Smart Buyer
  • Shop On NeweggBusiness
  • Categories
    • Buying Guides
    • Components
    • DIY and How-to
    • Industry Trends
    • NetSec
    • Networking
    • Storage
    • Systems – PC & Laptop
    • Windows
  • About
  • Why NeweggBusiness?
  • Contact Us
Top Posts
PC Cooling: How to Set up Computer Case...
5 Ways to Stream from PC to TV...
How to Choose the Correct RAM Upgrade
How to Troubleshoot a PC Power Supply
Four Apps that Make Your Tablet a Second...
2019 Solid State Drive (SSD) Buying Guide
6 Reasons Your PC is Slow and How...
How-to Guide: Small Office Network Setup
Born in the USA: Computer Hardware Made in...
Computer Monitor Buying Guide 2019

Smart Buyer

  • Shop On NeweggBusiness
  • Categories
    • Buying Guides
    • Components
    • DIY and How-to
    • Industry Trends
    • NetSec
    • Networking
    • Storage
    • Systems – PC & Laptop
    • Windows
  • About
  • Why NeweggBusiness?
  • Contact Us
NetSec

Step One of Ransomware Removal: Educate Your Users

by Adam Lovinus January 27, 2017
by Adam Lovinus January 27, 2017 0 comment 7232 views

Step one to ransomware removal? Don’t fall victim in the first place. That starts with educating users. Not to be glib about it, but any security expert will tell you the weakest point in any network sits behind the keyboard.

If you’ve succumb to a ransomware attack, do not worry and more importantly, do not pay the ransom. There are plenty of ransomware removal tools that will help you out of this jam. The best tool at your disposal is a fresh backup of critical data—learn more on how to wipe out ransomware by restoring your backup copy.

Let’s step back a moment to talking about the best defense for ransomware: Educating your personnel.

Training users to identify phishing attempts strikes the heart of the number one cause of ransomware infections—clicking bad links and inadvertently handing over sensitive logon credentials.

A couple of great ransomware prevention resources for getting started

10 Training Tips for Conducting an Anti-Phishing solution: This article gets in depths about what to do, and what not to do, when coaching up your staff to sniff out malicious e-mails.

A quick summary of the article:

  • Don’t blindside users with training, but don’t be obvious about it either;
  • Get buy-in for the training from the top-down. If WikiLeaks taught us anything, it’s that the boss is as liable to get phished as anyone.
  • Beware how much clicking users have to do when going through training; remember, you’re coaching them NOT to click.
  • Make sure you’re tracking results. This way, you know if the training is effective. Be able to show that staff clicked XX% fewer bad links after training, or something along those lines.

The article linked above goes more in-depth about how to training your users to spot and avoid ransomware links.

Another great resource comes courtesy of a one-man IT dynamo named Rocky Lott, who manages small enterprise security for a company in North Texas.

As he realized last year, one downside about third-party user training programs is that they can get pricey. So Mr. Lott applied a bit of ingenuity and worked up his own free anti-ransomware user training. He talked me through how a company can do that for themselves in a straightforward, inexpensive manner here:

The resultant article How to Set Up Free Anti-Phishing Training guides users through this process. Topics covered include:

  • Why should a company should have a UTM device? Learn why site-to-site VPN and SSL-VPN support is critical so that remote workers can connect securely to office infrastructure.
  • How to effectively communicate new ransomware threats to users as they are discovered.
  • How the IT team measured the rate of users clicking on bad links, which were reduced three-fold as a result of anti-ransomware training.
  • The source code for the free deployment and tracking software.

Set up and configure hardware for ransomware prevention

User training is the critical first step, but it must be backed by tools to flag threats—learn more about data protection tools that your company can employ to thwart and quarantine ransomware and other forms of cybercrime.

  • Business-grade routers with stateful packet expansion (SPI) features are recommended for a company with 10-25 seats.
  • Next-generation firewalls or a UTM should guard a network for medium sized infrastructure; with these tools staff can enable strong spam filters and authenticate emails entering the domain using technology like Sender Policy Framework (SPF)
  • Host antivirus and antimalware software on server hardware so that updates are easily rolled out to all endpoints on the network; additionally make sure IT keeps operating systems and other software updated with the latest patches.
  • Use Active Directory features in server software to manage the use of privileged accounts, and be frugal with administrative access.

Final thoughts

A trained and vigilant user set is the first and most critical part of defending your company network against malicious takeovers of IT infrastructure. Ransomware prevention and removal requires smart tools and hardware configurations, and a smarter staff savvy that is able to spot suspicious links and avoid clicking on them.

Adam Lovinus

Adam Lovinus

A tech writer and Raspberry Pi enthusiast from Orange County, California.

More Posts - Website - Twitter - LinkedIn - Google Plus

Summary
Step One of Ransomware Removal: Educate Your Users
Article Name
Step One of Ransomware Removal: Educate Your Users
Description
Step one to ransomware removal? Don’t fall victim in the first place. That starts with education users. Not to be glib about it, but any security expert will tell you the weakest point in any network sits behind the keyboard.
Author
Adam Lovinus
HardBoiled | NeweggBusiness
HardBoiled | NeweggBusiness
category205
0 comment
0
FacebookTwitterGoogle +PinterestEmail
Adam Lovinus
Adam Lovinus

A tech writer and Raspberry Pi enthusiast from Orange County, California.

previous post
Lower Hardware Infrastructure Costs: Scale Up, Not Out
next post
Owning the IT Procurement Process: A Complete Guide

Related Posts

Remote Workforce Security: Tips and Best Practices

December 9, 2020

Aruba Instant On Wants to Simplify Your Small...

August 2, 2019

What is ‘Fileless’ Malware Found Inside Server Hardware?

October 4, 2018

How to Layer Antivirus Software Without Slowing Your...

May 21, 2018

Securing the Office Printer in Six Steps

May 14, 2018

How to Wipe a Hard Drive Securely

April 23, 2018

Six Router Features That Optimize Small Business Networks

March 21, 2018

Secure a Wireless Network with Access Point Isolation

March 7, 2018

How to Work Remotely While Keeping Secure and...

November 14, 2017

Tips for Ransomware Removal, Detection, and Prevention

November 1, 2017

What's your take? Cancel reply

Subscribe

  • 1

    PC Cooling: How to Set up Computer Case Fans

    February 11, 2021
  • 2

    5 Ways to Stream from PC to TV or Digital Display

    May 23, 2016
  • 3

    How to Choose the Correct RAM Upgrade

    April 28, 2015
  • 4

    How to Troubleshoot a PC Power Supply

    July 11, 2018
  • 5

    Four Apps that Make Your Tablet a Second Monitor

    January 9, 2018
  • 6

    2019 Solid State Drive (SSD) Buying Guide

    December 6, 2018
  • 7

    6 Reasons Your PC is Slow and How to Fix It

    February 28, 2019
  • 8

    How-to Guide: Small Office Network Setup

    December 20, 2018
  • 9

    Born in the USA: Computer Hardware Made in America

    September 27, 2018
  • 10

    Computer Monitor Buying Guide 2019

    January 4, 2019

Newegg + Business

How is this different from Newegg.com?

Why NeweggBusiness?
  • Facebook
  • Twitter
  • Linkedin
  • Email