SHARE
Facebook X Pinterest WhatsApp

5 Security Steps to Protect Users from Ransomware

Advanced security hacking techniques known as ”ransomware attacks” are on the rise, especially in the health care industry. Ransomware occurs when a cyber criminal encrypts an unsuspecting user’s data and demands payment in return for access. In most cases, there is not much to be done if data is stolen by a cyber criminal, and […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Mar 29, 2016

Advanced security hacking techniques known as ”ransomware attacks” are on the rise, especially in the health care industry. Ransomware occurs when a cyber criminal encrypts an unsuspecting user’s data and demands payment in return for access. In most cases, there is not much to be done if data is stolen by a cyber criminal, and while it’s difficult to say whether any of these attacks could have been prevented, it is important to know about the proactive security measures organizations can take against acts such as ransomware. In this slideshow, WinMagic COO Mark Hickman offers five tips for protecting against ransomware.

5 Security Steps to Protect Users from Ransomware - slide 1

Proactive Ransomware Security Measures

Click through for five steps organizations can take to protect users and data from ransomware attacks, as identified by WinMagic COO Mark Hickman.

5 Security Steps to Protect Users from Ransomware - slide 2

Educate Yourself on Encryption

More and more organizations are turning to encryption as a means of securing data. Encryption providers that offer intelligent key management, i.e., the enablement of centralized encryption key management from within an organization, allow end users to control their own data. This method protects against third-party attacks on the network.

5 Security Steps to Protect Users from Ransomware - slide 3

Understand Other Security Measures

In addition to securing your data via encryption, consider other security measures such as advanced threat protection technology that protects your network not just from the outside perimeter, but also from within the network. An integrated, layered approach to security will increase the chances of successfully fighting back a cyber criminal with malicious intent.

5 Security Steps to Protect Users from Ransomware - slide 4

When in Doubt, Back It Up!

Consider replicating and storing important data on an external drive that is not connected to the hard drive within your computer or to the Internet. Backing up data is important because if lost or compromised, the data can still be retrieved from an isolated location. Make sure that when backing up your data, you’re able to access the information through another device, e.g., a brand new machine.

5 Security Steps to Protect Users from Ransomware - slide 5

Stay Up-to-Date

Make sure to always install the latest security updates for your system. Patches are pushed out by OS providers for a reason – to protect end users from unknowingly compromising their data. Patching a security flaw will prevent cyber criminals from breaking into a network or standalone PC through a gaping hole. But remember, you can only be prompted by your OS provider to install a security patch, if your OS provider still supports this kind of protocol.

5 Security Steps to Protect Users from Ransomware - slide 6

Protect Admin Passwords

If you see the user account control come up asking for the Administrative password, think twice; ask yourself do you really want to initiate the UAC dialog? If you’re not 100 percent sure, click NO!

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.