B. EDR (Endpoint Detection and Response):
EDR solutions provide real-time monitoring and analysis of endpoint activities. They can detect, investigate, and respond to suspicious activities, including ransomware, before it can cause significant damage.
D. Application control:
Application control ensures that only whitelisted applications can run on the network. This prevents unauthorized or malicious software, including ransomware, from executing, thereby reducing the risk of infection.
H. Strong authentication:
Strong authentication, such as multi-factor authentication (MFA), prevents unauthorized access to systems and data. This reduces the likelihood of ransomware spreading through compromised credentials.