How to Prevent Ransomware Attacks in Your Business

Ransomware Attacks

In order to help your business to prevent ransomware, it is important to understand how these attacks can penetrate your organisation’s security and what behaviours allow the attackers to break through your defences.

The bigger Ransomware attacks that you see reported in the press are likely to be targeted, where an active attacker is targeting the business on purpose for financial gain. There are a lot of automated Ransomware attacks just waiting to happen. From an email being sent attempting to get a recipient to click a link, to compromised websites waiting to be viewed by a user.

This article will explain some of the more common infection and attack methods to help you understand how these attacks take place and restrict the impact on your business. Ransomware attacks have evolved, and continue to evolve, and the process for executing is straightforward, any business can be a victim, even those with excellent perimeter and endpoint protection.

Focus on prevention, but also remediation. Best will in the world a user will click on a link, or visit a website, any code being exploited needs to be quickly identified and swiftly dealt with.

 

Exploit Kits

These are typically run on compromised websites which your user could be browsing. The website itself looks perfectly OK, but perhaps a third-party advert or piece of code has been hacked and the exploit kit uploaded.

When the user browses the site, a sophisticated toolkit scans your computer for vulnerabilities to exploit.

This code is hidden on the site, which is often in an online ad (malvertisement) and then, hidden from yourself, it will redirect to a site where the exploit kit is then run, silently. This can then initiate a drive-by download of the payload and then executed, your computer infected and then files will be held for ransom.

 

Malicious Email Attachments

This is where an attacker will craft an email, make it look at real as possible to the recipient, and write it in such a way to sail through any email filter. It’s likely to come from HR, or your IT department, and it will contain a malicious file. This may be a Word or PDF document and the content could be another link in the file or a script that’s waiting for you to click “Run” on. Once it’s opened or clicked, the payload is then downloaded, the system is infected and then files and folders are encrypted and waiting for you to pay the ransom.

 

Malicious Email Links

This is similar to the attachments scenario above, where URLs are sent directly in the body of the email. Once again the emails are cleverly written, usually with excellent spelling and grammar, and written to be approved by any email filter.

Once the link is clicked, normally the payload is downloaded and executed and potentially files will start to encrypt.

Past Blogs

Outlook flags your important email

Outlook will flag your most important emails

Can your staff access too much?

Half of staff have too much access to data

Windows 10 hit ends of life in just over 2 weeks

Free Support for Windows 10 Ends in Just Two Weeks – Here’s What Your Business Needs to Know

Free Support for Windows 10 Ends in Just Two Weeks – Here’s What Your Business Needs to Know What would it take to bring your business to a halt?It’s not always a major...
Better passkey integration in windows

Passkeys will be better integrated in Windows

New hire? New security risk

New member of staff… new cyber security risk?

   When you bring someone new into the business, your first thought is usually about getting them set up to succeed. A laptop, email account, access to the right...
Microsoft to Introduce a Unified Naming System for Hackers

Microsoft to Introduce a Unified Naming System for Hackers

Have you ever tried to follow a crime documentary where the main suspect keeps changing names? It’s confusing—and that’s exactly what’s been happening in the world of...
Is your antivirus genuine?

Warning: That Antivirus Website Might Be a Scam

Warning: That Antivirus Website Might Be a Scam When you’re doing your best to protect your business, downloading antivirus software seems like the sensible thing to...
Notepad's Quiet

New Formatting Tools Coming to Notepad: What It Means for Your Business

New Formatting Tools Coming to Notepad: What It Means for Your Business When was the last time you wished Notepad could do a bit more—like make text bold or add a...
Still using Windows 10 ?

Still using Windows 10? Here’s why you need to act now

Imagine if one of your essential business tools suddenly became unsafe overnight. That’s exactly the risk many businesses are facing with Windows 10. Time is running...
Strengthen Your Password

Your Business is Only as Secure as Your Weakest Password

Let’s be honest—do you know for a fact that none of your team members are still using passwords like “12345” or “password123”? If you’re not 100% sure, you’re not...