Malware and ransomware Prevention Steps
Avoiding malware and ransomware prevention steps ate simple actions we can all take to avoid exploits and file-encryption exploits. THese steps are not exhaustive or exhausting for our users. They do help. Sign up for our newsletter for new tips, tricks and special offers.
- Use Microsoft Office 365 and Exchange online or GMail’s anti-spam systems to their fullest.
- Filter out all the potentially harmful incoming messages by not subscribing to news letters.
- Only allow specific file extension in your email by enforcing restrictions. Block everything except permitted extensions like, docs, txt, xlxs, zip, etc. Block these attachments
- .js
- .vbs
- .docm
- .hta
- .exe
- .cmd
- .scr
- .bat.
- Treat all files received in messages with caution! If you were not expecting it talk to the sender first. This requires mindfulness, because it’s easy to use our habit energy an just click to open like a kid at Christmas.
- Include vssadmin.exe in a Software Restriction policy or better, AppLocker so that malware and ransomware is unable to obliterate all Shadow Volume Copies of your files
- Use an effective anti-virus and anti-malware solutions. We recommend a layered approach. TSI BitDefender, MalwareBytes and Microsoft Windows Defender work really well together. There are other security tools that identify malware and ransomware. Tekmar Solutions is always studying and testing the best in class products.
- Keep a hardware firewall in place and active at all times, as well as running the latest version of Microsoft Windows and it firewall.
- Back up your files regularly with TSI Managed Backup. Our ITB platform incorporates the best in class products seemlessly giving you local and cloud backup.
- It provides local fast recovery
- Our system provides catastrophic and file level restore that is regularly tested.
- It is all part of a comprhensive disaster recovery model.
- A malware and ransomware exploit can’t always be avoided. It’s constantly changing organized crime. However the long term damage is always avoided with a layerd security approach.
Not sure what to do. Schedule a technology strategy session.