Skip to main content
Microsoft 365
November 18, 2022

Is All Anti-Ransomware Software Created Equally?

Ransomware attacks all have the same thing in common: to get you or your organization to pay a ransom to retrieve data or information locked down due to malicious code.

Two smiling people sitting on a couch looking at a laptop screen in front of them.

However, the way a scammer goes about their approach to reach a target and carry out their attack is different. If all attacks were the same there would be a simple ransomware protection solution that would keep everyone’s information safe without having to change or update it. But alas, this is not the case, and not all anti-ransomware software is created equally. To help better understand how to protect yourself and your family, we’ve compiled some of the different types of ransomware and how the right software can combat it.

Locker ransomware. Nothing is more frustrating than when your computer locks up or crashes. We often feel like we’d be willing to do whatever it takes to get our computers back up and running the way they’re supposed to. A computer that’s locked up could be the result of a ransomware attack and display a pop-up window that requires you to pay a ransom to unlock your device. Removing locker ransomware can be difficult because you’re not able to navigate your desktop. Restarting your computer in Safe Mode should allow you to run a scan and remove malware. These processes are often best performed disconnected from your internet connection to ensure the hacker on the other end no longer has access to your device.

Microsoft Defender Banner
Microsoft 365 Logo

Microsoft Defender

Stay safer online with one easy-to-use app1

1Microsoft 365 Personal or Family subscription required; app available as separate download

Learn More

Double extorsion ransomware or leakware. Corporations, medical providers, and other organizations that hold sensitive information for clients, customers, and patients are required by law to keep it safe. Double extorsion ransomware or leakware is put in place by a scammer who holds the information hostage for a ransom with the threat of publishing or leaking the information across the internet. This type of data breach can be incredibly costly in terms of fines, lawsuits, and paying the owner of ransomware. Of course, the problem with ransomware, in general, is that the information could still be published, deleted, or encrypted even after you pay the ransom!

Crypto ransomware. The most common type of ransomware is crypto ransomware. Users will run into a paywall that offers to send an encrypted key upon receive of a ransom. The average computer user won’t be able to decrypt crypto ransomware, so using antivirus software with a decryption tool is best. Trying to figure out the decryption could activate a fail-safe that’s built into the software that wipes out your computer.

Two people sitting next to each other at a table having a discussion about information on the laptop in front of them.
“Information could still be published, deleted, or encrypted even after you pay the ransom!”

Scareware. It’s a scary feeling getting an alert on your device that says you have malware, which is one tactic used by hackers with scareware. A message might pop up that says you have a virus or you’re at risk of getting one, so you need to pay to download new antivirus software. The reality of this method is that the message itself is malware. Users will click the link and pay the fee to download “updated antivirus software” to keep you protected. Users can avoid this scam by knowing what kind of antivirus software they use, keeping it updated, and avoiding suspicious pop-up windows on their computers.

What do I need for ransomware protection? Knowing how to protect against ransomware comes down to your computer habits as well as the antivirus software you choose. Good software can create a buffer between you and ransomware, which will scan email attachments and websites for malware before you complete a download by looking for red flags like sketchy email subjects, message phrasing, and more. Additionally, your ransomware protection should include a feature that will minimize the damage of a successful attack by quarantining malicious code to a location on your hard drive where it can’t affect your device.

Your antivirus software should also provide ransomware protection backup and recovery. Sometimes your best option is to restore your device to a time before you downloaded ransomware. Backup and recovery services allow you to clear everything off your hard drive between the time of your most recent backup. Your antivirus software can create backups of your most important files so they’re not lost when you restore your system.

Having anti-ransomware software on your computer to protect yourself from attacks is essential. In addition to software, always be aware of links that come to your email inbox and websites you visit. Vigilance can provide more protection against ransomware than the most advanced antivirus software.

Get started with Microsoft 365

It’s the Office you know, plus the tools to help you work better together, so you can get more done—anytime, anywhere.

Buy Now

Topics in this article

Microsoft 365 Word, Excel, PowerPoint, Outlook, OneDrive, and Family Safety Apps
Microsoft 365 Logo

Everything you need to achieve more in less time

Get powerful productivity and security apps with Microsoft 365

Buy Now

Explore Other Categories