Yeah, that link is pretty interesting. It is mainly about how malware finds out what you have on your system, like if it wants to encrypt your photos, it looks for image files. Or maybe it wants to know what AV you are using, so it can turn it off. Some of those processes help it make a network connection, like for a RAT.
But the processes that are most crucial to restrict, in order to prevent the actual attack, are the script interpreters. If you have a 64x system, most of the time you will have two of each. One in Windows/System32, and the other in Windows/SysWOW64.
These are some of the most commonly abused script interpreters:
powershell
powershell_ISE
wscript
cscript
cmd
The first 4 are rarely needed by your system or software, you can safely block them without crippling your computer.
If you have these 5 processes (if 64 bit system, then it is 10 processes) under control, one way or another, you have significantly limited the ability of malware to run.
There are people following this thread who know a lot more about the subject than I do, so I hope they will correct any inaccuracies...