{"id":12272,"date":"2017-07-06T12:02:06","date_gmt":"2017-07-06T17:02:06","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=12272"},"modified":"2025-10-23T10:55:06","modified_gmt":"2025-10-23T15:55:06","slug":"ransomware-warfare-protect-files-from-hostage-takers","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/","title":{"rendered":"Ransomware Warfare: How to Protect your Files From Hostage Takers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12272\" class=\"elementor elementor-12272\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fb00ae e-flex e-con-boxed e-con e-parent\" data-id=\"6fb00ae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76899f74 elementor-widget elementor-widget-text-editor\" data-id=\"76899f74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Ransomware represents one of the greatest threats to your data with studies indicating that ransom takers are focusing on smaller networks. <a href=\"http:\/\/www.foxbusiness.com\/features\/2016\/04\/27\/cyber-attacks-on-small-businesses-on-rise.html\" target=\"_blank\" rel=\"noopener noreferrer\">Fox Business <\/a><\/span><span style=\"font-weight: 400;\">claims that 43% of ransomware targets in 2015 were small to medium-sized businesses. With the recent trouncing received by the IT world at the hands of WannaCry, network invaders are becoming emboldened. They have started encrypting your data and stashing it away until you pay up. With a staggering <a href=\"https:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/51230.wss\" target=\"_blank\" rel=\"noopener noreferrer\">70% of business owners deciding to fork over the money<\/a><\/span><span style=\"font-weight: 400;\">, the incentive is strong. They&#8217;re making a killing, and your network may be next in front of the firing squad. But, with the right know-how and cyber security culture in your office, you can survive the bloody war against malware.<\/span><\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3646df4 e-grid e-con-full e-con e-child\" data-id=\"3646df4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cdd1f8 elementor-widget elementor-widget-image\" data-id=\"7cdd1f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"448\" height=\"306\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/SunTzu.png\" class=\"attachment-full size-full wp-image-12028\" alt=\"Firewalls Ransomware 101\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/SunTzu.png 448w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/SunTzu-300x205.png 300w\" sizes=\"(max-width: 448px) 100vw, 448px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cde0050 elementor-widget elementor-widget-text-editor\" data-id=\"cde0050\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>&#8220;If you know the enemy and know yourself, you need not fear the result of a hundred battles.&#8221; &#8211;Sun Tzu, about ransomware<\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0932e7 e-flex e-con-boxed e-con e-parent\" data-id=\"e0932e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f6bb69 elementor-widget elementor-widget-text-editor\" data-id=\"2f6bb69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 style=\"text-align: center;\"><b>How to Stay Safe<\/b><\/h2>\n<h3><b>File Backup &amp; Recovery Process<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Businesses often become so wrapped up in the fight against malware that they forget the old-fashioned dangers of the world&#8230; Floods, fires, famines (okay, maybe not so much), break-ins, mobile devices dropped down airplane toilets, tablets crushed in a fit of furious rage following a nasty Yelp review. The list goes on. Luckily, your IT department has years&#8217; worth of readily available file backups, right? Just as we continue practicing tornado drills and fire evacuations, we should perpetually practice procedures for catastrophic data loss. Understand your recovery process and ensure that file backup is delegated to an accountable party. If the worst should happen and you find your files locked away by the Ransomware Bogeyman, you can let out a sigh of relief knowing that multiple copies of your precious data are stowed away in the closet or on the cloud.<\/span><\/p>\n<h3><b>Encryption<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Did you know that banks leave thousands of dollars in cash just sitting on the street corner every day? Yes, ATMs nationwide go unrobbed routinely because they are locked down tighter than Fort Knox. Good news! This approach can work for your data as well. By encrypting the data on your network, you can prevent network intruders from walking away with your files. Even if they manage to force their way into the system! Imagine the look on a burglar\u2019s face when he walks into a house where everything is locked up in heavy-duty safes. <\/span><\/p>\n<h3><b>Disable Macros<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Microsoft disabled the automatic execution of macros in email attachments years ago, and for good reason. An example of social engineering, some phishers will attempt to persuade users into enabling macros on email attachments. If ever you are encouraged to enable macros, the request should be treated as more than a red flag. It\u2019s a whole red flag factory. Double-check that your email settings have disabled macros.<\/span><\/p>\n<h3><b>Attachments<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The classic rule of thumb for attachments is to never open one if you\u2019re unfamiliar with the sender. VBA droppers are an increasingly common delivery system for ransomware and can be packed away within several layers of file types. Even if you receive a harmless PDF file, that PDF file can hold an executable to launch a Microsoft Word file. That file can be setup to launch an RTF file, and so forth until a VBA Dropper lands on your computer before you know what\u2019s happened. So yes, it is time to have another all-hands meeting to drone on and on about not opening attachments from strangers. Seriously, your users are still opening suspicious attachments. Right this second (probably). <\/span><\/p>\n<h3><b>Administrator Access<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Your custodian doesn\u2019t require administrator-level access to your network. In fact, very few of your employees should be given this level of clearance. Why? When attackers do manage to break in, you don\u2019t want all of your users walking around with skeleton keys. Mitigate potential damage to your system by ensuring that employees are able to access and utilize the tools they need without requiring administrative access. For a better look at how <strong>not<\/strong> to tighten up your administrative model, <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/06\/21\/nsa-failed-to-implement-security-measures-says-damning-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">check out how the NSA took a crack at it.<\/a><\/span><\/p>\n<h3><b>System Updates &amp; Patches<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">WannaCry was a painful learning experience for many network administrators. For those of you still unaware, Microsoft released a patch that prevented the exploits targeted by WannaCry on March 14, 2017. Two months before the May 12th ransom worm tore the world a new one! There is a very solid line separating those affected by the worm and those that were not. Those of us who made it out unscathed kept our security patches up to date!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28f823c elementor-widget elementor-widget-image\" data-id=\"28f823c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/chessking_edited.jpg\" title=\"\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 878px; --smush-placeholder-aspect-ratio: 878\/594;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f0362d elementor-widget elementor-widget-text-editor\" data-id=\"6f0362d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The war against ransomware is never-ending and we understand if morale is low. Your network is too important to leave to chance. The data doesn&#8217;t lie: ransomware attacks are on the rise and their campaign is turning towards small and medium-sized businesses. Let Firewalls.com be your private army in the battle against ransomware. <\/span><span style=\"font-weight: 400;\">We\u2019re mean, lean, bad guy fighting machines.<\/span><\/p>\n<p style=\"text-align: center;\"><a class=\"wpex-theme-button red\" href=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/ManagedServicesBrochure-Complete.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\">LEARN HOW FIREWALLS.COM CAN PROTECT YOUR NETWORK<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ransomware is the great threat of 2017 and if your organization does not understand how to prevent an attack, you may be next on the list.<\/p>\n","protected":false},"author":5,"featured_media":12082,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[],"class_list":["post-12272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Warfare: How to build an organization&#039;s cyber security culture<\/title>\n<meta name=\"description\" content=\"Ransomware is the great threat of 2017 and if your organization does not understand how to prevent an attack, you may be next on the list.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Warfare: How to build an organization&#039;s cyber security culture\" \/>\n<meta property=\"og:description\" content=\"Ransomware is the great threat of 2017 and if your organization does not understand how to prevent an attack, you may be next on the list.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-06T17:02:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T15:55:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark-1024x609.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"609\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"Ransomware Warfare: How to Protect your Files From Hostage Takers\",\"datePublished\":\"2017-07-06T17:02:06+00:00\",\"dateModified\":\"2025-10-23T15:55:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/\"},\"wordCount\":835,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/\",\"name\":\"Ransomware Warfare: How to build an organization's cyber security culture\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark.jpg\",\"datePublished\":\"2017-07-06T17:02:06+00:00\",\"dateModified\":\"2025-10-23T15:55:06+00:00\",\"description\":\"Ransomware is the great threat of 2017 and if your organization does not understand how to prevent an attack, you may be next on the list.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark.jpg\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark.jpg\",\"width\":6000,\"height\":3570,\"caption\":\"Firewalls Ransomware Prevention Tips and Tricks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Warfare: How to Protect your Files From Hostage Takers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Warfare: How to build an organization's cyber security culture","description":"Ransomware is the great threat of 2017 and if your organization does not understand how to prevent an attack, you may be next on the list.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Warfare: How to build an organization's cyber security culture","og_description":"Ransomware is the great threat of 2017 and if your organization does not understand how to prevent an attack, you may be next on the list.","og_url":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2017-07-06T17:02:06+00:00","article_modified_time":"2025-10-23T15:55:06+00:00","og_image":[{"width":1024,"height":609,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark-1024x609.jpg","type":"image\/jpeg"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"Ransomware Warfare: How to Protect your Files From Hostage Takers","datePublished":"2017-07-06T17:02:06+00:00","dateModified":"2025-10-23T15:55:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/"},"wordCount":835,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/","url":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/","name":"Ransomware Warfare: How to build an organization's cyber security culture","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark.jpg","datePublished":"2017-07-06T17:02:06+00:00","dateModified":"2025-10-23T15:55:06+00:00","description":"Ransomware is the great threat of 2017 and if your organization does not understand how to prevent an attack, you may be next on the list.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark.jpg","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/06\/FeaturedImageRansomware_Dark.jpg","width":6000,"height":3570,"caption":"Firewalls Ransomware Prevention Tips and Tricks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Warfare: How to Protect your Files From Hostage Takers"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=12272"}],"version-history":[{"count":45,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12272\/revisions"}],"predecessor-version":[{"id":26107,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12272\/revisions\/26107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/12082"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=12272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=12272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=12272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}