Skip to main content
Tech Radar
  • Tech Radar Pro
  • Tech Radar Gaming
Tech Radar Pro TechRadar IT Insights for Business
Subscribe
RSS
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
Technology Magazines
Technology Magazines
Why subscribe?
  • The best tech tutorials and in-depth reviews
  • Try a single issue or save on a subscription
  • Issues delivered straight to your door or device
From$12.99
View
  • News
  • Reviews
  • Features
  • Expert Insights
  • Website builders
  • Web hosting
  • Security
Trending
  • Best standing desk deals
  • Best cloud storage 2023
  • What is Microsoft Teams?
  • Expert Insights

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

  1. Home
  2. Features
  3. Pro
Supported

5 steps to prevent a ransomware attack

By Michael Graw
published 9 September 2022

Preventing a ransomware attack is easier and cheaper than managing the consequences

In Association with

Perimeter 81 logo
Ransomware
(Image credit: Shutterstock)

Ransomware attacks can be enormously costly for businesses. In 2021, the average ransom that businesses paid to recover their data was more than $800,000. On top of that, it can take years for companies to recover from the negative reputational impact of losing data because of a ransomware attack.

The good news is that by taking a few proactive measures, you can protect your organization from most malicious attempts to gain access to your network. 

In this article, we’ll highlight five key steps companies can take to prevent a ransomware attack.

Protect your business with Perimeter 81

Protect your employees and network from ransomware attacks with Zero Trust. Enforce least privilege access policies across your organization in minutes based on user identity to safeguard all critical assets. Protect your business with Perimeter 81 - one of TechRadar’s top choices for Zero Trust providers. 

View Deal

1. Secure your email

Phishing attacks are one of the most common ways cybercriminals break into company networks. If an attacker can convince an employee to click on a link or download an attachment, they can often gain a foothold on your network that can then be used to deploy ransomware.

Companies can reduce the success rate of phishing attacks by educating employees about how to avoid online phishing. However, even the most security-conscious employees slip up from time to time, so it’s important to have automated security systems in place as well.

For example, your company could install a malware scanner within your email gateway. This scanner detects suspicious emails before they reach an employee’s inbox, and automatically disables links and attachments.

Another option is to set up a virtual sandbox that runs automatically whenever employees click on links in emails. This sandbox is isolated by a firewall from the rest of your company’s network, so any malware that may be contained in the link can’t spread.

Yet, while phishing is the primary vector for ransomware attacks, it’s not the only one. Out-of-date software can render your network vulnerable too, so make sure your software is regularly updated to the newest version, and has the latest security updates.

2. Install antivirus software

Antivirus software can be effective at preventing less sophisticated ransomware attacks. The best antivirus software will recognize most known ransomware strains and eliminate them from your network before they can do damage.

However, antivirus software isn’t a standalone solution for preventing ransomware attacks. More knowledgeable cybercriminals use more sophisticated methods to get around antivirus software and firewalls once they’re inside your network. So, antivirus software primarily should be thought of as a tool for keeping your company from becoming low-hanging fruit for cybercriminals.

3. Monitor network activity

One of the best ways to prevent ransomware and other cyberattacks from disrupting your organization is to implement identity and access management (IAM) across your network. Identity management software assigns a unique digital ID to each employee, and enables your IT team to track activity on your organization’s network.

This is important because cybercriminals often spend months inside company networks before they launch ransomware attacks. This time is spent probing network defenses, and gaining access to critical systems, potentially including your data backups. 

With identity management software, your IT team can identify suspicious activity long before a cybercriminal has a chance to launch a full-scale attack. For example, your IT team may notice a suspicious after-hours login attempt by an employee into parts of the network they don’t usually access. Once the IT team knows there’s an intruder, they can take steps to isolate the attacker and expel them from the network.

Identity and access management systems also limit which parts of a network each employee has access to. This makes it more difficult for attackers to, for example, compromise the passwords of an administrative employee and then break into critical IT infrastructure.

4. Enable multifactor authentication

Multifactor authentication (or two-factor authentication) is another important tool businesses can deploy to prevent ransomware attacks. This type of authentication requires both a password and a one-time passcode that’s sent to your email or smartphone to log into accounts.

This type of authentication is effective because it limits attackers’ ability to spread through your organization’s network. Even if they get into your network and compromise an employee’s passwords, they cannot access that employee’s accounts without triggering an authentication request. That request will immediately alert the employee that their credentials have been compromised. Once that happens, your IT team can find the attacker and isolate them within the network.

It’s also good practice to change passwords frequently. If your company uses a business password manager, your IT team can require that employees change their passwords on a monthly basis. This won’t necessarily stop attackers who have already made it into your network, but it will make it more difficult for them to move through the network quickly.

5. Maintain secure backups

Establishing and maintaining data backups won’t stop a ransomware attack from happening. However, if you have backups available, you can significantly mitigate the damage from an attack. In fact, you may be able to restore most or all of your lost data from backups without having to pay the ransom.

Cybercriminals know that companies rely on backups to avoid the worst effects of their ransomware attacks, so work to compromise backups when infiltrating your network.

It’s crucial that your backups be kept separate from your main network, and that only a few IT employees have access to them. Cloud backup software is secure enough to withstand most attacks, and enables you to back up your data frequently. Still, your company should always keep offline copies of critical data as an additional backup option.

Conclusion

Ransomware attacks can be financially devastating for companies, but being proactive about digital security can minimize the chances of an attack succeeding. Companies must limit opportunities for cybercriminals to get into their networks, and make it difficult for attackers to spread if they do gain a foothold. As a last resort, companies should keep secure backups that can be used to restore data following a ransomware attack.

TechRadar created this content as part of a paid partnership with Perimeter81. The contents of this article are entirely independent and solely reflect the editorial opinion of TechRadar.

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
Michael Graw
Michael Graw
Social Links Navigation

Michael Graw is a freelance journalist and photographer based in Bellingham, Washington. His interests span a wide range from business technology to finance to creative media, with a focus on new technology and emerging trends. Michael's work has been published in TechRadar, Tom's Guide, Business Insider, Fast Company, Salon, and Harvard Business Review. 

More about pro
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.

How increased connectivity could compromise energy suppliers

Spyware

Gamers are being targeted by more dangerous malware

Latest
A computer being guarded by cybersecurity.

Amazon wants to be the provider of your cybersecurity response tools

See more latest ►
Most Popular
Diablo 4 devs promise “disruptions” that’ll break the RPG mould

By Cat BussellMay 30, 2023

Diablo 4 feels “like a painting” thanks to its classical influences

By Cat BussellMay 30, 2023

This foldable OLED TV was printed by inkjet and it could be the future of 8K

By Amelia SchwankeMay 30, 2023

Does screen time affect how well you sleep?

By Sarah FinleyMay 30, 2023

The advantages of building your own PC for your creative projects

By Christian GuytonMay 30, 2023

5 reasons why you need a 4K Blu-ray player

By Al GriffinMay 29, 2023

Missing Succession already? Here are 6 great family sagas to watch on Max, Hulu and more

By Tom GoodwynMay 29, 2023

Cloudflare CEO: Why mixing cloud services makes for better overall performance

By Abigail OpiahMay 29, 2023

How bright are OLED TVs – and why does it matter?

By Henry St LegerMay 28, 2023

Disney Plus cancellations and WWDC 2023 invites – The TechRadar Tech Quiz

By Hamish HectorMay 28, 2023

The Little Mermaid's Alan Menken picks his favorite new song from the remake

By Laura MartinMay 28, 2023

  1. Audio-Technica Sound Burger playing vinyl, on white background
    1
    Audio-Technica’s famed Sound Burger decks finally hit shelves – and seemingly sell out
  2. 2
    The first 110-inch 16K TV screen is here to make your projector feel inadequate
  3. 3
    Possibly the worst Microsoft Teams update is rolling out now
  4. 4
    Experts warn that AI is an extinction-level threat, and I wish they'd stop scaring us
  5. 5
    Quordle today - hints and answers for Wednesday, May 31 (game #492)
  1. A young AI-created humanoid touches a robot in The Creator
    1
    The Creator looks like The Last of Us, Terminator, and Star Wars rolled into one
  2. 2
    New iPhone 15 Pro Max specs leak hints at what's not changing this year
  3. 3
    Apple shuts My Photo Stream on July 26, so make sure you don't lose your photos
  4. 4
    The best recipes in Zelda Tears of the Kingdom
  5. 5
    The iPhone and Galaxy S23 Ultra prove money is no object for smartphone buyers
Technology Magazines
  • ●
Technology Magazines
  • The best tech tutorials and in-depth reviews
From$12.99
View

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.