Four steps you can take to lower the risk of a ransomware attack
With the ever-increasing frequency in attacks, it's likely many of us will be targeted by ransomware


Because it's relatively inexpensive to develop and launch ransomware and a single item of crypto-malware can generate massive revenue the volume of this type of attack is increasing.
When it comes to dealing with the risk of a ransomware attack, you can choose either to cross your fingers and hope for the best, or take active steps to mitigate the risks of being attacked and the possible consequences.
With the ever-increasing frequency in attacks, it's likely that many of us will be targeted at some stage, so here are some steps you can take to both reduce the likelihood of being affected by ransomware, and lessen the impact should the worst happen.
Back up data regularly
Almost all businesses will already have data back up policies. However, it's essential to back up data onto an offline backup subsystem rather than just copying files to another live' system on your corporate network, otherwise ransomware will be able to affect your backup files. A back up and disconnect' policy is worth considering, so that data isn't being copied onto a permanently connected file server.
Personal users tend to back up on a more infrequent basis, so it's important to establish a regular backup routine across all devices. It's currently impossible to decipher files properly encrypted by modern crypto-malware, so the only way to save your data from a successful ransomware attack is through regular file backups.
Use a reliable security solution
There are a wide range of antivirus solutions available for both business and personal use; see our recommendations for the best antivirus tools available this year.
For businesses, an anti-ransomware solution that's able to protect shared folders should also be considered. Some solutions leave hosts inside the security perimeter unprotected, meaning that any cryptor penetrating via email or a vulnerable browser will also affect shared folders on corporate servers. Under this scenario, only server-side security software can defend the data.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Whichever tool you choose, it should be turned on at all times, with as many security layers enabled as possible.
Always keep software updated on all the devices you use
Ransomware doesn't just affect PCs. Security software needs to be able to protect Mac computers, virtual machines and mobile devices, as well as email systems. Keeping this software up to date is a vital part of remaining secure, as updates are regularly released to combat new strains of malware.
Although it can be tempting to skip app and security updates and install them later, it's easy to forget and updates for some apps contain vital patches against vulnerabilities which could be exploited by cyber criminals. Resist the temptation to ignore the update warnings to ensure device apps are as up-to-date as possible.
Educate employees and IT teams
People are often the most vulnerable element. Businesses should teach their employees about IT security basics, including raising awareness of phishing and spear-phishing and the security implications of opening any email attachment that looks suspicious.
There's no such thing as being over-careful; even if an email looks like it's from a trusted source, it's worth checking with a simple phone call to the sender if there are unexpected attachments or links present.
Esther is a freelance media analyst, podcaster, and one-third of Media Voices. She has previously worked as a content marketing lead for Dennis Publishing and the Media Briefing. She writes frequently on topics such as subscriptions and tech developments for industry sites such as Digital Content Next and What’s New in Publishing. She is co-founder of the Publisher Podcast Awards and Publisher Podcast Summit; the first conference and awards dedicated to celebrating and elevating publisher podcasts.
-
New chapter, same partners: Keeping the channel aligned with change
Industry Insights How to maintain strong channel partnerships amid evolving strategies and market change
-
Palo Alto Networks snaps up CyberArk in identity security push
News The acquisition marks the latest in a string for Palo Alto Networks
-
The Scattered Spider ransomware group is infiltrating Slack and Microsoft Teams to target vulnerable employees
News The group is using new ransomware variants and new social engineering techniques - including sneaking into corporate teleconferences
-
Hackers breached a 158 year old company by guessing an employee password – experts say it’s a ‘pertinent reminder’ of the devastating impact of cyber crime
News A Panorama documentary exposed hackers' techniques and talked to the teams trying to tackle them
-
The ransomware boom shows no signs of letting up – and these groups are causing the most chaos
News Thousands of ransomware cases have already been posted on the dark web this year
-
Everything we know about the Ingram Micro cyber attack so far
News A cyber attack on Ingram Micro severely disrupted operations and has been claimed by the SafePay ransomware group.
-
A prolific ransomware group says it’s shutting down and giving out free decryption keys to victims – but cyber experts warn it's not exactly a 'gesture of goodwill'
News The Hunters International ransomware group is rebranding and switching tactics
-
Swiss government data published following supply chain attack – here’s what we know about the culprits
News Radix, a non-profit organization in the health promotion sector, supplies a number of federal offices, whose data has apparently been accessed.
-
Ransomware victims are getting better at haggling with hackers
News While nearly half of companies paid a ransom to get their data back last year, victims are taking an increasingly hard line with hackers to strike fair deals.
-
LockBit data dump reveals a treasure trove of intel on the notorious hacker group
News An analysis of May's SQL database dump shows how much LockBit was really making