Ransomware Protection: How to Defend Against Encryption Attacks

Ransomware can be stopped before it encrypts a single file — with the right combination of antivirus settings, backup strategy, and network hygiene. This guide covers every layer of ransomware defence.

Ransomware protection guide
1Antivirus and Endpoint Defence

Antivirus Settings and Endpoint Protection for Ransomware

A modern antivirus with dedicated ransomware protection is the first line of defence against encryption attacks. Products like Bitdefender, Malwarebytes Premium, and ESET include specific anti-ransomware modules that go beyond general malware detection. These modules use behavioural monitoring to identify the characteristic patterns of ransomware activity — rapid file enumeration followed by mass file reads and writes, modification of file extensions, deletion of shadow copies — and terminate the responsible process before significant damage occurs. Bitdefender's Ransomware Remediation feature is particularly noteworthy: it maintains protected backups of files being modified, enabling recovery of recently changed files even if encryption was partially completed before detection.

Controlled Folder Access (CFA), available in Windows 10/11 via Windows Defender, is an underutilised ransomware-specific protection layer available at no cost. When enabled, CFA prevents unauthorised applications from modifying files in protected folders (Documents, Pictures, Desktop, and any additional folders you designate). Ransomware attempting to encrypt files in protected folders will be blocked and an alert generated. The main management overhead is whitelisting legitimate applications that need access to protected folders — a modest one-time configuration investment for meaningful protection. Enterprise products like Microsoft Defender for Endpoint extend this capability with more sophisticated application control policies.

Patch management is a critical ransomware prevention layer. A significant proportion of ransomware attacks — including the catastrophic WannaCry outbreak of 2017 — exploited known vulnerabilities for which patches had been available for weeks or months before the attack. WannaCry leveraged the EternalBlue vulnerability (MS17-010) that Microsoft had patched in March 2017; organisations that hadn't applied the patch were devastated two months later. For Hong for Hong Kong Online Banking: What You Need to Know">for Hong Kong Online Banking: A Complete Guide">for Hong Kong SMEs: Where to Start">for Hong Kong Businesses">Kong businesses, maintaining a current patch status on all operating systems, applications, and network equipment dramatically reduces the attack surface for ransomware delivered via vulnerability exploitation rather than phishing.

  • Behavioural Detection: Antivirus modules that detect mass file modification patterns — core ransomware defence layer.
  • Ransomware Remediation: Bitdefender's module maintains file backups for recovery if partial encryption occurs.
  • Controlled Folder Access: Windows Defender feature blocking unauthorised apps from protected directories.
  • Application Whitelisting: Allow only known-good applications to execute — highly effective but management-intensive.
  • Patch Management: Apply OS and software updates promptly — WannaCry exploited a patched vulnerability.
  • Disable Macros: Office document macros are a primary ransomware delivery vector — disable by default.
Antivirus ransomware protection settings
2Backup Strategy

Building a Ransomware-Proof Backup Strategy

The most effective ransomware mitigation for data recovery is a backup strategy that ensures at least one backup copy is always beyond the reach of any ransomware that might infect your systems. The 3-2-1 rule is the baseline standard: maintain three copies of important data, stored on two different media types, with one copy off-site or offline. For ransomware specifically, the critical requirement is that the off-site copy must be either physically disconnected (offline/air-gapped) or logically immutable — stored in a way that a ransomware process running on your computer cannot overwrite or encrypt it.

Cloud backup services with versioning provide an effective ransomware-resilient off-site copy for most users. Services like Backblaze, Acronis True Image, and IDrive maintain multiple historical versions of files. Even if ransomware encrypts your files and those encrypted versions sync to cloud storage, the previous unencrypted versions are preserved in version history and can be restored. The key is verifying that the version history is actually maintained and accessible — some basic cloud sync services (like basic OneDrive or Dropbox plans) may only retain 30 days of versions, while paid tiers typically offer extended version history. Microsoft 365 subscribers have access to OneDrive Vault and 1-year version history for ransomware recovery.

For businesses, backup architecture needs to account for the fact that ransomware operators specifically target backup infrastructure. Sophisticated ransomware will attempt to access and encrypt backup servers, NAS devices on the same network segment, and even cloud backup credentials stored on infected systems. Enterprise ransomware protection best practices include: using immutable backup storage (AWS S3 Object Lock, Azure Immutable Blob Storage) that prevents modification or deletion for a defined retention period; maintaining backup credentials in a separate secrets management system rather than on the backup server itself; testing backup restoration regularly (a backup you've never tested is an unknown quantity); and considering tape backup as an air-gapped medium for the most critical data.

  • 3-2-1 Rule: Three copies, two media types, one off-site/offline — minimum backup standard for ransomware resilience.
  • Immutable Copies: At least one backup copy must be unmodifiable — air-gapped or cloud object lock storage.
  • Cloud Versioning: Services like Backblaze, Acronis, IDrive preserve historical versions — check retention period.
  • Test Restores: Regularly verify backup restoration actually works — untested backups are unreliable in a crisis.
  • Credential Separation: Store backup credentials in separate system — ransomware hunts for and uses stored credentials.
  • Tape Backup: Physically isolated tape provides the ultimate air-gap for most critical enterprise data.
Ransomware backup strategy
3Network Hardening

Network Security Measures That Prevent Ransomware Spread

Once ransomware gains initial access to one system, network architecture determines whether it remains contained to that device or spreads to encrypt everything on the network. Network segmentation — dividing the network into isolated segments so that devices in one segment cannot freely communicate with devices in another — is the primary containment strategy. A ransomware infection on an employee's workstation should not be able to reach production servers, backup systems, or other workstations on a different network segment. Implementing VLANs (Virtual LANs) to separate user workstations, servers, and management systems dramatically limits lateral movement.

Remote Desktop Protocol (RDP) is the most commonly exploited initial access vector for ransomware targeting businesses. Thousands of Hong Kong businesses expose RDP directly to the internet on port 3389, creating an easily discoverable attack surface. Attackers use automated scanning tools to find exposed RDP services, then attempt credential-stuffing attacks using leaked username/password combinations, or exploit unpatched RDP vulnerabilities. The straightforward remediation is: never expose RDP directly to the internet. Instead, require VPN authentication before RDP access is possible, limit RDP access to only users who genuinely need it, enable Network Level Authentication, and consider deploying a dedicated RDP gateway or virtual desktop infrastructure for remote access.

Least-privilege access controls are a critical ransomware mitigation that limits the damage an attacker can cause after gaining initial access. If a ransomware operator compromises a standard user account, they have access only to that user's files — not to shared drives, backup systems, or other users' data. But if that account has local administrator rights (common in many HK SMEs where users are given admin rights for convenience), the ransomware can spread far more aggressively and disable security tools. Implementing the principle of least privilege — users have only the access rights they need for their job function — combined with Privileged Access Management (PAM) for administrative accounts substantially limits ransomware impact.

  • Network Segmentation: VLANs separating workstations, servers, and backups — limits lateral movement from initial infection.
  • RDP Security: Never expose RDP directly to internet — require VPN before RDP access is possible.
  • Least Privilege: Standard user accounts without local admin rights — limits ransomware spread and impact.
  • SMB Hardening: Disable SMBv1 (exploited by WannaCry/EternalBlue), restrict SMB access to needed shares only.
  • Firewall Rules: Block outbound connections to known ransomware command-and-control infrastructure.
  • Email Filtering: Block executable attachments (.exe, .bat, .ps1, .vbs) — phishing is the primary initial access vector.
Network hardening against ransomware
4Incident Response Planning

Preparing Your Ransomware Incident Response Plan

Every organisation should have a documented ransomware incident response plan before an attack occurs — not during one. Under the stress and time pressure of an active attack, decision quality degrades significantly. A pre-prepared plan designates who has authority to make decisions (including the pay/don't-pay decision), who to call (IT support, cyber insurance provider, legal counsel, law enforcement), what the immediate technical steps are (network isolation, evidence preservation), and what communications go out to staff, customers, and regulators. For Hong Kong businesses subject to PDPO obligations, the plan must include assessment of whether the attack triggers personal data breach notification duties and the timeline for that process.

Cyber insurance has become an important component of ransomware preparedness for businesses. Cyber insurance policies can cover ransomware ransom payments (whether or not to pay is still a separate decision), incident response costs (forensic investigation, recovery specialists), business interruption losses during downtime, and third-party liability if customer data is compromised. The HK cyber insurance market has grown substantially, with Lloyd's, AIG, Chubb, and several local insurers offering relevant products. Underwriters now typically require evidence of basic security controls (MFA, backup procedures, patch management) before issuing or renewing policies — the insurance application process is itself a useful security maturity assessment exercise.

Staff training and phishing awareness are the most underinvested ransomware prevention measures relative to their effectiveness. The majority of ransomware infections begin with a human action — clicking a malicious email attachment, entering credentials on a phishing page, or downloading software from an untrusted source. Regular security awareness training that teaches employees to recognise phishing indicators (sender address anomalies, urgency language, unexpected attachment requests, mismatched URLs) and simulated phishing exercises that test and reinforce training are consistently among the most cost-effective security investments. For Hong Kong businesses, training must account for both English and Traditional Chinese phishing content, as regional attackers frequently target Cantonese-speaking users with Chinese-language lures.

  • Pre-Written IR Plan: Designate decision-makers, contacts, and technical steps before an attack occurs.
  • Pay/Don't-Pay Decision: Document criteria and decision authority for ransom payment in advance.
  • PDPO Compliance: Assess whether attack triggers personal data breach notification obligations.
  • Cyber Insurance: Covers ransom payments, forensic costs, and business interruption — increasingly required.
  • Staff Training: Regular phishing awareness training — the most cost-effective ransomware prevention investment.
  • Chinese-Language Phishing: Train staff on Traditional Chinese phishing lures targeting HK employees.
Learn how ransomware works →
Ransomware incident response plan

Protect Your Data Before Ransomware Strikes

Get the right antivirus with ransomware protection and build the backup strategy that makes encryption attacks survivable.

Related VPN Articles