Register now or log in to join your professional community.
enable volume / file shadow copies in windows environment and enable build in wndows 10 defender exploit guard to prevent ransome ware .
Apart thirdparty tools like sophos intercept can be used.