Friday, September 30, 2022 β€’ Welcome to the πŸ’― No-Nonsense Zone❗
πŸ›οΈ Check out Today’s πŸ”₯Amazon logoDeals! πŸ›’

Ransomware Explained and Protection: What to Do Right Now to Stay Safe

Share what you're reading!

For years, ransomware has been a massive security headache for individuals and businesses alike. More than just some malicious codes, it’s now considered a type of terrorism, and rightfully so.

The good news is that you can prevent ransomware yourself without spending any money. You only need to understand how it works and avoid it.

This post will explain ransomware in layman’s terms and how you can keep yourself safe from this type of scam. Paying attention, and most importantly, taking the issue seriously, are the key.

Dong’s note: I originally published this post on May 24, 2018. Since my last update on June 10, 2021, I’ve experienced a few more unfortunate ransomware-related incidents. With this latest update, posted on June 24, I wanted to raise awareness of the issue’s seriousness and add more practical information on how to stay safe.

ransomware ransom message
Here’s a real example of a message left by ransomware. You don’t want to see it appear on your computer screen.

What is ransomware, and why is it so bad?

Ransomware is a piece of malicious software that, when executed, encrypts — or locks — popular file types, causing you to be unable to open documents or even run applications.

The malware then displays a message with instructions on how you can pay — usually via cryptocurrencies — to get your files back.

You can think of ransomware as an event where somebody comes into your home and sprays a type of generally-impossible-to-remove glue all over your furniture and appliances, rendering them inaccessible or useless. That person then demands payment to clean up that glue with a secret method only they know.

In reality, when you see that dreadful message, you better hope you’ve had an alternative way to restore your data — via particular backups. Otherwise, chances are you will never get your files back.

That’s because the ransom tends to be prohibitively high, and when you start paying, you’ll have to keep paying because the bad guys can release a portion of data at a time.

On top of that, chances are you won’t get your data back 100 percent intact. Among other things, they might lose their holding folder or other attributes. (It’s tough to clean any glue off thoroughly, so to speak).

And sometimes, the ransomware itself is of “low quality” that even its owner can’t undo the damage. That happens.

By the way, paying means you support the practice, which only worsens the matter. So, it’s never a good idea to pay in the first place.

In any case, ransomware can be as big a headache as one that ends your business or career.

ransomware encrypted files
Here is a screenshot showing encrypted files in a folder of an infected computer. Note the time and date. All these files (and those within the computer) were encrypted almost simultaneously.

How you get infected

One thing is generally true: Ransomware does not install itself. It’s not a virus. Just like any software, it requires user interaction to execute.

To use popular apps, such as Zoom or Skype, you first have to download, install, and then run it before you see the result — chatting with a remote party in this case.

A user must interact with the computer and allow ransomware to download and launch the attack. (You have to open the door for that stranger to come in, so to speak.)

That said, there are two ways ransomware can get into a computer:

  • The user is tricked into believing they are doing something benign (again, like using Zoom). Or
  • The bad guys manage to access your computer, likely remotely, then install and run the malware themselves.

For this reason, a ransomware attack is always somewhat of an “inside job” — somebody must have full access to your computer to make it happen. And that means two things:

  1. It’s tough to prevent. It can take as little as a few misclicks to get infected, and the damage takes a short time to happen on a large scale. (It’s much faster to spray glue on things than physically hauling them away.)
  2. The damage is extensive. All files on the computers and all accessible network resources are susceptible. Therefore, in an office, expect all shared folders to be vulnerable.

There are many variants of ransomware. It’s relatively easy to change a few lines of code to create a new variant. These days, ransomware is available to certain parties as a service. One can order it and split the loot with the maker.

When a new one is out, even the best protection software can’t stop it from executing. Antivirus and anti-malware applications are generally one step behind.

In my experience, some ransomware variants can even remove themselves after having done the damage, making it hard to trace them back to their origin.

The point is there’s a large window where everyone can be vulnerable. You should always try to prevent ransomware from infecting your computer and have contingency plans for the case it does.

How to prevent ransomware

The best way to avoid ransomware is to take precautions and always practice safety measures.

The good news is that you actually can stay 100% safe from it if you remain alert. It’s similar to making sure you don’t let just anyone inside your home for the most part.

Good ransomware prevention practices

That said, there are two main ways to keep your computer safe.

The first: Respect your computer’s warnings!

That’s right. Downloading ransomware on your computer alone might not be the end game yet. It is when you execute (a.k.a “run,” “open,” or “view”) it that causes trouble.

(In many cases, though, downloading and running a piece of software is combined in a single action. So, clicking on an embedded link within an email message alone might mean you’re about to excuse some malicious code.)

Here’s the good news: When you’re about to do something that can change the system, the computer will always confirm that with you. It’s your last chance to stay safe.

When there’s a pop-up asking whether you want to proceed, take your time to make sure before responding affirmatively. Don’t just click on “Yes,” “OK,” “Run,” etc., without knowing what will happen as a result.

Windows Warning
Here’s an example of the warning you should ponder over before clicking on the Yes button. Note the default “No” button that prevents you from proceeding by mistake.

Staying vigilant is, by far, the most effective way to keep your computer safe from anything, including ransomware. I explained it in detail in this separate post about staying safe online.

Extra: What to do when you accidentally download and run a ransomware

By the way, if you’ve just accidentally downloaded (and run) ransomware — and are somehow aware of that — here’s what you should do:

  1. Turn your computer off immediately by unplugging it from power (or pressing and holding the power button for a few seconds). Ransomware needs time to encrypt the entire computer and network folders. It can’t do that if the computer is turned off.
  2. Take all storage devices, internal and external, out of your computer and connect them to another to copy your data out.
  3. Perform a re-partitioning (format) or discard the old storage devices.

Call a professional if you’re not familiar with steps #2 and #3. But you must do #1 immediately. Leaving your computer on will only make things worse. Don’t be curious!

Keep in mind that some ransomware variants don’t attack right away but wait till the computer is idle to do the bad deeds. The point is the chance you recognize that your computer is under attack can be rare.

But if you think you’ve been infected or are seeing evidence of that — the machine might act odd or has a lot of unusual activities — turn the computer off immediately and call a professional.

The second: Keep your computer safe from unintended access

This part is a lot more complicated. The objective is to make sure nobody can use or manipulate your computer without your permission or knowledge.

You might need to do more than keep your password secure. The following are what you should generally do.

  • Stay alert: Assume that you’re vulnerable and maintain vigilance. Again, it only takes a few seconds (via a few mindless mouse clicks) to get infected.
  • Stay updated: Keep your computer updated with the latest security updates.
  • Strong passwords: Always use strong passwords and keep them safe. (By the way, complexity is not associated with security when it comes to passwords. Instead, use a private hard-to-guess one that’s easy for you to remember and use. It can be a sentence, a long string of numbers, or a mix of both.)
  • Beware of attachments/embedded links: Do not automatically open email attachments or click on embedded links from an email or chat screen or social media without knowing that it’s safe. (Generally, by hovering the mouse on the hypertext, you can preview the entire link on the status bar at the bottom of the window.)
  • Use protection software and keep it up to date. The software might give you more warnings before you’re about to execute some suspicious codes. However, don’t rely solely on protection software; the last line of defense is always you, the user. (Windows 10 users: Use the built-in Windows Security app — more below.)
  • Turn your computer off: Leaving your computer on 24/7 wastes energy and gives bad guys more time to mess with your system from afar. So, turn it off when you’re ready to call it a day.
  • Set up remote access correctly: Do not turn on remote access unless you intend to use it. When you turn it on, ensure you know how to do that safely. The most basic is to change the default port number. Also, using strong passwords is a must.
Fake Phishing Message
Here’s an example of a real fake email message that can get you in trouble. Note the phony link shown in the status bar when I rested the mouse on the View Document File embedded link button — it’s not from Dropbox, which would end with

How to minimize, manage ransomware’s damages

Trying to prevent ransomware alone is always good, but not enough. It would be best to assume that all of the measures above might fail — we’re all susceptible to mistakes. So, it’s a good idea to prepare if you get infected.

Here’s a sad truth: If your computer gets ransomware, there will be damage. What we’re doing here is trying to manage or minimize that. Chances are, you will need to rebuild your computer from scratch. The key here is to keep your data safe.

And the only way to make sure your data is safe is via a good backup practice. Again, regular and proper backups are the only way to keep your information intact against a ransomware attack.

Good and proper here means the backup should not be readily available to the user. If the backups are accessible by the infected account’s owner during the attack, they are also encrypted and become useless.

Synology DSD1621 NAS 1
Using an advanced NAS server is an excellent way to keep your data safe against ransomware.

General guidelines on good and proper backup

Back up regularly — this is a daily (if not hourly) matter.

  • For homes:
    • Take a backup offline. An example of offline backup is to alternate backups on two or more external drives and disconnect each drive after a backup job or each day. You always have a set of backups that are not connected to a computer.
    • Use some cloud backup service. In my experience, some, like Google Drive and Microsoft OneDrive, are smart enough not to back up data that’s encrypted by ransomware, and most give enough free online storage for your important data.
  • For an office, use the home backups above and also consider:
    • Use a different user account for the backup job and prevent other users from accessing the backups. The objective is to make general have no access to the backups.
    • Use a NAS server, such as the Synology DS220+, or the DS1621+, as the backup destination. These servers can keep versions of their data using Snapshots (shadow copies), allowing you to restore if their share folders are infected.

If you use a Windows computer/server as a backup destination, make sure you turn on the Shadow Copy feature on that computer.

Note: If the server itself is infected, Shadow Copy doesn’t help since ransomware tends to delete all local shadow copies as part of its infection. So, again, make sure the server’s admin account, the one you use for making the backups, is safe by keeping its password secure.

And that’s it. If you follow the backup guidelines above, your data will be safe, even if you’re infected with ransomware. You might still need to hire somebody to restore the data, but the cost will be substantially less than paying the ransom.

If you use Windows 10, check out the Ransomware protection feature below.

Extra: How to prevent ransomware attacks using Windows Security

Windows 10’s built-in Windows Security Center has a new Ransomware protection feature that protects your files when the computer is infected. By the way, this feature is available in the upcoming Windows 11, too.

Here’s how it works: This feature preemptively limits the full access (read and write) to specific folders and only allows pre-approved applications to change the content inside these folders. Other apps only have read-only access.

Microsoft determines these “whitelisted” applications automatically and generally includes common apps. However, you can also manually add other apps to the allowlist. Ransomware, by default, is not on the list and, therefore, won’t be able to make changes to your files to do any harm.

In other words, Windows 10’s ransomware protection feature adds another protective layer around your data by allowing only “known” or approved apps to change your data. As a result, your information is safe even if your computer has ransomware.

Using this method does have some harmful side effects: Many legit apps will not work correctly until you manually put them on the allowed list. But that’s a small price to pay.

Note: If you’re using a third-party antivirus program, which will generally disable Windows Security, you’ll need to remove that software and enable it first.

Steps to turn on ransomware protection on Windows 10

Windows 10 Ransomware Protection Feature
Ransomware protection: Windows 10 has you covered.
  1. Click on the search field by the right of the Start button (lower-left corner) and search for Ransomware Protection. As it appears on the Start Menu, click on it — the Ransomware Protection page of Windows Security will appear.
  2. Under Controlled folder access, slide the switch to the On position. Click on Yes to the User Account Control prompt.
  3. Click on Protected Folders. Here, all the folders in the current profile (Documents, Pictures, Music, etc.) are already there. You can add or remove other folders of your choice, including network shared folders, by clicking on the plus (+) sign. Once done, click on the back arrow ( <- ) on top to go back to a page.
  4. Click on Allow an app through Controlled folder access. Here, you can add more apps of your choosing to have full access to the content of protected folders by clicking on Add an allowed app. If you’re not sure, leave this list blank.

By the way, On this page, you can also set up OneDrive to get additional backup and protection. OneDrive gives you 5GB of free online storage, enough for essential documents.

And that’s it! From now on, your data is safe even when your computer is under a ransomware attack. (Still, don’t count on this 100%, make sure you also do the backups mentioned above.)

Again, keep in mind that this feature might block good software from accessing your data. You might note some software, like scanner or photo editor, might show errors. In this case, you’ll need to repeat step #4 and add the applications in question to the list of allowed apps.

Final thoughts

In the past few days, I’ve run into way more sad ransomware-related situations than I want to remember.

In all of them, the involved parties weren’t aware of how bad ransomware was to care enough about prevention and protection beforehand. So, let me repeat this:

Ransomware is a type of evil that occurs like a heart attack: out of the blue and often without warning.

So, check on your precious data right now and, at the very least, make a backup before it’s too late. Stay safe!

Share what you just read!

Comments are subject to approval, redaction, or removal.

It's generally faster to get answers via site/page search -- your question/comment is one of many that Dong Knows Tech receives daily. Β 

  1. Strictly no bigotry, profanity, trolling, violence, or spamming -- including unsolicited bashing/praising/plugging a product/brand (β€’).
  2. You're presumed to have read this page in its entirety, including related linked posts and previous comments -- questions already addressed will likely be ignored.
  3. Be reasonable, attentive, and respectful! (No typo-laden or cryptic comment, please!)

(β€’) Per the πŸ’―no-nonsense policy, all comments with an external link are scrutinized, and most links are redacted. Do not leave a comment if you're, in any capacity, representing a company/product mentioned here! Instead, send Dong Knows Tech a private message or use a PR channel.

Thank you!

8 thoughts on “Ransomware Explained and Protection: What to Do Right Now to Stay Safe”

  1. I believe in prevention is better then cure. Using network based firewall system is best approach and it is more then easy now a days to get such solutions.

    • I agree on better safe than sorry, Manny. But no firewall can 100% prevent ransomware if you download it and run it as mentioned in the post.


Leave a Comment