Threat Defence · Guide

How to Stop Ransomware on Windows in 2026

Ransomware in 2026 is no longer about encryption — it is about extortion. Most operators now steal data first, then encrypt. Your defence must disrupt the kill chain at multiple points.

By Citadel Frame Team · March 3, 2026 · 12 min read

1. Map the modern kill chain

Initial access via phishing or exposed service → credential theft → lateral movement → data staging → exfiltration → encryption → extortion. Blocking any one step usually fails; blocking three or more succeeds.

2. Layer 1 — Identity

Enforce MFA everywhere, rotate service account passwords, enable Protected Users group, monitor for impossible-travel sign-ins. 80% of ransomware intrusions begin with a compromised credential.

3. Layer 2 — Email and web

Block executable attachments at the gateway, disable macros from internet, pair with DNS firewall to stop post-compromise callbacks. Most first-stage payloads beacon home before detonating.

4. Layer 3 — Endpoint

Application control plus behavioural EDR. Honeypot files and entropy monitoring kill encryption processes within seconds. Controlled Folder Access blocks untrusted writes to document folders.

5. Layer 4 — Backup

3-2-1 is the baseline: 3 copies, 2 media, 1 offsite immutable. Test restores monthly. If you cannot restore inside 24 hours, you will pay.

6. Layer 5 — Response

Pre-written runbook: isolate, scope, contain, eradicate, recover, lessons. Know your legal obligations under POPIA and which regulator to notify in South Africa within 72 hours.

7. When it happens anyway

Do not pay unless life-safety is at risk. Law enforcement globally discourages payment. Contact a reputable IR firm immediately, preserve evidence, and engage your insurer before restoring anything.

FAQ

Does antivirus stop modern ransomware?

Partially. Traditional signature AV misses most novel strains. You need behavioural detection, honeypots, and application control working together.

How fast should we be able to restore?

Target Recovery Time Objective of 24 hours for critical systems, 72 hours for the full estate. Anything longer and the business impact usually exceeds the ransom.

Is cyber insurance worth it?

Yes, but read the exclusions carefully. Many insurers now require MFA, EDR, and offline backups before paying out.

Put this into practice

Citadel Frame automates most of what you just read — hardening advisor, ransomware honeypots, breach monitoring, POPIA compliance profile, and AI-assisted triage, all in one Windows app.

Download free See pricing

More guides

AI

AI in Cybersecurity

AI is in every security product's marketing deck. Here's what's real, what's useful, and what's noise.

Compliance

POPIA for SMBs

POPIA isn't optional and isn't just for banks. This is the shortest honest path to compliance for a South African small business.

Hardening

Windows Hardening

Every setting, policy, and control a modern Windows endpoint should have — explained, prioritised, and automatable.

How Citadel Frame compares

Comparison

vs On-Demand Scanner

Anti-malware cleaning specialist vs. unified next-gen defence platform.

Comparison

vs Legacy Suite

Legacy mega-suite vs. focused next-gen defence platform.