{"id":25912,"date":"2021-07-13T17:34:07","date_gmt":"2021-07-13T15:34:07","guid":{"rendered":"https:\/\/www.tecsens.com\/what-to-do-to-fight-ransomware\/"},"modified":"2021-07-13T17:34:23","modified_gmt":"2021-07-13T15:34:23","slug":"what-to-do-to-fight-ransomware","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/","title":{"rendered":"What to do to fight Ransomware"},"content":{"rendered":"\n<p>It goes without saying that increasing and maintaining cyber security solutions is a must for all organisations and entities. But perhaps on which of them are the most appropriate. That&#8217;s why we&#8217;re going to tell you what to do to fight ransomware.<\/p>\n\n<p><strong>Backing up (BaaS) is perhaps one of the most fundamental actions to reduce the impact of such an attack. Having a contingency plan that includes backup is essential for the safety and security of any organisation. Many companies are still unaware of the need and potential of this &#8220;life-saving&#8221; solution.<\/strong><\/p>\n\n<p>But there are also many other necessary measures that can be taken to prevent, detect or mitigate the risks of a ransomware attack.<\/p>\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Measures to combat Ransomware:<\/strong><\/h2>\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong>Frequent backups (BaaS) <\/strong>of critical and relevant data. These should be isolated and without connectivity to other systems, to prevent access from infected devices.<\/li><\/ul>\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/en\/enterprise-cloud-services\/cloud-backup\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Cloud Backup<\/strong><\/a><\/div>\n<\/div>\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ul class=\"wp-block-list\"><li><strong>Keep all applications and operating system up to date<\/strong> with the latest versions to avoid security holes.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Have the perimeter firewall correctly configured.<\/strong> Avoiding having services published to the internet and always up to date with those IP whitelists allowed for the organisation.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Have anti-spam systems in e-mail <\/strong>and implement high filtering, which reduces the chances of infection through massive e-mail ransomware campaigns.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Create security policies in the operating system,<\/strong>to prevent the activity of files from directories used by the ransomware (App Data, Local App Data, etc.). With the help of tools such as AppLocker, Cryptoprevent or CryptoLocker Prevention Kit.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Implement an IDS\/IPS system to detect and scan for possible attacks<\/strong> by blocking malicious traffic.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Use deep defense tools such<\/strong> as EMET, which allows to mitigate the possible entry of exploits.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Do not use accounts with administrator privileges.<\/strong><\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Maintain the access control list of the network mapping unit.<\/strong> In case of infection, all mapped network drives on the victim&#8217;s device will be encrypted. Restricting write access to the network will partially mitigate the impact.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Use of javascript blockers for the browser,<\/strong>with which to prevent the execution of scripts that may pose a threat to the device. This reduces the chances of infection via web pages.<\/li><\/ul>\n<ul class=\"wp-block-list\"><li><strong>Have visible the extensions of the files,<\/strong> to be able to identify possible executable files that could pretend to be other types of files.<\/li><\/ul>\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/en\/business-internet-services\/computer-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Cybersecurity tools<\/strong><\/a><\/div>\n<\/div>\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>All of these measures are essential to reduce the chances of a ransomware attack, but perhaps one of the most important is awareness and knowledge. One of the most common attack vectors for this technique is phishing, which uses social engineering to deceive users and carry out attacks.<\/p>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>It goes without saying that increasing and maintaining cyber security solutions is a must for all organisations and entities. But perhaps on which of them are the most appropriate. That&#8217;s why we&#8217;re going to tell you what to do to fight ransomware. Backing up (BaaS) is perhaps one of the most fundamental actions to reduce [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":25735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[503,504],"tags":[392,382],"class_list":["post-25912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-en","category-it-security","tag-cybersecurity","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What to do to fight Ransomware - Tecsens -<\/title>\n<meta name=\"description\" content=\"Increasing and maintaining cyber security solutions is necessary for businesses. We&#039;ll tell you what to do to fight ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do to fight Ransomware - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"Increasing and maintaining cyber security solutions is necessary for businesses. We&#039;ll tell you what to do to fight ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-13T15:34:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-13T15:34:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"What to do to fight Ransomware\",\"datePublished\":\"2021-07-13T15:34:07+00:00\",\"dateModified\":\"2021-07-13T15:34:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/\"},\"wordCount\":433,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"Security\"],\"articleSection\":[\"Consulting\",\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/\",\"name\":\"What to do to fight Ransomware - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg\",\"datePublished\":\"2021-07-13T15:34:07+00:00\",\"dateModified\":\"2021-07-13T15:34:23+00:00\",\"description\":\"Increasing and maintaining cyber security solutions is necessary for businesses. We'll tell you what to do to fight ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"What to do to fight Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do to fight Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to do to fight Ransomware - Tecsens -","description":"Increasing and maintaining cyber security solutions is necessary for businesses. We'll tell you what to do to fight ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"What to do to fight Ransomware - Tecsens -","og_description":"Increasing and maintaining cyber security solutions is necessary for businesses. We'll tell you what to do to fight ransomware.","og_url":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/","og_site_name":"Tecsens","article_published_time":"2021-07-13T15:34:07+00:00","article_modified_time":"2021-07-13T15:34:23+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"What to do to fight Ransomware","datePublished":"2021-07-13T15:34:07+00:00","dateModified":"2021-07-13T15:34:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/"},"wordCount":433,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg","keywords":["Cybersecurity","Security"],"articleSection":["Consulting","IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/","url":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/","name":"What to do to fight Ransomware - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg","datePublished":"2021-07-13T15:34:07+00:00","dateModified":"2021-07-13T15:34:23+00:00","description":"Increasing and maintaining cyber security solutions is necessary for businesses. We'll tell you what to do to fight ransomware.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/07\/TECSENS_Que-hacer-para-luchar-contra-el-Ransomware_post-14-scaled.jpg","width":2560,"height":1442,"caption":"What to do to fight Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/what-to-do-to-fight-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"What to do to fight Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/25912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=25912"}],"version-history":[{"count":7,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/25912\/revisions"}],"predecessor-version":[{"id":25919,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/25912\/revisions\/25919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media\/25735"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=25912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/categories?post=25912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/tags?post=25912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}