Help Center>
Host Security Service (New)>
FAQs>
Intrusions>
How Do I Defend Against Ransomware Attacks?
Updated on 2024-03-25 GMT+08:00
How Do I Defend Against Ransomware Attacks?
Generally, ransomware is spread through Trojan implantation, emails, files, vulnerabilities, bundles, and storage media.
To defend against ransomware intrusions, prevent brute-force attacks and handle HSS alarms in a timely manner.
Parent topic: Intrusions
Intrusions FAQs
- How Do I View and Handle Alarms Reported by HSS?
- What Do I Do If My Servers Are Subjected to a Mining Attack?
- Why a Process Is Still Isolated After It Was Whitelisted?
- What Do I Do If a Mining Process Is Detected on a Server?
- Why Some Attacks on Servers Are Not Detected?
- Can I Unblock an IP Address Blocked by HSS, and How?
- Why a Blocked IP Address Is Automatically Unblocked?
- How Often Does HSS Detect, Isolate, and Kill Malicious Programs?
- How Often Are the HSS Virus Database and Vulnerability Database Updated?
- What Do I Do If an IP Address Is Blocked by HSS?
- How Do I Defend Against Ransomware Attacks?
- What Do I Do If HSS (New) Does Not Generate Alarms After an Upgrade from HSS (Old)?
- How Do I Add a Whitelist for High-Risk Command Execution Alarms?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbotmore