Mitigating a compromise due to crypto-malware involves a combination of preventive measures and responsive actions.
Regularly backup your important data and ensure that the backups are stored in a secure, offline location. This way, even if your device gets infected, you can restore your data without paying the ransom.
Keep your antivirus and anti-malware software up to date. These tools can help detect and remove known malware from your system.
Keep your operating system, software, and applications up to date with the latest security patches. Many malware exploits target vulnerabilities that are patched in newer updates.