These documents from Sophos explain how to react quickly and effectively to the threats posed by ransomware such as Cryptowall, TeslaCrypt and Locky. The first details the mechanisms that these infections use to find their way into companies and why a large number of new infections continue to surface despite existing protective measures. Then provides practical recommendations to protect against them, showing how these threats can be tackled using short-term and longterm technical and organizational measures. It also includes optimal configuration settings for Sophos solutions to protect against ransomware.
The second explains why ransomware crimes are so successful and different security flaws that can lead to an attack. It goes on to describe how attacks happen and gives photo examples of what the hacks look like. The article details practices and technologies to help keep you secure against ransomware.