Course Offer

Course Introduction

What is Ransomware?

Ransomware detection and recovering your files

Malware Analysis Tools

Steps to Help Prevent & Limit the Impact of Ransomware

Identify the ransomware

Free Ransomware Decryption Tools- checkout resource link

Total tracked ransomware payments

Steps to Help Prevent & Limit the Impact of Ransomware

  1. Use strong and unique passwords on user accounts that cannot be easily breached. Weak passwords like Admin, admin@123, user, 123456, password, Pass@123, etc., can be easily brute-forced in the first few attempts itself.
  2. Configure password protection for your security software. This would prevent any unauthorized users from accessing the system from disabling or uninstalling it. Quick Heal users can enable this feature from the Settings => Password Protection.
  3. Disable the Administrator account and use a different account name for administrative activities. Most brute-force attempts are done on an Administrator user account as it is present by default. Also, remove any other unused or guest accounts if configured on the system.
  4. Change the default RDP port from the default‘3389’.. Most attacks of such type focus on targeting port 3389 of RDP.
  5. Enable Network Level Authentication (NLA) feature in your RDP settings available in Windows Vista and later OS. Ref: https://technet.microsoft.com/en-us/library/cc732713.aspx
  6. Configuring Account Lockout Policies that automatically lock the account after a specific number of failed attempts. This feature is available in Windows and the threshold can be customized as per the administrator. Ref: https://technet.microsoft.com/en-us/library/dd277400..aspx
  7. Route the RDP traffic only through the Hardware Firewall with highly secured traffic rules to allow only trustworthy connections.
  8. Kindly do not open any mail attachments or read emails from unknown people.
  9. Kindly do not visit any unknown link provided in the mail by unknown people.
  10. Do not allow outside pen drive in your network and scan the authorized pen drive before accessing it.