1. Use security software.
Install and use a trusted security program, preferably one that offers more than just antivirus features.
2. Keep your security software up to date.
New ransomware attacks appear all the time. Make sure your security software is up-to-date so that it can help protect you against cyberattacks.
3. Update your operating system and other software.
Software updates are released improvements of the program. They include features to protect you from newly discovered security vulnerabilities that could be exploited by ransomware attackers.
4. Don’t open email attachments.
Email is used as one of the main methods to spread ransomware. Avoid opening emails and attachments from unfamiliar or untrusted sources. Be aware, attackers more than often use the names of your colleagues to make their own ransomware emails look trustworthy to you.
5. Back up important data to an external hard drive.
Attackers can gain leverage over you by encrypting your valuable files and making them inaccessible. If you have backup copies, the hacker no longer holds the upper hand. Backup files allows you to restore your files once the ransomware has been erased. Make sure that your backups are appropriately protected or stored offline so that attackers can’t access them.
6. Use cloud services.
Many cloud services store previous versions of your documents, allowing you to back up to an earlier version. This allows you to go back in your document, and restore it to how it was before a potential attack.
7. Don’t open email attachments.
Sorry, this is an important one, so we had to put it up one more time...
Always ask your IT-department or IT-manager if you have any questions. They are trained experts in these fields. Some of these points may also be their responsibility, and not yours. So make sure to go through the steps with them so that you know which responsibilities lies on you.
Read more about cyber threats: