In this guide we review how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoint protection to give you the best protection possible.