{"id":55327,"date":"2016-08-24T09:25:06","date_gmt":"2016-08-24T16:25:06","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=55327"},"modified":"2017-10-16T16:05:36","modified_gmt":"2017-10-16T23:05:36","slug":"a-laymans-guide-to-ransomware-protection","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/","title":{"rendered":"A Layman\u2019s Guide to Ransomware Protection for Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-55498\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/ransomware-protection.png\" alt=\"Ransomware Protection Begins with a Smart Backup Strategy\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/ransomware-protection.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/ransomware-protection-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/ransomware-protection-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Ransomware is no longer the exclusive Windows-only scare it once was. The first Mac ransomware was discovered in March\u00a0of this year, and it&#8217;s only a matter of time before the next one rears its ugly head.<\/p>\n<p>As no-one can tell you what the infection vector will be, how it will work exactly or what types of files it will go after, how do you prepare for it?<\/p>\n<p>As with any good security strategy, for\u00a0ransomware protection the best defense is made up of multiple layers. The first layer begins\u00a0with <a href=\"https:\/\/www.intego.com\/products\" target=\"_blank\">a trusted\u00a0security suite<\/a> that monitors your system for malware and checks your web and network traffic for malicious content. The next defense layer is you. By not downloading content or opening email attachments from untrusted sources you greatly reduce risk of infection. Another layer is backups. Making sure your data is safe is the main priority and a smart\u00a0backup strategy should be in place even if your Mac is not connected to the Internet. Let&#8217;s face it, at some point every hard drive or solid state drive fails, even if it&#8217;s never been touched by malware.<\/p>\n<p>OS X&#8217;s <a href=\"https:\/\/www.intego.com\/mac-security-blog\/time-machine-basics-how-to-keep-your-data-backed-up\/\" target=\"_blank\">built-in backup solution Time Machine<\/a> is a good first step on the road to securing your files. Use it to backup your data to an external hard drive, local server, a Time Capsule or all of the above.\u00a0I say Time Capsule is a good first step because, even though it&#8217;s very easy to set up, it&#8217;s very limited in functionality. Also, the ransomware that was recently discovered (and surely future ransomware as well) encrypted files on external drives and mounted network shares as well!<\/p>\n<p>Now don\u2019t start celebratory drinking just yet, you have options!<\/p>\n<h3>A\u00a0day in the life of ransomware<\/h3>\n<p>Ransomware typically infects a computer and lies dormant. Ransomware creators need to find the sweet spot between infecting as many computers as possible, encrypting the data on them, and word of the ransomware getting out.<\/p>\n<p>If a computer is infected and files start being encrypted right away, word of the ransomware will get out; antivirus companies will quickly update their products and thwart chances of infecting more computers. The end result may be just a hand full of computers infected.<\/p>\n<p>If the ransomware installs but doesn\u2019t do anything for a few days, chances of people knowing it exists are much smaller. This gives the ransomware more time to infect a lot more computers. After a few days, the ransomware contacts a Command &amp; Control (C&amp;C) server for instructions. If the C&amp;C server gives the OK to get to work, suddenly thousands or hundreds of thousands of Macs across the globe will start having their files encrypted. By the time the alarm bell is rung and the world is aware, it will be too late for all those that are infected. In that scenario the potential payout for the people behind the ransomware is huge.<\/p>\n<p>Leaving the ransomware dormant for too long also increases the risks of it being detected. Security researchers and antivirus companies are always looking for new malware and even when dormant, ransomware leaves a trace that can be discovered by those highly skilled people.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-hit-by-rare-ransomware-attack-spread-via-transmission-bittorrent-app\/\" target=\"_blank\">KeRanger<\/a>, the previously mentioned Mac Ransomware, laid dormant for three days before it sprung into action. The next ransomware may take a week or longer.<\/p>\n<h3>You mentioned something about options?<\/h3>\n<p>Indeed I did. We want a backup solution that can backup to multiple destinations, at a schedule of our choosing and offer a variety of backup types and settings. Time Machine can back up to multiple drives,\u00a0but the type of backup destination is limited and the schedule you set applies to all backup destinations.<\/p>\n<p>Luckily for Intego customers that utilize <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\" target=\"_blank\">Mac Premium Bundle<\/a>, a backup utility is available that does everything you\u00a0may need. <a href=\"https:\/\/www.intego.com\/mac-protection-bundle#personal-backup-109\" target=\"_blank\">Personal Backup<\/a> can:<\/p>\n<ul>\n<li>Back up to an external drive, local network share (AFP, SMB, FTP), remote server share or sync data 1:1 with another Mac.<\/li>\n<li>Perform simple clone backups, backups with versioning, bootable backups or synchronize.<\/li>\n<li>Set a schedule you like. Hourly, daily, weekly on any day or multiple days of your choosing, monthly or several selected days per month.<\/li>\n<li>Configure advanced settings. Not pre-set ones, no, customize them any way you want using Automator actions! These actions can be configured to run before starting a backup, after a backup or both.<\/li>\n<li>Easily restore files from any of your configured backup tasks. Browsing your backups is easy and you can restore files to their original location or select a new location.<\/li>\n<li>Set a notification schedule if a backup has not been done for 1 or more days.<\/li>\n<li>Send a status email to let you know if a backup was completed successfully.<\/li>\n<li>Does not conflict with Time Machine so both can be used if desired.<\/li>\n<\/ul>\n<h3>How will backups provide\u00a0ransomware protection?<\/h3>\n<p>This is where the additional features prove to be a great value. The way your backup destinations connect to your Mac are no different and can potentially be attacked by ransomware. The potential key to saving your files if you are hit by ransomware is time between backups and only making your backup destinations available at the time of those backups. After all, if ransomware can&#8217;t access the backup, it can&#8217;t encrypt your files.<\/p>\n<p>Now there are a lot of different ways to skin this particular kitty, but let\u2019s assume you have one external hard drive and a Time Capsule. Of course, if you have multiple external drives and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/bring-an-old-mac-to-life-with-os-x-server\/\" target=\"_blank\">an OS X server running<\/a>, your schedules can be a lot more complex than what I am about to describe.<\/p>\n<p>With the Time Capsule and external drive available, you can configure the following backups:<\/p>\n<ul>\n<li>Hourly backups to your Time Capsule using Time Machine.<br \/>\nYou have it built-in to your OS so there is no reason not to use it.<\/li>\n<li>Daily, weekly, bi-weekly and even monthly backups to your external hard drive using Personal Backup.<br \/>\nIf space allows, divide your external drive in multiple partitions. One for daily, weekly and bi-weekly backups. For help with partitioning, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/manage-disks-volumes-osx-disk-utility\/\" target=\"_blank\">have a look here<\/a>.<\/li>\n<\/ul>\n<p>Your Personal Backup schedule and partitions would look something like this:<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Final-setup.jpg\"><img loading=\"lazy\" class=\" wp-image-55333 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Final-setup.jpg\" alt=\"Intego Personal Backup sample schedule and partitions\" width=\"500\" height=\"249\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Final-setup.jpg 992w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Final-setup-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Final-setup-300x149.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Final-setup-657x327.jpg 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Let\u2019s walk through the setup of the daily backup.<\/p>\n<p>Fire up Personal Backup and you will be asked to create a Backup task.<\/p>\n<ol>\n<li>Name your task \u201cMy Daily Backups\u201d or something that easily identifies the schedule it keeps.<\/li>\n<li>Select your backup source. This can be your home folder, a set of folders of your choosing or your entire hard drive. If you want to backup your whole drive though, it&#8217;s best to create a bootable backup instead. If you can not afford any downtime, a bootable backup as the name implies will allow you to start up from your external drive and keep on working.<\/li>\n<li>Select your backup destination.<\/li>\n<li>How often you want to back up in this case is daily so the default setting should be ok to use. However if you use a laptop or your Mac is powered off after a certain time, it\u2019s best to select the exact time you want the backup to start every day. This way you\u2019ll know the Mac is on and able to run the backup. To do this, click the \u201cOther..\u201d button. You may also want to enable the \u201cWake computer if needed\u201d and \u201cKeep computer awake during task\u201d options.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FrequencyOptions.jpg\"><img loading=\"lazy\" class=\" wp-image-55336 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FrequencyOptions.jpg\" alt=\"Intego Personal Backup frequency settings\" width=\"500\" height=\"151\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FrequencyOptions.jpg 588w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FrequencyOptions-150x45.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FrequencyOptions-300x91.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/li>\n<li>Now the fun stuff. Under \u201cAdvanced settings\u201d click the \u201cChange..\u201d button. In the window that appears you can change options, permissions and exclusions which you can set to fit your needs. What we are after here is the \u201cAfter running\u201d option. Click the \u201cPerform Actions\u201d checkbox and a panel of Automator actions will open. Run a search for \u201ceject\u201d and one of the results will be the \u201cEject Disk\u201d action. Drag this to the drop area that appeared when you clicked the checkbox.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/AdvancedSettings.jpg\"><br \/>\n<\/a><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/AdvancedSettings.jpg\"><img loading=\"lazy\" class=\" wp-image-55339 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/AdvancedSettings.jpg\" alt=\"Intego Personal Backup Advanced Settings Automator Actions\" width=\"500\" height=\"410\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/AdvancedSettings.jpg 1073w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/AdvancedSettings-150x123.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/AdvancedSettings-300x246.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/AdvancedSettings-1024x839.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/AdvancedSettings-657x538.jpg 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><br \/>\nHere you can also choose to encrypt your backup. If others have access to your external drive or if you carry the drive with you in a laptop bag for example, encryption is a good idea.<br \/>\n\u2022 Apply the changes.<br \/>\n\u2022 The end result should look something like this.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/DailyBackup.jpg\"><img loading=\"lazy\" class=\" wp-image-55342 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/DailyBackup.jpg\" alt=\"Intego Personal Backup create a task\" width=\"500\" height=\"484\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/DailyBackup.jpg 865w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/DailyBackup-150x145.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/DailyBackup-300x290.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/DailyBackup-657x636.jpg 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><br \/>\n\u2022 Click the \u201cAdd\u201d button and your task will be saved. The first backup will begin in a few minutes.<\/li>\n<\/ol>\n<p>When you set all your backup tasks, go ahead and eject all the hard drive partitions from your desktop.<br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/EjectPartitions.png\"><img loading=\"lazy\" class=\" wp-image-55348 size-full aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/EjectPartitions.png\" alt=\"Select all partitions and right click to eject\" width=\"313\" height=\"440\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/EjectPartitions.png 313w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/EjectPartitions-107x150.png 107w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/EjectPartitions-213x300.png 213w\" sizes=\"(max-width: 313px) 100vw, 313px\" \/><\/a><br \/>\nPersonal Backup will mount them when needed and eject it when done. Ejecting the partitions is an important step. Make sure you eject your backup partitions after each computer restart as well. Here you can see Personal Backup mount the disk, make the backup and eject when done:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/PersonalBackupMountUnmount.gif\"><img loading=\"lazy\" class=\" wp-image-55345 size-full aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/PersonalBackupMountUnmount.gif\" alt=\"Intego Personal backup mount and unmount in action\" width=\"498\" height=\"246\" \/><\/a><\/p>\n<p>Run through these steps for your weekly and bi-weekly tasks and you end up with a solid backup strategy in place. Chances of your weekly or bi-weekly backups surviving a ransomware\u2019s dormant period are good.<\/p>\n<p>Finally, open up the Personal Backup preferences. Here you can set how soon you want to be notified if a backup has not been completed and you can fill out a notification email.<br \/>\n<img loading=\"lazy\" class=\" wp-image-55363 size-full aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Preferences.jpg\" alt=\"Intego Personal backup Preferences\" width=\"474\" height=\"247\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Preferences.jpg 474w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Preferences-150x78.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/Preferences-300x156.jpg 300w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><br \/>\nYou will be alerted when a backup was successful or if it for some reason failed immediately. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-personal-backup-compared-with-apples-time-machine\/\" target=\"_blank\">Compare that to Time Machine<\/a>, which does not let you know a backup failed to run for 24 hours or longer! Here are two examples of the email notification:<br \/>\n<img loading=\"lazy\" class=\" wp-image-55426 size-full aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/notifications.jpg\" alt=\"Email notifications\" width=\"500\" height=\"128\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/notifications.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/notifications-150x38.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/notifications-300x77.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>With backups running every day, every week and every two weeks and the backup drives being mostly unavailable to the system, the chances of your data surviving a ransomware infection are greatly improved.<\/p>\n<p>If you have access to off-site servers, you can set up additional weekly or even monthly backups to those destinations. Even a server that hosts your website can provide FTP access and a small chunk of space, which might be enough to make bi-weekly backups of your documents folder or other important data. Depending on your available resources, you can create very complex and redundant backup schedules.<\/p>\n<p><strong>What does your backup strategy look like? Let us know in the comments!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As with any smart security strategy, for ransomware protection the best defense is made up of multiple layers. This guide explains how to survive ransomware attacks.<\/p>\n","protected":false},"author":79,"featured_media":55366,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,151,13],"tags":[31,32,1294,101,109,3085,1288],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As with any smart security strategy, for ransomware protection the best defense is made up of multiple layers. This guide explains how to survive ransomware attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Layman\u2019s Guide to Ransomware Protection for Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As with any smart security strategy, for ransomware protection the best defense is made up of multiple layers. This guide explains how to survive ransomware attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-24T16:25:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-16T23:05:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/\",\"name\":\"A Layman\\u2019s Guide to Ransomware Protection for Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#primaryimage\"},\"datePublished\":\"2016-08-24T16:25:06+00:00\",\"dateModified\":\"2017-10-16T23:05:36+00:00\",\"description\":\"As with any smart security strategy, for ransomware protection the best defense is made up of multiple layers. This guide explains how to survive ransomware attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Layman\\u2019s Guide to Ransomware Protection for Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"A Layman\\u2019s Guide to Ransomware Protection for Mac\",\"datePublished\":\"2016-08-24T16:25:06+00:00\",\"dateModified\":\"2017-10-16T23:05:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#webpage\"},\"wordCount\":1684,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg\",\"keywords\":[\"Backup\",\"Backups\",\"Intego Personal Backup\",\"Personal Backup\",\"Ransomware\",\"Think Security\",\"Time Machine\"],\"articleSection\":[\"How To\",\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As with any smart security strategy, for ransomware protection the best defense is made up of multiple layers. This guide explains how to survive ransomware attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/","og_locale":"en_US","og_type":"article","og_title":"A Layman\u2019s Guide to Ransomware Protection for Mac - The Mac Security Blog","og_description":"As with any smart security strategy, for ransomware protection the best defense is made up of multiple layers. This guide explains how to survive ransomware attacks.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-08-24T16:25:06+00:00","article_modified_time":"2017-10-16T23:05:36+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/","name":"A Layman\u2019s Guide to Ransomware Protection for Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#primaryimage"},"datePublished":"2016-08-24T16:25:06+00:00","dateModified":"2017-10-16T23:05:36+00:00","description":"As with any smart security strategy, for ransomware protection the best defense is made up of multiple layers. This guide explains how to survive ransomware attacks.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"A Layman\u2019s Guide to Ransomware Protection for Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"A Layman\u2019s Guide to Ransomware Protection for Mac","datePublished":"2016-08-24T16:25:06+00:00","dateModified":"2017-10-16T23:05:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#webpage"},"wordCount":1684,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg","keywords":["Backup","Backups","Intego Personal Backup","Personal Backup","Ransomware","Think Security","Time Machine"],"articleSection":["How To","Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/a-laymans-guide-to-ransomware-protection\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/FeaturedImage.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-eon","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/55327"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=55327"}],"version-history":[{"count":46,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/55327\/revisions"}],"predecessor-version":[{"id":71047,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/55327\/revisions\/71047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/55366"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=55327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=55327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=55327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}