
Protective measures are simple, cost-effective and immediately beneficial
Protective measures can prevent ransomware from occurring in the first place. There are many easy actions you can take now.
Prepare for a ransomware attack
You can be the victim of a ransomware attack at any time.
There are steps you can take to protect yourself against it.
Update your device and turn on automatic updates
Cybercriminals use known weaknesses to hack your devices. System updates have security upgrades to patch these weaknesses.
You should always update your system and applications when prompted.
You can turn on automatic updates so that this happens without your input.
- If you own devices that run on Apple macOS or iOS, follow the steps in our guide for automatic updates for iMacs, MacBooks, iPhones, and iPads.
- If you own devices that run on Microsoft Windows 10, follow the steps in our guide for automatic updates for Windows.
Turn on two-factor authentication
Having two or multi-factor authentication increases your cyber security. Two-factor authentication means there are two checks in place to prove your identity before you can access your account. For example, you may need to supply an authentication code from an app and your password.
It makes it more difficult for someone to access your files or account.
Turn on two-factor authentication with our helpful guides for:
- Apple ID
- Facebook messenger
- Gmail
- Microsoft
- Signal
- WhatsApp and WhatsApp Business
- Yahoo!
Remember to use strong passwords and passphrases for your accounts.
Set up and perform regular backups
A backup is a digital copy of your most important information (e.g. photos, financial information or health records) that is saved to an external storage device or to the cloud.
The best recovery method for a ransomware attack is a regular offline backup made to an external storage device and a backup in the cloud. Backing up and checking that backups restore your files offers peace of mind.
You can set up automatic backups in your system or application settings.
- For Mac users, follow the steps in our guide on performing regular backups for Mac to an external storage device or backing up a Mac to the cloud.
- For iPhone users, follow the steps in our guide on performing regular backups to the cloud for iPhone.
- For Microsoft Windows 10 users, follow the steps in our guide on performing regular backups for PC to an external storage device or backing up a PC to the cloud.
Implement access controls
Controlling who can access what on your devices is an important step to minimise the risk of unauthorised access. It will also limit the amount of data that ransomware attacks can encrypt, steal, and delete.
To do this, give users access and control only to what they need by restricting administrator privileges. Don’t share your login details for your accounts.
Turn on ransomware protection
Some operating systems offer ransomware protection. Make sure you enable this function to protect your devices.
ACSC has developed a guide to help you. Follow our step-by-step guide to turn on ransomware protection on your device.
Prepare your cyber emergency plan
If you are responding to a ransomware attack, read What to do if you’re held to ransom now.
Download and save or print out the Ransomware Action Checklist and the Cyber Security Emergency Plan.
It is important that these plans are easily accessible and known to all employees, especially in the event of a ransomware incident.
Get to know your critical data
Know what data is most important to you. With your business, personal information, or devices, you need to consider what you:
- can and cannot replace,
- will invest to recover the information or device,
- are willing to live without, and
- must keep safe.
Loss of any data could limit the ability for your business to conduct day-to-day activities, impact to your reputation and credibility, or risk losing customers. While you might think photos and other business documents are most important, it is worth considering other data that is critical to your business operations, for example:
- Financial/transaction data
- Customer data (e.g. PII, contact information)
- Communication platforms (e.g. access to, and history of emails)
- Calendars (e.g. appointments and bookings)
- Inventory and supplier data.
Remain vigilant and informed
Sign up to get alerts through the free ACSC’s alert service. This service will send you an alert when a new cyber threat is identified.