crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

Microsoft has even released patches for some older, unsupported versions of Windows to combat the threat that infected PCs all over the world over the weekend.

What’s Going On?
A ransomware worm variant dubbed ‘WannaCry’ struck critical systems all around the world. While the attack has been addressed by Microsoft and halted for the time being, the threat is far from over, especially for users who don’t keep their computers updated.

Discovered early in the morning hours of Friday, May 12, WannaCry spread at a startling rate, reaching victims in 11 countries within its first few hours, and over 45,000 attacks (spread through 99 countries) after a few more hours. By Monday, over 150 countries had been hit by this global cyberattack.

There’s No Specific Target
The victims included many companies that provide utilities, like telecommunications, electrical, and gas companies. Even more frightening, WannaCry caused serious trouble in England’s healthcare systems, leading to massive numbers of non-critical patients being sent home or turned away at hospital doors. Russia found that thousands of its interior ministry computers had been infected. In the United States, the ransomware managed to infect FedEx’s systems, and these are just the big highlights. Businesses everywhere went dark as a result of this attack.

However, WannaCry did not target businesses of any specific industry. This particular ransomware worm is a threat to essentially any PC, old and new.

WannaCry was first discovered by security company Malwarebytes, whose director of malware intelligence, Adam Kujawa, had a few choice words to describe the malware, “The spread is immense. I’ve never seen anything before like this. This is nuts.” This opinion was repeated by many others in the industry.

How Do I Prevent WannaCry?
WannaCry relies on a security vulnerability in Windows. Microsoft deployed a security patch on March 14, so it is critical that users run the update, especially before putting themselves at risk and opening unsolicited emails. Computers that are patched face a significantly smaller risk of getting the ransomware. Key words here; significantly smaller, as in not totally in the clear.

To run your Windows Updates in Windows 10, open up your Start Menu and type “updates” in the search box and choose Check for Updates - system settings from the results. A window titled Windows Update should appear. From there, click the Check for updates button. If it says your device is up to date, you have the latest update. If not, you’ll need to allow your PC to install them.

Evaluating your computer and network security would be a good step in the right direction, as well as educating employees on some basic best practices like not downloading and opening unsolicited attachments.

It’s also critical that your files are backed up securely. If ransomware infects your network, it makes your files inaccessible unless you pay the ransom which only feeds into the problem. Utilizing an offsite backup solution that can easily be restored is the only way to go.

I’m Updated, am I Still at Risk?
There is also the risk that WannaCry is still waiting on some systems that have not been used since the attack began, so this initial attack is still far from over. Any PC on your network that gets infected could infect the rest. Plus, even with the patch, a user could still accidentally download an infected file. It’s also possible that those behind WannaCry will devise a workaround to the patch. Therefore, you should always be mindful as you review your incoming email and do your best to protect your network with managed IT security solutions and backing up your files.

Events like these are why we always encourage timely updates to your systems. WannaCry depended on a vulnerability in Windows, and will continue to infect outdated, unpatched PCs to be effective, and so your first defense against it is to make sure yours has the most recent security patches from Microsoft.

As Microsoft's president and chief legal officer Brad Smith said, “The governments of the world should treat this attack as a wake-up call.”

What If I’ve Been Infected By WannaCry?
Contact us at (918) 770-8738 immediately. Under no circumstance should you attempt to pay the ransom.

If you haven’t been targeted, count your blessings. That said, it’s time to start thinking about having your IT managed and maintained to prevent issues like this. Contact Integrated Business Technologies at (918) 770-8738 and ask how we can help prevent business-crippling issues and security threats like WannaCry.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Backup Hackers Hosted Solutions Email Malware Mobile Devices Business IT Support Small Business Software Hardware Network Communication Server Smartphones Data Upgrade Windows Business Continuity Mobile Device Management VoIP Google Virtualization Efficiency Microsoft Office Computer Disaster Recovery Miscellaneous Mobile Office Vendor Management Innovation Holiday Gadgets Social Media BYOD User Tips Mobile Computing Outsourced IT Android Smartphone Quick Tips Passwords Data Backup WiFi Windows 10 Browser The Internet of Things Ransomware Best Practice Bring Your Own Device Spam Internet of Things Remote Monitoring Network Security Data Management Trending Operating System Apple Users Remote Computing Managed IT services Wireless Technology Alert Data Recovery Going Green Firewall Content Filtering Artificial Intelligence History Big Data Printer Office Tech Support Analytics IT Solutions Save Money Lithium-ion Battery Information Technology Current Events IT Consultant Managed IT App Unified Threat Management Gmail Router Tech Term Humor Facebook Saving Time Avoiding Downtime Antivirus Maintenance Hard Drives Customer Relationship Management Windows 8 Encryption Cloud Computing Computers Applications Phone System Collaboration Two-factor Authentication Apps Application Automation Virus Office Tips Managed IT Services Retail Phishing Document Management Fax Server IT service Digital Payment Mobile Device Outlook Health Business Growth VPN Cybersecurity Risk Management Employer-Employee Relationship Customer Service Marketing Website Excel Hacking Regulations Password Inbound Marketing iPhone Bandwidth Administration Presentation Augmented Reality Infrastructure Paperless Office Budget Proactive IT Training Computer Repair Mouse Recovery Money Project Management Net Neutrality Running Cable Social User Error Licensing Co-Managed IT Government Chrome PowerPoint Wi-Fi Social Networking Data Security Tablet Compliance Office 365 Scam Tip of the week Intranet Competition Business Intelligence Network Congestion Downtime Hosted Solution Flexibility Data storage Search Piracy Vulnerability Virtual Desktop USB Business Owner Robot Unified Communications HIPAA Sports Productivity Printing Hacker User End of Support Point of Sale Programming LiFi Redundancy Analyitcs Computing Twitter Help Desk Data loss Education Safety Specifications Settings Internet Exlporer IBM Cost Management Wireless Smart Technology Mobile Security Cybercrime File Sharing Save Time Wearable Technology Hiring/Firing Display Alerts Files Mobility Statistics YouTube Text Messaging Computing Infrastructure Print Server Private Cloud Legislation Typing Work Station Disaster Resistance Domains Healthcare Fun Software Tips Dark Web LinkedIn Google Drive Scheduling Congratulations Video Surveillance Server Management Cooperation Word How To Law Firm IT Public Cloud Windows 8.1 Update Cryptocurrency Recycling IT Consulting Motherboard Public Speaking Hard Drive Cortana Data Warehousing Best Available eWaste Google Docs Staff Sync Software as a Service Bitcoin Data Breach Modem Cache Knowledge Microsoft Excel Environment communications Operations Bluetooth Mobile Device Managment Technology Tips Online Currency Hacks Samsung Cookies Experience IT Support Blockchain Troubleshooting Debate Computer Accessories Virtual Private Network Heating/Cooling Technology Laws Comparison Consumers Crowdfunding Macro Nanotechnology Permissions IT Technicians Virtual Reality Unified Threat Management Travel Black Friday Company Culture Screen Reader IP Address Fraud Monitors Deep Learning Gaming Console Touchscreen Mirgation Refrigeration SaaS Access Control Disaster BDR Cyber Monday Google Wallet Smart Tech Assessment Writing Digital Signature Business Technology Storage SharePoint Identity Theft Drones Memory Connectivity Laptop IT Management Social Engineering Buisness Identities Networking Migration Telephony Downloads IoT Distributed Denial of Service Documents Backups Conferencing Adminstration Halloween Network Management Hotspot Entrepreneur CIO Multi-Factor Security Solid State Drive 3D PC Care Chatbots Undo Star Wars 5G Managed IT Service PDF Legal Value People eBay Scary Stories Windows 10 Language Machine Learning Google Calendar Alt Codes Remote Support Leadership Techology Identity Utility Computing Break Fix Skype Streaming Media New Additions

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code