Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Stop Ransomware
 
 
  • Resources
  • Newsroom
  • Alerts
  • Report Ransomware
  • Cisa.gov
Breadcrumb
  1. Home
  2. Stop Ransomware
  3. How Can I Protect Against Ransomware?

How Can I Protect Against Ransomware?

Below are several no-cost resources to help you take a proactive approach to protecting your organization against ransomware. 

Ransomware Prevention Best Practices 

Starting on page five of the updated #StopRansomware Guide, this resource contains recommendations based on operational insight from CISA, FBI, NSA, and the MS-ISAC. 

Tips

  • Identify assets that are searchable via online tools and take steps to reduce that exposure   
  • Protecting Against Ransomware
  • Understanding Patches and Software Updates
  • Using Caution with Email Attachments
  • SMB Security Best Practices
  • Website Security
  • Rising Ransomware Threat to Operational Technology Assets 

Services

Tips and best practices for home users, organizations, and technical staff to guard against the growing ransomware threat. Additionally, CISA recommends you further protect your organization by identifying assets that are searchable via online tools and taking steps to reduce that exposure.

  • Cyber Hygiene Services: CISA offers several free scanning and testing services to help organizations assess, identify and reduce their exposure to threats, including ransomware. By requesting these services, organizations of any size could find ways to reduce their risk and mitigate attack vectors.  
  • CISA Tabletop Exercise Packages are a comprehensive set of resources designed to assist stakeholders in conducting their own exercises. Available scenarios cover a broad array of cybersecurity topics, including ransomware.
  • Malicious Domain Blocking and Reporting: This service is available for U.S. state, local, tribal, and territorial government members of the Multi-State Information Sharing and Analysis Center® and Elections Infrastructure Information Sharing and Analysis Center®, in partnership with CISA and Akamai.
  • Nationwide Cybersecurity Review: This free, anonymous, annual self-assessment designed to measure gaps and capabilities of state, local, tribal and territorial governments’ cybersecurity programs. It is based on the National Institute of Standards and Technology Cybersecurity Framework and is sponsored by DHS and the Multi-State Information Sharing and Analysis Center®.

 


Training

This information provides technical and non-technical audiences, including managers, business leaders, and technical specialists with an organizational perspective and strategic overview.

Continuous Diagnostics and Mitigation Training

  • Using the CDM Agency Dashboard to Combat WannaCry Ransomware
    This 15-minute video explains how a Federal Agency can use the CDM Agency dashboard to identify and mitigate system vulnerabilities that are exploited by the WannaCry Ransomware malware. The video, and corresponding transcript, demonstrates tasks that can be carried out in the CDM Agency dashboard to manage risks to agency systems and information that might be otherwise taken advantage of by this negative threat.
  • Vulnerability Management Using Drupal
    The 10-minute video describes how the CDM program can be used to identify and remediate cybersecurity risks through vulnerability management using the example of Drupal Security Alerts.

Incident Response Training Series

Ransomware attacks hit a new target every 14 seconds, shutting down digital operations, stealing information, and exploiting businesses, essential services, and individuals alike. “Don’t Wake Up to a Ransomware Attack” provides essential knowledge to prepare you and your organization to prevent, mitigate, and respond to the ever-growing threat of ransomware attacks. This course is specifically designed to be accessible to a non-technical audience including managers and business leaders, as well as provide an organizational perspective and strategic overview useful to technical specialists.

  • "Don't Wake Up to a Ransomware Attack" webinar recording
  • Slide Deck Presentation

Ransomware FAQs 

Follow this link for some of the most frequently asked questions about ransomware. 



 

Stop Ransomware
CONTACT
 
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback