七色视频

Skip to Main Content Skip to bottom Skip to Chat, Email, Text

Articles > Cybersecurity >听How to prevent ransomware attacks

How to prevent ransomware attacks

Michael Feder

Written by Michael Feder

Kathryn Uhles

Reviewed by听Kathryn Uhles, MIS, MSP,听Dean, College of Business and IT

Frustrated woman working at desk, hand to forehead because she has to deal with ransomware attacks

Ransomware appears in , according to a 2025 Verizon report, reflecting a notable rise from the previous year.听Among other forms of malware,听ransomware blocks users from accessing their files, passwords or additional personal information until they pay a ransom to regain control. Find out how this affects a device and how to prevent it.

Where do ransomware attacks come from?

While malware such as viruses, spyware and bots can injure a device鈥檚 productivity, ransomware attacks will lock users out of their system until they pay to remove the malicious program.听

These attacks may come from numerous sources. Whenever a user visits a听compromised webpage, opens a malicious email attachment, downloads an infected program, or communicates with another user whose device is infected with malware, ransomware can attach itself to their device.

Often, this cyberthreat can reach devices device through popular digital communication tools like email and instant messaging phishing attacks. In other cases, it can spread through insecure public internet access.

At times, ransomware can also reach a device when it visits a malicious website. Known as 鈥,鈥 this attack occurs when an unknowingly infected website is visited. Even if that website is visited for just a few seconds, the harmful program can attach to a device and cause an infection.

How does ransomware affect devices?

Ransomware attacks don鈥檛 usually begin听the moment malware is downloaded. It works first by infecting the device, then by locking, and often encrypting, user data. This usually means the device can be turned on but cannot access information stored in documents or databases.

After an attacker locks down data, users typically听receive a ransom demand. This offer can be made in several ways. They might notice that a background image has changed to the ransom demand. In other cases, hackers will replace files with a copy of the ransom note.

Many types of ransomware also work to听maximize damage听after they infect a device. 听Another variant,听, also uses a device to search for other devices it can attack and encrypt.

Others include locker ransomware (simply locking users out of the device), scareware (locking users out of the device or flooding the device with pop-up alerts), and leakware/double extortion (threatening users with leaking private data to the public).

Ransomware protection

Whether it's an organization or a private device user, there are several steps to take to protect devices from malicious attackers. These same steps can also help limit damage if a device is infected.

Develop an IT recovery plan

An important first step in preventing device and network attacks is to develop an IT听disaster recovery plan. This plan helps the entire organization protect against threats while identifying critical first steps in the event of an attack.

One IT disaster recovery plan can look different from another organization鈥檚 plan. It鈥檚 important to听customize a plan听to the size and strengths of an organization and ensure all employees are aware of the plan鈥檚 steps in the event of an infection.

The right IT听disaster recovery plan听helps with far more than post-attack recovery, and should also include the following elements:

  • Prevention 鈥 Actions the IT team and an entire organization can take that help to deter damage and perform surveillance on all important devices.
  • Mitigation 鈥 Measures that help reduce the chance of an attack ever taking place.
  • Preparedness 鈥 Activities that help users remain vigilant against threats, including anticipatory response training.
  • Response 鈥 Plans that outline how users respond in the event of a ransomware attack occurring, either on a single device or across an organization.

Keep systems up to date

Updating device systems is an even simpler approach to preventing ransomware attacks.听Attackers often target users with outdated devices or with outdated device operating systems because their security parameters can be less protected.

After听updating a device鈥檚 systems, it鈥檚 also important to update the programs used. After a sizable operating system update, for example, a device鈥檚 programs might require an update to maintain compatibility. Hackers may find vulnerabilities to target with a ransomware attack if updated devices use outdated programs.

Maintain backups

Whether information is stored on a server or in the cloud, it鈥檚 important to maintain backup files. Store backup files in a听separate location, preferably on a different device, to keep them accessible if users ever need them.

During a ransomware attack, backup files can often save an organization thousands, if not millions, in lost payments. Without backup files, an organization may need to spend time and money pursuing IT strategies that help restore file access.

It's vital to frequently听update backup files听to ensure they reflect any changes. Many device users trust听cloud computing听to back up their files securely since cloud storage solutions are typically secure and can be set to automatically back up a device鈥檚 files regularly.

Increase security on devices

Device security can be improved in various ways. Many of these strategies are preventive:

  • Don鈥檛 hand out personal information.
  • Log out of websites after making a payment.
  • Turn off both Wi-Fi and Bluetooth connectivity when not in use.

Take more proactive steps to improve a device鈥檚 security:

  • Use a VPN to encrypt the connection when using a public network.
  • Read reviews and verify the reputation of an application before downloading.
  • Diversify passwords and change them frequently.
  • Set up two-factor authentication across all devices.
  • Only use trusted device charging stations.
  • Disable any app or program permissions for a camera or microphone.
  • Get trained on how to spot malicious links.

These and other measures can help keep information safe, particularly when using shared or public networks.

Use an intrusion detection system

As attackers grow more advanced in their deployment methods,听IT teams are developing new ways to prevent malware, including ransomware attacks, from reaching sensitive information. One emerging cybersecurity strategy 鈥 an听intrusion detection system听(IDS)听鈥 consists of programs that proactively alert IT personnel to security threats.

An 听typically relies on both signature-based and anomaly-based intrusion detection. Signature-based protection compares ransomware threats to trends in a network to identify possible threats before they affect device performance.听Anomaly-based detection听uses machine learning to classify all device activity as normal or risky, depending on how users on a network normally operate.

Consult professionals

IT professionals can help with every phase of system protection, including proactive device protection, backing up files, regularly scanning device activity and even mitigating issues after an attack.

If someone is considering听joining the evolving world of cybersecurity, they鈥檒l need to complete a few initial steps. Many employers prefer candidates with at least an undergraduate degree in technology. Students sometimes prefer听online technology degrees, given the greater flexibility and the freedom to work while they learn.

Aspiring cybersecurity professionals may choose to pursue a听bachelor鈥檚 degree in information technology, which can help prepare them to mitigate and prevent IT risks like ransomware attacks and other malware. This degree sharpens key skills in systems analysis, information systems, operations and cybersecurity.

Learn more about ransomware attacks, malware, and other threats in an information technology program

Whether you鈥檙e seeking to gain a understanding of cybersecurity issues like ransomware attacks, or are a working professional looking to expand your skill set, 七色视频 (UOPX) offers听online course collections, bachelor鈥檚 degrees and master鈥檚 degrees in internet technology:

Headshot of Michael Feder

ABOUT THE AUTHOR

A graduate of Johns Hopkins University and its Writing Seminars program and winner of the Stephen A. Dixon Literary Prize, Michael Feder brings an eye for detail and a passion for research to every article he writes. His academic and professional background includes experience in marketing, content development, script writing and SEO. Today, he works as a multimedia specialist at 七色视频 where he covers a variety of topics ranging from healthcare to IT.

Headshot of Kathryn Uhles

ABOUT THE REVIEWER

Currently Dean of the College of Business and Information Technology,听Kathryn Uhles has served 七色视频 in a variety of roles since 2006. Prior to joining 七色视频, Kathryn taught fifth grade to underprivileged youth in Phoenix.

checkmark

This article has been vetted by 七色视频's editorial advisory committee.听
Read more about our editorial process.

Get your free IT Program Guide

Learn how 100% of our IT degree and certificate programs align with career-relevant skills.

Get your free IT program guide. Please enter your first and last name.

Thank you

Download your pdf guide now. Or access the link in our email.