We try to minimize as much as we can any potential ransomware attacks by following certain important principles including in the underneath.

  1. Be aware to phishing attempts and other social engineering tactics used by attackers to deliver ransomware.
  2. Enforcing the least privilege limit to user access rights to restrict the spread of ransomware
  3. Keep all software and operating systems up to date with latest patches
  4. Maintaining mirror systems for databases to ensure easy recovery of any affected systems

Upon detection of a ransomware attack this the policy to be adopted