How to Prevent Ransomware Attacks in Your Business

Ransomware Attacks

In order to help your business to prevent ransomware, it is important to understand how these attacks can penetrate your organisation’s security and what behaviours allow the attackers to break through your defences.

The bigger Ransomware attacks that you see reported in the press are likely to be targeted, where an active attacker is targeting the business on purpose for financial gain. There are a lot of automated Ransomware attacks just waiting to happen. From an email being sent attempting to get a recipient to click a link, to compromised websites waiting to be viewed by a user.

This article will explain some of the more common infection and attack methods to help you understand how these attacks take place and restrict the impact on your business. Ransomware attacks have evolved, and continue to evolve, and the process for executing is straightforward, any business can be a victim, even those with excellent perimeter and endpoint protection.

Focus on prevention, but also remediation. Best will in the world a user will click on a link, or visit a website, any code being exploited needs to be quickly identified and swiftly dealt with.

 

Exploit Kits

These are typically run on compromised websites which your user could be browsing. The website itself looks perfectly OK, but perhaps a third-party advert or piece of code has been hacked and the exploit kit uploaded.

When the user browses the site, a sophisticated toolkit scans your computer for vulnerabilities to exploit.

This code is hidden on the site, which is often in an online ad (malvertisement) and then, hidden from yourself, it will redirect to a site where the exploit kit is then run, silently. This can then initiate a drive-by download of the payload and then executed, your computer infected and then files will be held for ransom.

 

Malicious Email Attachments

This is where an attacker will craft an email, make it look at real as possible to the recipient, and write it in such a way to sail through any email filter. It’s likely to come from HR, or your IT department, and it will contain a malicious file. This may be a Word or PDF document and the content could be another link in the file or a script that’s waiting for you to click “Run” on. Once it’s opened or clicked, the payload is then downloaded, the system is infected and then files and folders are encrypted and waiting for you to pay the ransom.

 

Malicious Email Links

This is similar to the attachments scenario above, where URLs are sent directly in the body of the email. Once again the emails are cleverly written, usually with excellent spelling and grammar, and written to be approved by any email filter.

Once the link is clicked, normally the payload is downloaded and executed and potentially files will start to encrypt.

Past Blogs

Copilot connects Microsoft and Google

Microsoft Copilot Now Connects Gmail and Outlook—What This Means for Your Business

If you’ve ever found yourself switching between Gmail, Outlook, and countless browser tabs just to track down an email or check your diary, you’re not alone. For many...
New Ransomware Warning

New Ransomware Alert: What UK Businesses Should Do

Don't Waste Time Searching Through Settings

Windows 11’s New AI Agent: A Smarter Way to Tackle Settings

More accessibility Features in Windows 11

Windows 11’s New Accessibility Tool: What It Means for Your Business

Outlook flags your important email

Outlook will flag your most important emails

Can your staff access too much?

Half of staff have too much access to data

Windows 10 hit ends of life in just over 2 weeks

Free Support for Windows 10 Ends in Just Two Weeks – Here’s What Your Business Needs to Know

Free Support for Windows 10 Ends in Just Two Weeks – Here’s What Your Business Needs to Know What would it take to bring your business to a halt?It’s not always a major...
Better passkey integration in windows

Passkeys will be better integrated in Windows

New hire? New security risk

New member of staff… new cyber security risk?

   When you bring someone new into the business, your first thought is usually about getting them set up to succeed. A laptop, email account, access to the right...
Microsoft to Introduce a Unified Naming System for Hackers

Microsoft to Introduce a Unified Naming System for Hackers

Have you ever tried to follow a crime documentary where the main suspect keeps changing names? It’s confusing—and that’s exactly what’s been happening in the world of...