This paper explores over 15 ways to secure SMBs from crypto ransomware attacks to more completely secure IT environments from crypto ransomware and its consequences. This guide intends to point out some practical approaches to protecting SMBs from crypto ransomware.