Ransomware is effective because it often arrives via an infected email attachment, like a Microsoft Word or Excel document, appearing to be from someone you know. Once you open the attachment on a vulnerable computer, it starts to run and can lock the files on your computer and network server without your knowledge.
I get asked this question a lot, and it's a question I love to be asked. I have spent the last ten years trying out just about every security software product available. I have come to the conclusion that you get what you pay for, and not all software is created equal.
When it comes to technology, most of us only take action when something goes wrong. We are in the habit of only fix technology when it breaks, as opposed to planning for problems or taking proactive steps to prevent them. When something does break, it catches us off guard, and is usually accompanied by frustration and stress.