Threat Defence · Guide

How to Stop Ransomware on Windows in 2026

Ransomware in 2026 is no longer about encryption — it is about extortion. Most operators now steal data first, then encrypt. Your defence must disrupt the kill chain at multiple points.

By Citadel Frame Team · March 3, 2026 · 12 min read

1. Map the modern kill chain

Initial access via phishing or exposed service → credential theft → lateral movement → data staging → exfiltration → encryption → extortion. Blocking any one step usually fails; blocking three or more succeeds.

2. Layer 1 — Identity

Enforce MFA everywhere, rotate service account passwords, enable Protected Users group, monitor for impossible-travel sign-ins. 80% of ransomware intrusions begin with a compromised credential.

3. Layer 2 — Email and web

Block executable attachments at the gateway, disable macros from internet, pair with DNS firewall to stop post-compromise callbacks. Most first-stage payloads beacon home before detonating.

4. Layer 3 — Endpoint

Application control plus behavioural EDR. Honeypot files and entropy monitoring kill encryption processes within seconds. Controlled Folder Access blocks untrusted writes to document folders.

5. Layer 4 — Backup

3-2-1 is the baseline: 3 copies, 2 media, 1 offsite immutable. Test restores monthly. If you cannot restore inside 24 hours, you will pay.

6. Layer 5 — Response

Pre-written runbook: isolate, scope, contain, eradicate, recover, lessons. Know your legal obligations under POPIA and which regulator to notify in South Africa within 72 hours.

7. When it happens anyway

Do not pay unless life-safety is at risk. Law enforcement globally discourages payment. Contact a reputable IR firm immediately, preserve evidence, and engage your insurer before restoring anything.

FAQ

Does antivirus stop modern ransomware?

Partially. Traditional signature AV misses most novel strains. You need behavioural detection, honeypots, and application control working together.

How fast should we be able to restore?

Target Recovery Time Objective of 24 hours for critical systems, 72 hours for the full estate. Anything longer and the business impact usually exceeds the ransom.

Is cyber insurance worth it?

Yes, but read the exclusions carefully. Many insurers now require MFA, EDR, and offline backups before paying out.

Put this into practice

Citadel Frame automates most of what you just read — hardening advisor, ransomware honeypots, breach monitoring, POPIA compliance profile, and AI-assisted triage, all in one Windows app.

Download free See pricing

More guides

Identity

Breach Monitoring

The marketing is murky. Here's what breach monitoring actually does — and doesn't.

Hardening

Windows Hardening

Every setting, policy, and control a modern Windows endpoint should have — explained, prioritised, and automatable.

AI

AI in Cybersecurity

AI is in every security product's marketing deck. Here's what's real, what's useful, and what's noise.

How Citadel Frame compares

Comparison

vs Foreign-Jurisdiction AV

Detection-strong but geopolitically risky vs. neutral SA-based platform.

Comparison

vs Premium AV

Detection-first suite vs. detection + AI + compliance platform.