Ransomware attacks are typically delivered to a user via a malicious but legitimate looking email link or attachment. When the user opens the ransomware it will typically encrypt a user’s files, then demands a ransom to restore access – typically payable using cryptocurrency, like Bitcoin.
Ransom, an age-old and effective crime, is now being committed online. Ransomware offers cybercriminals a low-risk, high-reward income. It is easy to develop and distribute. Also in cybercriminals’ favour, most small businesses are unprepared to deal with ransomware attacks.
You are not guaranteed to regain access to your information and may be vulnerable to a second attack.
Many individuals and small businesses are often less security conscious, are less likely to implement cyber security measures, and spend less on cyber security measures. While medium and large businesses may have some considerations for cybersecurity measures, they too can benefit from inbuilt system security features – such as Microsoft’s ransomware protection.
Ransomware protection is a control on computers to stop a ransomware attack from encrypting access or files that are important to you. Microsoft has a built-in control to help protect devices from ransomware. It ensures folders you choose cannot be altered which prevents them from being encrypted down by a criminal. This guide will demonstrate how you can configure and use this control to protect your files from a ransomware attack.
While ransomware protection can be useful, having a backup stored offline is important in case you need to retrieve important files or information.
Note: You can only use this functionality if you are an administrator. If you are a standard account user, you will be prompted to login or authenticate using an Administrator account.
For more information regarding administrator and local user accounts, please refer to Managing User Accounts on Microsoft Windows 10.
By default, the following folders are already included in the Protected List:
Note:
This will restrict applications from accessing any folders in the
protected list.
Note: This step is only recommended for users who are comfortable navigating the Windows folder structure. By default, Microsoft has a list of apps that are trusted and included behind-the-scenes. You may have applications such as MYOB or Adobe that are not part of this list.
Only allow apps that are reputable and trustworthy to access your folders in the Protected List, as this is similar to allowing a technician into your house without supervision.
Copyright @2023 ZAMBIA CIRT