
4. Create strong Windows policies: For the majority of businesses on Windows, consider using Windows Policies to block certain paths and file extensions from running. Policies can be set up in groups, which is useful if varying levels of access are required. (Note: test any policies on a test PC.) Windows created local copies of the files using the VSS copy service. Ransomware like CryptoLocker will encrypt this area because it holds VSS copies for the local drive (normally the C: drive.) Using Windows Policies to block access to the service helps stop ransomware from erasing local drive file backups. Policies should point to the VSSAdmin executable. Any attempt to access or stop the service will result in a block.
5. Educate Your End Users: The employees are often the weakest link when it comes to the health of a company’s cybersecurity. Ransomware will continue to thrive as long as the end users, who often don’t even know the virus exists, continue to fall for phishing scams, which are the #1 root of a successful attack. Providing employees with the basics of ransomware, so that they know how to identify a malicious email or link, could make all the difference. When educating end users, it is important to provide them with facts that will resonate, whilst avoiding getting too technical and ensure they understand the threat.
To learn more about educating end users about cybersecurity and keeping business data safe, check out Datto’s State of the Channel Ransomware Report, featuring data from a survey of 1,100 MSPs about ransomware.
