ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Protect Your System from Ransomware

Updated on May 26, 2017

With WannaCry, ransomware is back in action again. The threat has been spread around the world infecting thousands of systems making them crawl. Ransomware typically is a real-time threat which works based on Cryptovirology spreading cryptoviral extortion attacks that block users to access to data until a ransom is paid. Whenever it attacks your system it displays a ransom message on your system asking for the ransom to be paid to get access to data again. It has been in existence for decades but the threat is now bigger and more dangerous.

Types of Ransomware

Encryptors: It incorporates latest encryption algorithms to block access to system files and ask for payment (ransom) from the user to provide a key that can decrypt the blocked data. Locky, CryptoLocker, and CryptoWall are the examples of this type of Ransomware.

Lockers: It typically locks the victim out of the system operating system, making it hard or sometimes impossible to access the system (desktop) or any apps or files. Here, it doesn’t encrypt files, but it still asks for the ransom to unlock the infected system. WinLocker, Police-themed ransomware are the examples of this threat.

There are primarily two types of Ransomware still there are few versions which infect system’s Master Boot Record (MBR), which makes it hard to boot the system normally. It further asks for a ransom to get rid of the problem. Here, MBR is a section of a computer’s hard drive that enables the OS to boot up. Petya and Satana are the examples of this ransomware threat.

How to protect system from Ransomware

Install a reputable security suite: This is the most basic step to keep your system protected from any malware threat. Install reputable anti-malware program along with software Firewall to provide dual protection to your system from virus or ransomware threats. Firewall and anti-malware program go together to safeguard your system and other computers on the network. Where anti-malware detects any virus running on the system, the firewall blocks malicious connections from breaching your system security.

Apart of it, there come new variants of malware with latest updates to avoid detection, thus it may get past your anti-malware program. In that case, firewall proves the second line of defense to protect your system. You can try using reliable ransomware protection tool to avoid ransomware threats effectively.

Update system software: This is the pre-requisite to keep your system safe from any virus threat. Each system update comes with certain security patches, bug fixes, and other improvements. If you are running older version operating system or anti-malware program, there remain higher chances that your system get infected instantly. Thus, keeping your system software updated can avert many recent threats to your system.

Set System Restore Point: By enabling System restore Points on your system can avert chance of data loss significantly. It helps you go to back to the previous known-clean state when your system gets infected with malware or ransomware. It helps you recover your precious data. Many recent malware versions are affecting the “Shadow” files of the system from restore points, it means you need to be very quick while recovering data to previous known safe state.

Avoid suspicious links: This is more of a behavior change. Try to avoid suspicious email links and downloading from unknown sources. Most virus attacks are happened via malicious email links and using social engineering tactics, thus it becomes important to be vigilant while clicking on any unknown or suspicious links.

Backup your data: This is the remedy to all problems related to the digital world. Keep your data backed up using different sources. Try to keep data backup on external drives, flash drives, on cloud servers or using another medium. It will help you regain your important data in case your system gets affected and you lose your data.

Following these simple steps, you can prevent your system from any ransomware threat effectively. It can also avert a situation like data loss. Apart from these useful steps, you can look for many other tips as well like disable Remote Desktop Protocol (RDP) on your system, disabling Macro, disconnecting network when infected, avoiding .exe attachments, consulting experts etc. to protect your system.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)