TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home How to
How to avoid ransomware attacks?

How to avoid ransomware attacks?

Kerem GülenbyKerem Gülen
9 July 2021
in How to
Reading Time: 2 mins read
Share on FacebookShare on Twitter

Today we are going to show you how to avoid ransomware attacks. There are many types of computer attacks, but there is one that has become particularly important in recent years, ransomware attacks.

How to avoid ransomware attacks?

A group of cybersecurity experts talked about the topic on Reddit in a discussion hosted by the California-based Institute for Security and Technology (IST). At the event were Jen Ellis and Bob Rudis of cybersecurity firm Rapid7, Marc Rogers of IT services firm Okta, James Shank of IT security firm Team Cymru and Allan Liska of cybersecurity firm Recorded Future.

In summary we can highlight the following points:

Okta’s Rogers commented that in most cases, ransomware is a malicious application that takes control of the system before spreading laterally to any and all connected systems. If one computer becomes infected, it must be immediately disconnected from the network so the problem does not affect the rest, without obtaining files from it to copy to any other machine.

Rapid7’s Rudis said most ransomware attackers don’t need advanced tools to achieve their goals. Many times the problems start with human action, so it’s important to use multifactor authentication, patching, protection and monitoring, as well as remote infrastructure scanning and threat hunting for attackers. The team must be trained to identify threats and not fall into traps.

How to avoid ransomware attacks?
How to avoid ransomware attacks?

It is possible to make configurations on the servers to avoid blocking at scale. Configurations on Active Directory and SMB (Server Message Block) servers, for example, can be studied.

Liska commented that there is no single software solution that solves the problem of ransomware or other types of attacks. It is not solved with antivirus and it is solved with the right policies, people, and protocols to quickly identify and stop threats.

On the other hand, they recommend users:

  • To use strong passwords that are unique for each site or service we visit.
  • To have good backups on several different devices that are never connected at the same time.
  • To pay attention to the strange things that can happen, to suspicious links that we have clicked on unintentionally. From the time we click on a malicious link until the problem appears, it can take hours, so if we alert the security team to act sooner, we can save ourselves.

Now it is necessary to keep in mind that paying ransomware only fuels this type of action. In fact there are countries that are requiring organizations to report ransom payments and more regulation of the cryptocurrency industry, which will help to tackle the problem faster.

Tags: antivirusAvoidhow toprotectransomwarestep by stepvirus
ShareTweet
Kerem Gülen

Kerem Gülen

Kerem from Turkey has an insatiable curiosity for the latest advancements in tech gadgets and a knack for innovative thinking.With 3 years of experience in editorship and a childhood dream of becoming a journalist, Kerem has always been curious about the latest tech gadgets and is constantly seeking new ways to create.As a Master's student in Strategic Communications, Kerem is eager to learn more about the ever-evolving world of technology. His primary focuses are artificial intelligence and digital inclusion, and he delves into the most current and accurate information on these topics.

Related Posts

How to gain full control by jailbreaking iPhone and rooting Android

How to gain full control by jailbreaking iPhone and rooting Android

19 January 2026
How to create folders and add widgets on Android

How to create folders and add widgets on Android

19 January 2026
How to tell if your iPhone or Android phone is carrier unlocked

How to tell if your iPhone or Android phone is carrier unlocked

16 January 2026
How to apply screen protectors without air bubbles

How to apply screen protectors without air bubbles

16 January 2026
Please login to join discussion

LATEST

OpenAI appoints Barret Zoph to lead enterprise sales

Vimeo begins global staff reductions following Bending Spoons acquisition

LiveKit reaches unicorn status with $100 million in new funding

Substack launches TV app for Apple and Google platforms

Oracle and Silver Lake lead consortium in landmark TikTok US deal

JBL enters the practice amp market with AI-driven Stem separation technology

Google Search adds “Personal Intelligence” to AI Mode

Amazon set to launch second wave of corporate layoffs next week

Blue Origin’s New Glenn-3 mission to deploy AST SpaceMobile’s BlueBird 7

Anthropic redesigns hiring tests after Claude 4.5 “aces” human interview

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska