Cybersecurity Best Practices to STOP Ransomware Attacks in Their Tracks

Untitled design (4)

Cybersecurity Best Practices to Help Prevent Ransomware Attacks in Their Tracks

Ransomware attacks have skyrocketed over the past year.

Why? The pandemic.

When businesses were scrambling to set up remote work environments, they extended networks further than they’d ever planned. Between concern for the virus and figuring out how to keep businesses open addressing safety concerns for employees and clients, IT security wasn’t always the top priority.

That, unfortunately, was a huge mistake.

The sad and ugly truth is that cybercriminals have jumped on the opportunity to exploit businesses at their most vulnerable.

  • Cyberattacks have increased by over 600% since the beginning of the pandemic
  • Over 350,000 new malware attacks are detected every day
  • Ransomware was responsible for $20 Billion in global damages

It’s never been more important to protect your IT environment by implementing cybersecurity best practices. You don’t have to go it alone. Having a trusted IT solutions provider in your corner can mean the difference between continued operations in this new landscape or closing your doors for good.

When Microsoft recently discovered vulnerabilities in its on-premises versions of Microsoft Exchange Server, the Compudyne team worked through the night to ensure our clients were secured. That’s the level of dedication you can expect from us. Read more about our response.





The good news is this: there are actions you and your IT team can take TODAY to secure your environment against external threats. These recommendations are the tip of the iceberg that is IT security, but they’re the start of a solid foundation that protects your environment and your business.



We’re now over a year into the global pandemic, and work as we know it has changed forever. For companies that don’t need bodies in the office every day, remote work is here to stay. Have you done everything in your power to secure your employee’s remote work environments? Consider the following to get the ball rolling:

      • Evaluate logins and passwords and adhere to best practices. Use multi-factor authentication whenever possible.
      • Assess each device being used remotely – are the necessary security and compliance measures in place?
      • Consider a layered security approach – Compudyne’s baseline security offerings help keep your business secure and connected. They’re a great place to start.


When an employee moves to a different department or leaves the company, what’s the process for handling their user accounts? Does your company have clearly defined parameters for which employees can access particular systems, programs, or applications? What happens with old accounts – are they just hanging out there, or have they been closed or removed from your systems and portals?

Not every employee needs access to your entire system, but managing varying levels of permissions can get complicated fast. Add in the fact that every dormant account is a potential network weakness, and it’s easy to see why regular maintenance is essential to your network’s overall health. Cybercriminals can use these accounts to gain access to your systems and data – don’t make it easy for them.



One click. One seemingly innocent click on a link that looks and feels legitimate is all it takes to put your entire network at risk. Do your employees know what to look out for? Can they spot a phishing email when it comes through their inbox? If they haven’t been taught what’s out there, they’ll have no idea how to prevent ransomware attacks.

Compudyne's Security and Awareness Training is dedicated to this but our ransomware eBook is a great place to start. This resource provides background information on ransomware attacks and solid next steps for what to do before, during and after a security breach.

Remember, EVERY company is vulnerable. It’s up to you to protect yours from anything and everything, and Compudyne is here to help.


Download the Ransomware eBook