I can add:
* keep your USB backup drives DISCONNECTED from the PC.
* do not expose your Network based backup storage as a writable shared disk.
Note that unlike previous incarnations, which was distributed as a malware (it had to be "clicked" to become active), the last version can be locally distributed as a virus, so can be activated on vulnerable system without user actions. At least that is how I have understood (I must say rather pure) description in the Internet.
The good news (if I understand the procedure correctly, I have analyzed only previous version but "registration of one domain name has solved future distribution" confirms that), encryption code is still downloaded from the Internet. I mean even when virus is already in the local system and now wants activate a new system, that is not going to work. In other words if your particular computer is not infected already, it can not be infected by the version injected 3 days ago.