Ransomware can prevent you from accessing your computer and encrypt your files so you can’t use them. [1] X Research source Routinely backing up your files on a secured cloud service or external hard drive is your best defense. If you use an external drive, go offline during backups and keep the drive disconnected from your computer when you’re not backing up files. Install antivirus and anti-ransomware utilities, keep them updated, and enable automatic Windows updates. For the best shot at staying secure, avoid opening suspicious links or attachments, and make sure the websites you visit are secure.
Steps
Method 1
Method 1 of 4:
Backing up Your Files
-
Invest in a removable drive. When used strategically, an external hard drive is among the most effective backup tools at your disposal. Only plug it into your machine when you back up files, and go offline during backups. [2] X Research source
- If you keep your external drive connected to the computer while it’s online, it could become hijacked along with your computer during a ransomware attack.
-
Store your files with a secure cloud-storage service. If you store your files with a service, like Carbonite, Dropbox, or OneDrive, you’ll most likely be able to restore any files hijacked during a ransomware attack. Just make sure your cloud storage service allows you to access earlier versions of your files, so you can recover the files as they were prior to the ransomware attack. [3] X Research source
- Dropbox, for example, allows you to track changes made to all files within 30 days.
Advertisement -
Back up your files regularly. If you don’t already have one, create a consistent backup routine. If you work with important files every day, back them up on an external drive or with a cloud storage provider daily. [4] X Research source
- If you save copies of all of your files frequently, you won’t have to worry about losing them during a ransomware attack. [5]
X
Expert Source
Mitch Harris
Consumer Technology Expert Expert Interview
Advertisement - If you save copies of all of your files frequently, you won’t have to worry about losing them during a ransomware attack. [5]
X
Expert Source
Mitch Harris
Method 2
Method 2 of 4:
Securing Your System
-
Install a dedicated ransomware blocker. In addition to an antivirus service, you should install a utility that specifically protects your machine against ransomware. [6] X Expert Source Mitch Harris
Consumer Technology Expert Expert Interview Two well-reviewed free options are Cybereason RansomFree and Malwarebytes Anti-Ransomware. [7] X Research source- Recommended paid versions include Bitdefender Antivirus Plus 2017 and Webroot SecureAnywhere Antivirus. A one year subscription for each service costs less than $20 (US). [8] X Research source
- Windows Defender comes with Controlled Folder Access which blocks untrusted apps from writing to protected folders, including system directories and the "Music", "Videos", "Documents", "Pictures", and "Desktop" folders.
-
Update your security software regularly. Your operating system's security suite, antivirus utility, and ransomware blocker won’t be effective unless you update them regularly. [9] X Research source Nearly all ransomware attacks have targeted Windows, but a few have affected macOS. Regardless of your machine's operating system, install updates whenever they're offered. [10] X Research source
- If you use Windows, click on the Control Panel and make sure your Windows automatic updates are enabled. [11]
X
Expert Source
Mitch Harris
Consumer Technology Expert Expert Interview - If your machine runs macOS, go to System Preferences and select the App Store icon to modify your update settings. You can opt to automatically install system updates alone or auto-update apps as well. [12]
X
Expert Source
Mitch Harris
Consumer Technology Expert Expert Interview
- If you use Windows, click on the Control Panel and make sure your Windows automatic updates are enabled. [11]
X
Expert Source
Mitch Harris
-
Use a pop-up blocker. Ransomware hackers can embed malware in advertisements on websites you’d otherwise trust. Enable a pop-up blocker on whichever browser you use to decrease your risk of clicking on a malicious advertisement. [13] X Research source
-
Keep your browser updated. Install your browser’s updates and patches whenever they’re released to keep it as secure as possible. [14] X Expert Source Mitch Harris
Consumer Technology Expert Expert Interview Like your operating software, your browser periodically releases updates that contain security patches. [15] X Research source- Your browser's pop-up blocker and unprotected website detector need to be updated in order to be effective.
Advertisement
Method 3
Method 3 of 4:
Adopting Safer Internet Practices
-
Avoid opening suspicious emails and links. Ransomware typically spreads through malicious links or attachments sent via email. Stay alert, and never open an email, attachment, or URL that seems suspicious. [16] X Research source
- For the best chance at staying secure, just don’t open anything from a company you don’t do business with or from someone you don’t know. If you have any doubts, don’t click it.
- If you get an email with a subject such as “You’ll never believe this!” from a friend, you should send them a text or phone call to see if they actually meant to send the email.
-
Check the file extension before opening an attachment. Before opening any attachment, you should make a habit of checking its file extension, which is the .doc, .pdf, or other abbreviation that’s listed after the filename. Before opening an attachment, right click on it and select the option to scan for malware from the drop-down menu. [17] X Research source
- Avoid opening .exe files, or executable files, since they can run a ransomware application. If you do need to exchange .exe files legitimately, share them using a cloud service or in a password-protected ZIP file.
-
Avoid unprotected websites. Whenever you visit a website, make sure you see “https” at the beginning of its address. The “s” stands for secure, and indicates that the website is encrypted. [18] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source
- If your session isn’t encrypted, any account that you sign into could be vulnerable. To protect your information, enter your passwords only into encrypted pages, avoid staying permanently signed into accounts, and use a different password for each account. [19] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source
-
Disconnect immediately if you’ve opened a suspicious file. If you’ve clicked on something suspicious but a ransomware screen hasn’t yet appeared, disconnect from Wi-Fi or unplug your wired connection immediately. Encrypting files to hijack them takes some time, so if you act quickly you might be able to stop the ransomware application before it finishes. [20] X Research source
- Disconnecting your machine can also help protect other computers on your network. In addition to disconnecting the infected computer, you should disable Wi-FI and Bluetooth on all machines within your network. [21] X Research source
Advertisement
Method 4
Method 4 of 4:
Removing Ransomware
-
1Try using your computer's antivirus. Your antivirus may be able to remove the ransomware before it progresses to the point where it has deleted your files. Just note that if you got ransomware, your files are likely inaccessible even if you remove it.
-
2Restore your computer to an earlier point. Time Machine on Mac and File History on Windows can help reverse damage caused by ransomware.
- Report the address to local authorities. They can seize the funds and return the lost money back to you, though this may be unlikely if you use a prepaid card.
-
3Reset your computer . You will lose all of the files, but you will no longer have the ransomware on your computer.Advertisement
Expert Q&A
Search
-
QuestionHow do I avoid ransomware?Mitch Harris is an IT Expert based in the San Francisco Bay Area. Mitch runs his own IT Consulting company called Mitch the Geek, helping individuals and businesses with home office technology, data security, remote support, and cybersecurity compliance. Mitch earned a BS in Psychology, English, and Physics and graduated Cum Laude from Northern Arizona University.Keep your operating system and software up-to-date. Also, pay close attention to anything you install, as well as any prompts that pop up on your screen.
-
QuestionHow do I avoid ransomware on the web?Mitch Harris is an IT Expert based in the San Francisco Bay Area. Mitch runs his own IT Consulting company called Mitch the Geek, helping individuals and businesses with home office technology, data security, remote support, and cybersecurity compliance. Mitch earned a BS in Psychology, English, and Physics and graduated Cum Laude from Northern Arizona University.Don't respond to alerts requesting a phone number or asking to install software. Most of these are bogus.
-
QuestionAre ads in my security software harmful?Mitch Harris is an IT Expert based in the San Francisco Bay Area. Mitch runs his own IT Consulting company called Mitch the Geek, helping individuals and businesses with home office technology, data security, remote support, and cybersecurity compliance. Mitch earned a BS in Psychology, English, and Physics and graduated Cum Laude from Northern Arizona University.Probably not. If you're relying on free security software, the company is probably making money through other means, like advertising. Don't try hide from these ads—the better they know what you like, the more accurate (and less annoying) your ads will be. Learning how to deal with legitimate ads and how to avoid illegitimate ads is an excellent way to avoid malware.
Ask a Question
200 characters left
Include your email address to get a message when this question is answered.
Submit
Advertisement
Warnings
- If you are ever infected with Ransomware, don't pay the ransom. There is no grantee that doing so will get your files back, and it just encourages hackers to keep making more ransomware0. [22] X Trustworthy Source Internet Crime Complaint Center Online reporting system for individuals to inform the FBI about Internet-related criminal activity Go to source It is also illegal in the United States. [23] X Research sourceThanks
Advertisement
References
- ↑ https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx
- ↑ https://www.wired.com/2016/05/4-ways-protect-ransomware-youre-target/
- ↑ https://www.cnet.com/how-to/wannacry-ransomware-how-to-protect-your-pc/
- ↑ http://money.cnn.com/2017/05/13/technology/ransomware-attack-protect-yourself/
- ↑ Mitch Harris. Consumer Technology Expert. Expert Interview
- ↑ Mitch Harris. Consumer Technology Expert. Expert Interview
- ↑ https://www.cnet.com/how-to/wannacry-ransomware-how-to-protect-your-pc/
- ↑ http://www.pcmag.com/roundup/353231/the-best-ransomware-protection
- ↑ http://money.cnn.com/2017/05/13/technology/ransomware-attack-protect-yourself/
- ↑ https://www.welivesecurity.com/2017/02/22/new-crypto-ransomware-hits-macos/
- ↑ Mitch Harris. Consumer Technology Expert. Expert Interview
- ↑ Mitch Harris. Consumer Technology Expert. Expert Interview
- ↑ https://www.wired.com/2016/05/4-ways-protect-ransomware-youre-target/
- ↑ Mitch Harris. Consumer Technology Expert. Expert Interview
- ↑ https://www.wired.com/2016/05/4-ways-protect-ransomware-youre-target/
- ↑ https://www.wired.com/2016/05/4-ways-protect-ransomware-youre-target/
- ↑ https://www.welivesecurity.com/2013/12/12/11-things-you-can-do-to-protect-against-ransomware-including-cryptolocker/
- ↑ https://www.consumer.ftc.gov/articles/0014-tips-using-public-wi-fi-networks
- ↑ https://www.consumer.ftc.gov/articles/0014-tips-using-public-wi-fi-networks
- ↑ https://www.welivesecurity.com/2013/12/12/11-things-you-can-do-to-protect-against-ransomware-including-cryptolocker/
- ↑ https://www.wired.com/2016/05/4-ways-protect-ransomware-youre-target/
- ↑ https://www.ic3.gov/PSA/2016/PSA160915
- ↑ https://arstechnica.com/tech-policy/2020/10/paying-ransomware-demands-could-land-you-in-hot-water-with-the-feds/
About this article
Thanks to all authors for creating a page that has been read 15,361 times.
Advertisement