in Microsoft Edge

Copilot could soon auto-open in Microsoft Edge

Is Edge your business’s browser of choice? Microsoft’s thinking of automatically opening Copilot when you use it. It could boost productivity, but there are privacy...
How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

You’ve probably heard a lot of talk about cyber attacks but how worried should you really be? Well, very, because cyber criminals are getting smarter. We have good news...
How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business. Why? Because cyber criminals are getting smarter than ever before. If they manage to crack just...
Beware these common ‘malvertising’ attacks

Beware these common ‘malvertising’ attacks

Ever clicked an online ad and wondered afterwards if it was a scam?… most of us have – and cyber criminals want us to keep doing it. Here’s what to look out for...
Businesses are taking too long to fix vulnerabilities

Businesses are taking too long to fix vulnerabilities

If you knew your systems were at risk of attack, you’d jump in and get things locked down fast – right? Actually… many businesses take too long to fix vulnerabilities....
What Are CyberSecurity Services

What are Cybersecurity Services?

What are CyberSecurity Services ? In our digital world, the question of what cybersecurity services are is more relevant than ever. As businesses across the UK rely...
Employees are falling for 3x more phishing scams

Employees are falling for 3x more phishing scams

Cyber criminals are getting smarter, and businesses are paying the price – especially when it comes to phishing attacks. Here’s what to watch out for…

Warning: Don’t ignore hardware requirements for Windows 11

Warning: Don’t ignore hardware requirements for Windows 11

You might be ready for the upgrade to Windows 11, but is your hardware? Running the upgrade without meeting the minimum requirements could slow down everything in your...
benefits of cybersecurity

Benefits of CyberSecurity

The benefits of cybersecurity. With vast amounts of information are stored online, the benefits of robust cybersecurity are more vital than ever. At Network &...
what is dmarc

What is DMARC

What is DMARC and Why Does Your Business Need It? When it comes to protecting your business from cyber threats, email security is often overlooked. Yet, email is one of...