How to Prevent Ransomware in Windows

It usually happens on a Friday afternoon. You are finishing up work. You open an email attachment that looks like an invoice or a shipping notification. You click “Enable Content.” And then, your wallpaper changes. A red screen appears with a countdown timer. All your files your photos, your tax returns, your unfinished novel are now called document.docx.encrypted. There is a note demanding $2,000 in Bitcoin to get the key.

If you live in North America, the UK, or Australia, you are the primary target. Ransomware gangs don’t waste time on low-income regions; they hunt where the digital wallets are fat. And contrary to popular belief, you don’t need to be a tech genius to stop them. You just need to close the doors they usually climb through.

Here is how to harden your Windows PC so you never have to negotiate with a digital terrorist.

1. The “File Extension” Trick (Stop Flying Blind)

By default, Windows hides file extensions to make things look “clean.” This is a security nightmare. If you can’t see the extension, you can’t see the trap. Hackers love to name a file invoice_pdf.exe. If Windows hides the extension, all you see is invoice_pdf. You think it’s a document. You click it. It runs a program (exe) that encrypts your drive.

The Fix: Open File Explorer. Click View > Show > File Name Extensions. Now, if a file says .exe or .vbs or .scr, you know it is software, not a document. If a “PDF” asks to run as a program, delete it immediately.

2. Disable RDP (The Open Door)

If you are reading this in the US or Europe, you probably have a fast internet connection. Hackers love scanning these IP ranges for Remote Desktop Protocol (RDP) ports that are left open. RDP is a feature that lets you control your PC from another location. If you don’t use it (and most home users don’t), it is like leaving your front door wide open with a “Welcome” mat.

The Fix:

  1. Type “Remote Desktop settings” into your Windows search bar.

  2. Turn the toggle to Off. That’s it. You just closed the #1 entry point for automated ransomware attacks.

3. Enable “Controlled Folder Access” (The Secret Weapon)

This is a feature built into Windows 10 and 11 that almost nobody talks about. It essentially tells Windows: “Only specific, trusted apps are allowed to change files in my Documents folder.” If a ransomware virus tries to encrypt (change) your photos, Windows blocks it instantly because virus.exe is not on the VIP list.

How to turn it on:

  1. Open Windows Security (the shield icon).

  2. Go to Virus & threat protection.

  3. Scroll down to Ransomware protection and click Manage ransomware protection.

  4. Turn Controlled folder access to On. Warning: This might occasionally block a legit game or app. If that happens, just click the notification and select “Allow app.” It’s a tiny annoyance for massive protection.

4. The “3-2-1” Backup Rule (The Nuclear Option)

Let’s be honest: Antivirus can fail. You might accidentally click a bad link. The only 100% cure for ransomware is having a copy of your data that the hackers cannot touch. If your PC gets locked, you don’t pay. You wipe the drive and restore from backup.

The Rule:

  • 3 Copies of your data.

  • 2 Different media types (e.g., your laptop drive + the cloud).

  • 1 Copy Offline.

That last one is crucial. If you have an external hard drive plugged into your PC 24/7, the ransomware will encrypt that too. The Fix: Buy a cheap USB drive. Back up your critical files once a week. Unplug it and put it in a drawer. If it’s not connected, they can’t hack it.

5. Stop Using “Admin” Accounts Daily

When you set up Windows, it makes you an Administrator by default. This feels convenient, but it means if you get infected, the virus has Administrator privileges. It can delete backups, disable antivirus, and destroy the system.

The Strategy: Create a second “Standard User” account for daily use (browsing, email, Netflix). Only log into the Admin account when you need to install software. If you get a virus while on the Standard account, the damage is often limited to that one user profile, leaving the core system safe.

6. The “Macro” Trap in Office

If you work in a corporate environment in London or New York, you deal with Word and Excel docs all day. Hackers know this. They send emails with “Resume” or “Invoice” attachments that contain malicious Macros (tiny scripts). When you open the doc, a yellow bar appears: “Macros have been disabled. Enable Content?”

Do. Not. Click. It. Unless you literally wrote the macro yourself or you trust the sender with your life, never enable content. That button is the launch codes.

If the worst happens and you see that red screen… Do not pay the ransom. Statistics show that 40% of people who pay still don’t get their data back. They just get asked for more money. Prepare now. Turn on Controlled Folder Access. Unplug your backup drive. Make yourself a hard target, and the hackers will move on to someone easier.

Leave a Comment