{"id":18802,"date":"2025-07-18T12:02:50","date_gmt":"2025-07-18T00:02:50","guid":{"rendered":"https:\/\/geeksonwheels.co.nz\/?p=18802"},"modified":"2025-08-14T10:35:13","modified_gmt":"2025-08-13T22:35:13","slug":"protect-your-business-from-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/","title":{"rendered":"How to protect your business from ransomware attacks"},"content":{"rendered":"<div class=\"wp-block-post-date\"><time datetime=\"2025-07-18T12:02:50+12:00\">July 18, 2025<\/time><\/div>\n\n<div class=\"wp-block-post-author-name\">Manfred James<\/div>\n\n\n<p><em>In recent weeks, some local businesses have been pressured to shell out thousands or risk losing important data as a result of ransomware attacks. Ransomware attacks&nbsp;involve installing malicious software or malware on a computer or device that usually encrypts files, making them unusable.&nbsp;Once ransomware has found its way onto your devices or systems, there is little that can be done to recover your data<\/em>. <em> You wont be able to unencrypt files and get your business back up and running. Taking preventative measures will help you minimise the impacts of a ransomware attack. These steps will ensure you mitigate the costs and disruption to your business are effectively.&nbsp;<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-2-1-1024x576.png\" alt=\"\" class=\"wp-image-18810\" srcset=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-2-1-1024x576.png 1024w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-2-1-300x169.png 300w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-2-1-768x432.png 768w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-2-1-1536x864.png 1536w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-2-1-2048x1152.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Make regular backups of your important files.<\/h2>\n\n\n\n<p>This statement is true for your personal data and devices too. Make <a href=\"https:\/\/geeksonwheels.co.nz\/computing\/different-computer-backup-options\/\">regular backups<\/a> of all data, essential files needed for business operations. If you were to lose access to all of your recent client files today, would you be able to keep operating?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check that you or a member of your team know how to restore files from the backup, and regularly test that it is working as expected.<br><\/li>\n\n\n\n<li>Ensure you create offline <a href=\"https:\/\/geeksonwheels.co.nz\/computing\/different-computer-backup-options\/\">backups<\/a> that are kept separate, in a different location (ideally off-site), from your network and systems.<br><\/li>\n\n\n\n<li>Make sure that the devices containing your backup (such as external hard drives and USB sticks) <strong>are&nbsp;not&nbsp;permanently connected to your network or plugged into your device<\/strong>. Attackers can target connected backup devices and solutions to make recovery more difficult.<br><\/li>\n\n\n\n<li>You should ensure that your cloud service protects previous versions of the backup from being immediately deleted and allows you to restore to them.<\/li>\n<\/ul>\n\n\n\n<p>Backup accounts and solutions should be protected using <a href=\"https:\/\/geeksonwheels.co.nz\/security-safety\/cyber-security-tips\/\">2-factor or Multi-Factor Authentication (MFA)<\/a>,&nbsp;and the MFA method should not be installed on the same device that is used for the administration of backups.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-3-1-1024x576.png\" alt=\"\" class=\"wp-image-18811\" srcset=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-3-1-1024x576.png 1024w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-3-1-300x169.png 300w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-3-1-768x432.png 768w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-3-1-1536x864.png 1536w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-3-1-2048x1152.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Staff training to prevent malware infections<\/h2>\n\n\n\n<p>Make sure you and your team are familiar with identifying potential malware and are aware of the common ways ransomware infects systems. It\u2019s also a good idea to set some guidelines for best practice to help keep everyone\u2019s devices and data safe. Ransomware can find its way onto systems in different ways, some common ones include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Social Engineering:<\/strong> This could include phishing emails, persuasive phone calls or even social media messages. So, training staff on how to identify these is important.<br><\/li>\n\n\n\n<li><strong>Outdated Systems: <\/strong>Outdated devices, or software containing unpatched publicly known exploitable vulnerabilities are easy targets. Ensure your team is using up-to-date devices and software.<strong><br><\/strong><\/li>\n\n\n\n<li><strong>Malicious links\/websites: <\/strong>Just like any malware, ransomware can often find its way onto systems from malicious sites. Ensure your team isn\u2019t using their work devices for personal use and know how to identify and avoid malicious sites.<br><\/li>\n\n\n\n<li><strong>Infected physical drives: <\/strong>This method is less common today, but something to be aware of. If an unsuspecting user plugs an infected drive into your computer, it may execute malware and begin the encryption process, bypassing network security. Make sure you have guidelines around plugging drives into devices.<br><\/li>\n\n\n\n<li><strong>Device usage: <\/strong>Training around using work devices safely is important. Ensure business devices are kept for that purpose and not used for personal use.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-6-1024x576.png\" alt=\"\" class=\"wp-image-18809\" srcset=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-6-1024x576.png 1024w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-6-300x169.png 300w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-6-768x432.png 768w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-6-1536x864.png 1536w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-6-2048x1152.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Review your current network security<\/h2>\n\n\n\n<p>Many businesses, especially smaller ones, treat cybersecurity as an annoying hassle. Something they will eventually get around to, but don\u2019t always prioritise. Now is the perfect time to review your current security protocols and implement any changes needed.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Install antivirus &amp; browser protection: <\/strong>At a minimum, make sure you have antivirus and browser protection running on all devices connected to your network or those with access to your backups and important files. Even with the above training, users can still make errors and find themselves on malicious sites.<br><\/li>\n\n\n\n<li><strong>Update devices and software: <\/strong>By updating your system, you can mitigate risks associated with unpatched vulnerabilities. In simple terms, older software has security risks that newer versions have already fixed. If you don\u2019t upgrade to the newer versions, these known risks are easy for scammers to exploit.<br><\/li>\n\n\n\n<li><strong>Use MFA &amp; strong password policies: <\/strong>Multifactor authentication is an important tool for keeping your backup files secure. It can also be used to authenticate users so that if malware steals credentials, they can\u2019t easily be reused. It\u2019s also important to ensure all users are using strong, unique passwords that have no personal information and are not used for other personal logins. Read our guidelines for creating strong passwords <a href=\"https:\/\/geeksonwheels.co.nz\/security-safety\/cyber-security-tips\/\">here<\/a>.<strong><br><\/strong><\/li>\n\n\n\n<li><strong>Review and remove invalid permissions: <\/strong>This is an easy step to forget, but it\u2019s important to remove permissions after team members move on. Review this regularly. More valid user credentials are more (potentially vulnerable) entry points to your system.<br><\/li>\n\n\n\n<li><strong>Segment networks &amp; layered defence: <\/strong>Although not always possible for smaller businesses, it\u2019s a good idea to limit the access a malicious actor has if they gain access to one part of your network.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-4-1024x576.png\" alt=\"\" class=\"wp-image-18806\" srcset=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-4-1024x576.png 1024w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-4-300x169.png 300w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-4-768x432.png 768w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-4-1536x864.png 1536w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-4-2048x1152.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Have a plan<\/h2>\n\n\n\n<p>Failing to plan is planning to fail. That adage applies to cybersecurity as well. In the modern digital landscape, risks and threats are inevitable. It\u2019s important you have a plan and procedure in place for what to do if the worst should happen. Response plans can start simple and become as complex as your business or organisation requires. The basics include things like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Establish critical data and assets:<\/strong> Understand the impact a malware attack may have on your most important devices.<br><\/li>\n\n\n\n<li><strong>Decide who needs to know what:<\/strong> A quick response is vital to limiting the fallout of a ransomware attack, so it\u2019s important to establish who needs to be contacted at the first sign of an attack.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Discuss how you will respond: <\/strong>It\u2019s important you\u2019ve thought about how you will respond to the ransom demand and what your first steps will be to protect your systems.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-5-1024x576.png\" alt=\"\" class=\"wp-image-18807\" srcset=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-5-1024x576.png 1024w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-5-300x169.png 300w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-5-768x432.png 768w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-5-1536x864.png 1536w, https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Ransomware-5-2048x1152.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Should I pay the ransom?<\/h2>\n\n\n\n<p>The New Zealand Government strongly discourages the payment of ransoms to cybercriminals according to their <a href=\"https:\/\/www.dpmc.govt.nz\/our-programmes\/national-security\/cyber-security-strategy\/cyber-ransom-advice\"><strong>guidance on cyber ransom payments<\/strong><\/a><strong>. <\/strong>The government guidelines go on to outline the implications of paying a ransom, which include.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>No guarantee<\/strong> of the end of an incident, or the removal of malicious software. It does not guarantee that you will get your data back.<br><\/li>\n\n\n\n<li><strong>Creating a financial incentive<\/strong> for criminals to continue or expand their activities, including potentially targeting you again.<\/li>\n<\/ul>\n\n\n\n<p><em>If you haven&#8217;t put a plan in place for how to manage ransomware risks and respond to attacks, then now&#8217;s the best time to get started! Reach out to the friendly Geeks on Wheels team for some friendly support and advice on <\/em><a href=\"tel:0800424335\"><em>0800 424 335<\/em>.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent weeks, some local businesses have been pressured to shell out thousands or risk losing important data as a result of ransomware attacks. Ransomware attacks&nbsp;involve installing malicious software or malware on a computer or device that usually encrypts files, making them unusable.&nbsp;Once ransomware has found its way onto your devices or systems, there is [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":18812,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,25,1],"tags":[731,658,730],"class_list":["post-18802","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computing","category-security-safety","category-uncategorized","tag-business-technology","tag-malware","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to protect your business from ransomware attacks - Geeks on Wheels<\/title>\n<meta name=\"description\" content=\"Create a plan to prevent ransomware attacks and respond quickly if they do occur. 1.Back-up important data 2.Ensure staff are trained 3.review current security practices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your business from ransomware attacks - Geeks on Wheels\" \/>\n<meta property=\"og:description\" content=\"Create a plan to prevent ransomware attacks and respond quickly if they do occur. 1.Back-up important data 2.Ensure staff are trained 3.review current security practices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Geeks on Wheels\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GeeksOnWheels\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-18T00:02:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T22:35:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Tech-Myths-Cover-Photo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Manfred James\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Geeks_Tweet\" \/>\n<meta name=\"twitter:site\" content=\"@Geeks_Tweet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manfred James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/\"},\"author\":{\"name\":\"Manfred James\",\"@id\":\"https:\/\/geeksonwheels.co.nz\/#\/schema\/person\/9282445aaddeb85cb6644da9378ec5ea\"},\"headline\":\"How to protect your business from ransomware attacks\",\"datePublished\":\"2025-07-18T00:02:50+00:00\",\"dateModified\":\"2025-08-13T22:35:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/\"},\"wordCount\":1128,\"publisher\":{\"@id\":\"https:\/\/geeksonwheels.co.nz\/#organization\"},\"keywords\":[\"business technology\",\"Malware\",\"ransomware\"],\"articleSection\":[\"Computing\",\"Security &amp; Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/\",\"url\":\"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/\",\"name\":\"How to protect your business from ransomware attacks - Geeks on Wheels\",\"isPartOf\":{\"@id\":\"https:\/\/geeksonwheels.co.nz\/#website\"},\"datePublished\":\"2025-07-18T00:02:50+00:00\",\"dateModified\":\"2025-08-13T22:35:13+00:00\",\"description\":\"Create a plan to prevent ransomware attacks and respond quickly if they do occur. 1.Back-up important data 2.Ensure staff are trained 3.review current security practices\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/geeksonwheels.co.nz\/#website\",\"url\":\"https:\/\/geeksonwheels.co.nz\/\",\"name\":\"Geeks on Wheels\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/geeksonwheels.co.nz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/geeksonwheels.co.nz\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/geeksonwheels.co.nz\/#organization\",\"name\":\"Geeks on Wheels\",\"url\":\"https:\/\/geeksonwheels.co.nz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/geeksonwheels.co.nz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2023\/12\/logo-tech.png\",\"contentUrl\":\"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2023\/12\/logo-tech.png\",\"width\":480,\"height\":80,\"caption\":\"Geeks on Wheels\"},\"image\":{\"@id\":\"https:\/\/geeksonwheels.co.nz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/GeeksOnWheels\",\"https:\/\/twitter.com\/Geeks_Tweet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/geeksonwheels.co.nz\/#\/schema\/person\/9282445aaddeb85cb6644da9378ec5ea\",\"name\":\"Manfred James\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/geeksonwheels.co.nz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b1ec9ba321c0b1ff29b43862e62ec2d21914809aee4ec0f8f6108323a5b4b32e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b1ec9ba321c0b1ff29b43862e62ec2d21914809aee4ec0f8f6108323a5b4b32e?s=96&d=mm&r=g\",\"caption\":\"Manfred James\"},\"url\":\"https:\/\/geeksonwheels.co.nz\/author\/manfred\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your business from ransomware attacks - Geeks on Wheels","description":"Create a plan to prevent ransomware attacks and respond quickly if they do occur. 1.Back-up important data 2.Ensure staff are trained 3.review current security practices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How to protect your business from ransomware attacks - Geeks on Wheels","og_description":"Create a plan to prevent ransomware attacks and respond quickly if they do occur. 1.Back-up important data 2.Ensure staff are trained 3.review current security practices","og_url":"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/","og_site_name":"Geeks on Wheels","article_publisher":"https:\/\/www.facebook.com\/GeeksOnWheels","article_published_time":"2025-07-18T00:02:50+00:00","article_modified_time":"2025-08-13T22:35:13+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Tech-Myths-Cover-Photo.png","type":"image\/png"}],"author":"Manfred James","twitter_card":"summary_large_image","twitter_creator":"@Geeks_Tweet","twitter_site":"@Geeks_Tweet","twitter_misc":{"Written by":"Manfred James","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/"},"author":{"name":"Manfred James","@id":"https:\/\/geeksonwheels.co.nz\/#\/schema\/person\/9282445aaddeb85cb6644da9378ec5ea"},"headline":"How to protect your business from ransomware attacks","datePublished":"2025-07-18T00:02:50+00:00","dateModified":"2025-08-13T22:35:13+00:00","mainEntityOfPage":{"@id":"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/"},"wordCount":1128,"publisher":{"@id":"https:\/\/geeksonwheels.co.nz\/#organization"},"keywords":["business technology","Malware","ransomware"],"articleSection":["Computing","Security &amp; Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/","url":"https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/","name":"How to protect your business from ransomware attacks - Geeks on Wheels","isPartOf":{"@id":"https:\/\/geeksonwheels.co.nz\/#website"},"datePublished":"2025-07-18T00:02:50+00:00","dateModified":"2025-08-13T22:35:13+00:00","description":"Create a plan to prevent ransomware attacks and respond quickly if they do occur. 1.Back-up important data 2.Ensure staff are trained 3.review current security practices","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/geeksonwheels.co.nz\/security-safety\/protect-your-business-from-ransomware-attacks\/"]}]},{"@type":"WebSite","@id":"https:\/\/geeksonwheels.co.nz\/#website","url":"https:\/\/geeksonwheels.co.nz\/","name":"Geeks on Wheels","description":"","publisher":{"@id":"https:\/\/geeksonwheels.co.nz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/geeksonwheels.co.nz\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/geeksonwheels.co.nz\/#organization","name":"Geeks on Wheels","url":"https:\/\/geeksonwheels.co.nz\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/geeksonwheels.co.nz\/#\/schema\/logo\/image\/","url":"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2023\/12\/logo-tech.png","contentUrl":"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2023\/12\/logo-tech.png","width":480,"height":80,"caption":"Geeks on Wheels"},"image":{"@id":"https:\/\/geeksonwheels.co.nz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GeeksOnWheels","https:\/\/twitter.com\/Geeks_Tweet"]},{"@type":"Person","@id":"https:\/\/geeksonwheels.co.nz\/#\/schema\/person\/9282445aaddeb85cb6644da9378ec5ea","name":"Manfred James","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/geeksonwheels.co.nz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b1ec9ba321c0b1ff29b43862e62ec2d21914809aee4ec0f8f6108323a5b4b32e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b1ec9ba321c0b1ff29b43862e62ec2d21914809aee4ec0f8f6108323a5b4b32e?s=96&d=mm&r=g","caption":"Manfred James"},"url":"https:\/\/geeksonwheels.co.nz\/author\/manfred\/"}]}},"jetpack_featured_media_url":"https:\/\/geeksonwheels.co.nz\/wp-content\/uploads\/2025\/07\/Tech-Myths-Cover-Photo.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/posts\/18802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/comments?post=18802"}],"version-history":[{"count":3,"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/posts\/18802\/revisions"}],"predecessor-version":[{"id":18981,"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/posts\/18802\/revisions\/18981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/media\/18812"}],"wp:attachment":[{"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/media?parent=18802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/categories?post=18802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/geeksonwheels.co.nz\/wp-json\/wp\/v2\/tags?post=18802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}