Thursday, September 17, 21:06
Home how To What we should do to prevent ransomware

What we should do to prevent ransomware

With ransomware attacks constantly increasing, it is becoming more and more urgent for both individuals and businesses. businesses take all necessary measures to prevent these incidents. And because in these cases, prevention can be life-saving for a company, here are some steps you can take to reduce the chances. ransomware attacks.

ransomware

Disable macros

Macros may have offered many comforts in the past, but now they are rarely used. If you do not need them, turn them off. You can do it through Group PolicyOf Microsoft Office or manually in computer you.

Use secure passwords

It's a little weird, but companies are not paying enough attention to it passwords. All they need to do is confirm that users use secure passwords and always make sure that secure and unique passwords are used in the administrator accounts.

Monitor the domain administrator group

Over time, more and more users are added to the management team domain. Users should never act as domain administrators! Check your domain administrator groups and remove all those that are not needed.

Turn on Windows Firewall

For a ransomware attack to be successful, it must be spread over the network using push installers. Activate their firewall Windows or some other firewall.

Perimeter firewalls are not enough, so always assume that your perimeter has been breached. Even if you use servers that require the opening of dangerous doors, get in the habit of activating the firewall and opening these doors.

Do not make users local administrators

Users who are local administrators may knowingly and unknowingly make changes to system of the company that can allow malware to infiltrate the operating system.

Creating separate administrator accounts

You should also avoid adding domain users to the admin group. Not only will the user now have system-level access to his machine, but he will also have system-level access to all the computers on your network. If you need administrator access, use a second connection.

Many of these steps may seem difficult and time consuming, but it is very important that you implement them to secure your systems.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

Email security training is phishing scam

A new phishing campaign pretends to be a well-known security company, sending its victims email security training.

Mozilla is launching a search for YouTube's suggestion algorithm

YouTube algorithm can lead you to some very strange suggestions, suggesting videos that seem to be to your liking ...

PS5: Sony has announced the price and release date of the console

Ready for PlayStation 5? Now you can pre-order the new console at selected retailers for the price of 500 ...

Biohacking: An exciting prospect, but only for the rich?

A global study finds that many users find biohacking exciting, but remain intimidated by hacking and privacy.

GNOME 3.38: What changes does the next version contain?

Recently, after 6 months of development, the next version of the GNOME environment was released. The new version 3.38 ...

New Pinephone distribution with 13 operating systems released

Today, many users use dual-boot systems, which allow the use of two operating systems at the same time ....

Google Drive: It will delete the trash files

Google is changing the way Google Drive handles files and documents in the Recycle Bin ...

Security and privacy features of iOS 14 and iPadOS 14

Apple has equipped iOS 14 and iPadOS 14 for iPhone and iPad with even greater security, in order to maintain ...

Microsoft for BSOD on ThinkPad: Lenovo's solution is not recommended

Microsoft has finally released a support update that describes in detail how to deal with the BSODs that appear on Lenovo ThinkPad due to ...

Cerberus banking Trojan source code is available for free in hacking forums

The Cerberus banking Trojan source code was released as free malware in an underground hacking forum after a failed auction. Dmitry ...