In this guide we review how ransomware attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.