We’re sorry, your browser appears to be outdated.
To see the content of this webpage correctly, please update to the latest version or install a new browser for free, such as Avast Secure Browser or Google Chrome.

Ransomware protection & recovery guidelines for businesses

The impact

Infamous ransomware explained

WannaCry

WannaCry

WannaCry

The WannaCry strain shows how extensive a PC-based ransomware attack can be. In May 2017, WannaCry spread across the globe and ultimately attacked over 100 million users.

Petya

Petya

Petya

The Petya strain, which first appeared in 2016 and returned in a more advanced form in 2017, uses the screen locker approach by encrypting your hard drive’s master file table to lock up your computer.

Popcorn Time

Popcorn Time

Popcorn Time

Since an attacker’s ultimate goal is to spread the ransomware to as many machines as possible in order to make the most money, an alternative ransom tactic has emerged — a tactic that is both social and sinister.

What is WannaCry?
What is Locky?
What is Cryptolocker?
What is Cerber?

Steps to keep ransomware out

Establish multi-layered security
One of the best ways to prevent ransomware attacks is to build a multi-layered security structure. Combining security solutions like our Avast Business Antivirus, Patch Management, Network Security, and Cloud Backup creates an even stronger barrier guarding your business with less points of entry for hackers to explore.
Be wary of pop-up installment requirements
Pop-ups are seldom your friends. Whenever you get a pop-up request to update or download and install software or a plug-in while you’re online, close the pop-up without taking any action. Instead, go directly to the legitimate source to apply any updates.
Think twice before clicking links
Don’t click links you receive from unknown contacts via SMS, email, or messenger applications like Skype or WhatsApp. Even if you think you know the sender, take a closer look at both their address and the link itself before proceeding. If anything looks suspicious, steer clear.
Don’t download apps from unknown sources
When downloading apps to your computer or mobile device, stick with trusted sources like Microsoft Store, Apple App Store, and Google Play Store. Avoid third-party app stores, which have a reputation for being rife with scams.
To add an extra layer of security, go into your device’s settings and disable its ability to perform app installations from unknown sources. You should also be suspicious if an app asks for device administrator permission. Granting this permission enables the owner of the app to access your device remotely, which would have dangerous consequences.
Back up all important files
In the event of a ransomware attack, having backups of all your vital files will help you in terms of damage control. The best way to prevent data loss is to use a combination of offline and online storage methods. Save your files to one or more physical devices (e.g. external hard drives, USB flash sticks, SD cards) and to cloud storage services (e.g. Dropbox, Box, Google Drive).
This way, if you do get hit with a ransomware attack, you’re ready to restore all your important files as soon as you remove the ransomware from your device.
Keep operating systems and apps updated
If you’re still using an older OS that Microsoft no longer supports, like Windows XP, you are especially vulnerable to attack. Many updates involve security patches that are vital to preventing ransomware and other malware from infiltrating your devices. Make it a habit to keep all your software up-to-date, especially your web browsers and plug-ins.
Educate employees about best practices
Including guidance in documentation is one thing, but for it to become ingrained as a part of the day-to-day, training and education are vital. Anyone with an account or device connected to the network needs to be trained to a level where they are familiar with security policies and how to implement best practices.

Multi-layered security is key

Hackers have more than one way of breaching a business network or device. The key to ultimate protection is having multiple layers of protection as a fail-safe.

Book a demo

Get a live demo to see how our cybersecurity can protect your business from ransomware.

Get a second opinion

There is no better protection for a business of any size, from a sole proprietor to a global enterprise. Our use is pretty small scale, but when it comes to offering a suggestion for antivirus protection or other IT issues, we always tell our clients that Avast is the best.

Robert S.
Content Specialist
Small Business (50 or fewer employees)

Avast Endpoint Protection is very efficient and provides complete security as it detects any virus and keeps in constant scanning without slowing down the system. And the best of all, it can be used on any computer regardless of its characteristics.

Cynthia R.
Admin Assistant
Mid-Market (51-1000 employees)

Maximum Protection: Offers total security in terms of constantly updated malware. Very low impact: It consumes very few resources from my computer. I am protected without losing performance. Very easy to use: It is a simpler antivirus to manage. You practically install it and forgett that you have it.

Emmett O.
IT Senior Programmer
Enterprise (More than 1000 employees)

Reliable, award-winning security

FAQ

Strengthen your defenses

Close

Almost done!

Complete installation by clicking your downloaded file and following the instructions.

Initiating download...
Note: If your download did not start automatically, please click here.
Click this file to start installing Avast.