How To Block Ransomware Attacks

Block ransomware is a type of malicious software (malware) that criminals use to encrypt data on your computer, or to otherwise lock you out, and then insist you pay them money (a ransom) to regain access to your data. In order for a ransomware attack to be successful, the user must take an action to install the malware on their computer. The best way to block ransomware is to ensure that you never take an action that installs malware, as described in the following sections.

Clicking on Unverified Links

Always avoid clicking on links in emails or on websites where you are unsure that the link is legitimate. Once you click a malicious link it can set off a download process that installs malware on your computer.

Opening Unverified Email Attachments

Another way that your computer can become infected with ransomware is through attachments in emails. Opening an email attachment can also execute code that installs malware on your computer. You should only ever open attachments in emails from senders that you trust. You should also check that the email address is correct for the person that is sending it; sometimes malicious actors create email addresses that mimic legitimate senders to entice you to click on attachments. If you are unsure, always check with the sender first before opening attachments.

Download only from Trusted Sites

Downloading files from unknown websites is another way that you can install malware on your computer. You should always use trusted sites when downloading and ensure that they have a ‘https:/’ prefix which means that the site is secure. Once again, malicious actors often mimic legitimate site addresses in an attempt to get you to download malware.

Use Mail Server Filtering

Some mail programs offer scanning and filtering of email messages to ensure that they do not contain malware. This is a good way of protecting yourself and significantly reduces the chances of an infected file being installed on your computer.

Avoid Giving Personal Information Over the Phone

Criminals often contact the targets of their attack in a bid to get personal information from them so that they can use it to make their attacks seem more legitimate. You should never give personal information to unknown callers; if the call is purportedly from a company you deal with, call the company directly to verify that it is a legitimate request.

Never Plug in an Unfamiliar USB Stick

Criminals have been known to give away infected USB devices, or leave them where they can be found, so that people plug them into their computer. Once you do this the installation process happens automatically and you could be infected.

Scroll to Top