opinion

How Not to Get ‘Pwned’ by Ransomware

How Not to Get ‘Pwned’ by Ransomware

Ah, summertime. Unlike 2020, now we can go out and have a drink in public, though that means you’ll have to talk to other people. And it seems that two of the most popular topics of conversation are UFOs and ransomware attacks. At MojoHost, we don’t know much about UFOs, but we’re definitely familiar with ransomware and the technological battle against it that’s required to keep customers safe and secure.

The best way to deal with the growing ransomware scourge is to avoid getting hit at all. The good news is that you already have some of the leading security experts in the world working to protect your various computing devices. They work for companies like Microsoft, Apple, Google and many more. These companies’ systems engineers are constantly updating and improving your operating system and other devices. So go ahead, find a quiet few weekend hours (or, more realistically, overnight) and click that dreaded Upgrade button. Seriously! I know Windows 7 still has the round Start button, but it’s really time to get on an up-to-date build of the latest OS.

The best way to deal with the growing ransomware scourge is to avoid getting hit at all.

“Zero-day” vulnerabilities get all of the cool names and press coverage. They are attacks that are exploitable against a fully up-to-date operating system. However, the vast majority of actual exploits in the wild rely on the ocean of “un-updated” software. As a practical matter, if you’re not a nation-state or world-renowned corporation, you probably have a greater chance of getting hit by lightning than of falling prey to a zero-day attack. While it may be annoying as heck when operating system updates come at inconvenient times, doing them will make a big difference to your overall system safety.

Beyond your desktop or laptop computers, networking devices that link us to the web and make our lives easier have an abysmal track record when providing the gateways that allow exploitation. Far from being highly secure, many of these “internet of things” (or IoT) devices are implicated in some of the most significant cyberattacks and biggest infiltrations to date.

The good news is that there’s no need to go back to the pre-connected era to find safe refuge. Buying well-supported devices from major manufacturers (versus “cheaper” equipment) can improve security. Companies such as Amazon and Google have significant incentives to keep their widgets up to date with the latest security improvements, if only to avoid the hassle and negative press of being implicated as the Trojan horse in an attack.

If you have other devices that have a more dubious security history or a less reliable vendor, then it is a great idea to make a separate WiFi network just for them. Putting all these devices on a “wild west” network will not necessarily prevent them from being attacked. Still, at least if your smart vacuum cleaner gets compromised, the attackers will be confined to the device’s network and be unable to pivot to the real goodies on your computers.

Speaking of WiFi, it’s a great idea to invest a few bucks in a high-quality WiFi setup. There are several excellent options out there, including those from Google, Amazon’s “eero,” Ubiquiti, Netgear and more. For these systems, expect to pay several times the price of an entry-level WiFi router, but rest assured that these systems (the backbone of your network) are updated regularly and come with numerous helpful security features. In many cases, they even support running a second WiFi network for all your devices on the same physical hardware, saving the cost and hassle of running a second WiFi router for all of your IoT devices.

Unfortunately, even with all of these precautions, there’s a chance that you’ll get unlucky. The evil fairy of ransomware exploits will single you out for an attack (or your dumb cousin will borrow your computer for a few minutes and be unable to resist clicking on that ad telling them they won an iPad from a Nigerian prince). No matter how it happens, even being hit with such an attack is (probably) not the end of the world.

Always assume that every last byte of data on your computer will cease to exist at a moment’s notice. This is good practice in any case since your hard drives can quite easily quit all on their own with no help from ransomware.

For smaller and more easily backed-up files, such as text documents and spreadsheets, consider saving them in a folder backed up by one of the many reputable cloud storage providers. The software powering these services will quickly sync your files each time that you save them. If your computer is locked or fails, you can download a copy of your files onto any other computer. If you use a system like this, it’s essential to ensure that you can access multiple historical replicas, so even if ransomware manages to overwrite your files with an encrypted version, you can easily retrieve a pre-encrypted version.

For larger files, like video media, make it a practice to make regular backups on hard disks that aren’t easily accessible from target computers on your network. Consider keeping them on a storage system with snapshots to roll back to a clean version if you suffer from a ransomware attack. If you use a cloud solution for these, make sure to regularly sync a copy to a local hard drive just in case the cloud provider has their problems. Those backup services are a more valuable ransomware target than you are, after all.

And if you do get hit with that attack, but happily get all your data back from your backups, it’s probably still a great opportunity to replace the hard drive on your computer with a new one. Not only are new hard drives likely bigger and faster than what you already have, but they also won’t have any malignant remnants of the ransomware attack floating around (which could reactivate itself at the least convenient time). If you can afford it, using solid-state drives (SSDs) is the best way to move into the future as they are hundreds of times faster and have significantly lower failure rates than traditional spinning hard disk drives.

These steps don’t cover things like anti-virus protection and avoiding phishing and other attacks in the first place. All of those tips are particular measures that require near-perfect execution, which is impossible for most humans. However, today’s simple tips to update, isolate and back up are universally good ideas that will protect against ransomware (and hardware failures as a bonus).

So, get back out there, enjoy a cold one and find something else to talk about. Like UFOs, I guess? Or how, armed with these tips, you now feel much less afraid of ransomware attacks.

Brad Mitchell is the famed founder of MojoHost, which has won numerous XBIZ Awards for Web Host of the Year and earned many loyal clients for nearly two decades. Known for his dapper style and charismatic wit, Mitchell is a regular fixture at trade shows, where he frequently shares hard-won wisdom while striking profitable deals. Be sure to back up your data on MojoCloud in case of ransomware! Contact brad@mojohost.com to learn more about the suite of services on tap.

Related:  

Copyright © 2026 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

A Creator's Guide to Starting the Year With Strong Financial Habits

Every January brings that familiar rush of new ideas and big goals. Creators feel ready to overhaul their content, commit to new posting schedules and jump on fresh opportunities.

Megan Stokes ·
opinion

Pornnhub's Jade Talks Trust and Community

If you’ve ever interacted with Jade at Pornhub, you already know one thing to be true: Whether you’re coordinating an event, confirming deliverables or simply trying to get an answer quickly, things move more smoothly when she’s involved. Emails get answered. Details are confirmed. Deadlines don’t drift. And through it all, her tone remains warm, friendly and grounded.

Women In Adult ·
opinion

Outlook 2026: Industry Execs Weigh In on Strategy, Monetization and Risk

The adult industry enters 2026 at a moment of concentrated change. Over the past year, the sector’s evolution has accelerated. Creators have become full-scale businesses, managing branding, compliance, distribution and community under intensifying competition. Studios and platforms are refining production and business models in response to pressures ranging from regulatory mandates to shifting consumer preferences.

Jackie Backman ·
opinion

How Platforms Can Tap AI to Moderate Content at Scale

Every day, billions of posts, images and videos are uploaded to platforms like Facebook, Instagram, TikTok and X. As social media has grown, so has the amount of content that must be reviewed — including hate speech, misinformation, deepfakes, violent material and coordinated manipulation campaigns.

Christoph Hermes ·
opinion

What DSA and GDPR Enforcement Means for Adult Platforms

Adult platforms have never been more visible to regulators than they are right now. For years, the industry operated in a gray zone: enormous traffic, massive data volume and minimal oversight. Those days are over.

Corey D. Silverstein ·
opinion

Making the Case for Network Tokens in Recurring Billing

A declined transaction isn’t just a technical error; it’s lost revenue you fought hard to earn. But here’s some good news for adult merchants: The same technology that helps the world’s largest subscription services smoothly process millions of monthly subscriptions is now available to you as well.

Jonathan Corona ·
opinion

Navigating Age Verification Laws Without Disrupting Revenue

With age verification laws now firmly in place across multiple markets, merchants are asking practical questions: How is this affecting traffic? What happens during onboarding? Which approaches are proving workable in real payment flows?

Cathy Beardsley ·
opinion

How Adult Businesses Can Navigate Global Compliance Demands

The internet has made the world feel small. Case in point: Adult websites based in the U.S. are now getting letters from regulators demanding compliance with foreign laws, even if they don’t operate in those countries. Meanwhile, some U.S. website operators dealing with the patchwork of state-level age verification laws have considered incorporating offshore in the hopes of avoiding these new obligations — but even operators with no physical presence in the U.S. have been sued or threatened with claims for not following state AV laws.

Larry Walters ·
opinion

Top Tips for Bulletproof Creator Management Contracts

The creator management business is booming. Every week, it seems, a new agency emerges, promising to turn creators into stars, automate their fan interactions or triple their revenue through “secret” social strategies. The reality? Many of these agencies are operating with contracts that wouldn’t survive a single serious dispute — if they even have contracts at all.

Corey D. Silverstein ·
opinion

Building Sustainable Revenue Without Opt-Out Cross-Sales

Over the past year, we’ve seen growing pushback from acquirers on merchants using opt-out cross-sales — also known as negative option offers. This has been especially noticeable in the U.S. In fact, one of our acquirers now declines new merchants during onboarding if an opt-out flow is detected. Existing merchants submitting new URLs with opt-out cross-sales are being asked to remove them.

Cathy Beardsley ·
Show More