crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, Integrated Business Technologies can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from Integrated Business Technologies, call us at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 25 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Backup Hackers Hosted Solutions Malware Email Mobile Devices Business IT Support Small Business Software Hardware Network Communication Server Smartphones Data Upgrade Windows Business Continuity Mobile Device Management VoIP Google Virtualization Computer Efficiency Microsoft Office Disaster Recovery Miscellaneous Mobile Office Vendor Management Innovation Gadgets Social Media Holiday Smartphone BYOD Android Outsourced IT User Tips Quick Tips Passwords Mobile Computing WiFi Windows 10 Data Backup Browser Bring Your Own Device Spam Internet of Things Best Practice Network Security The Internet of Things Ransomware Remote Monitoring Apple Remote Computing Data Management Alert Users Managed IT services Trending Wireless Technology Operating System Content Filtering Going Green Artificial Intelligence History Firewall Data Recovery Gmail Printer Tech Support Managed IT Information Technology Current Events Big Data Office App Analytics IT Solutions Unified Threat Management Save Money Lithium-ion Battery IT Consultant Router Antivirus Humor Saving Time Avoiding Downtime Maintenance Hard Drives Encryption Cloud Computing Customer Relationship Management Tech Term Facebook Windows 8 Business Growth Document Management Managed IT Services Employer-Employee Relationship Digital Payment Mobile Device Website Customer Service Hacking Computers VPN Risk Management Apps Application Virus Collaboration Cybersecurity Two-factor Authentication Fax Server Automation Phone System Outlook Health Office Tips Retail Phishing Applications IT service Marketing Excel Infrastructure Chrome Inbound Marketing Mouse Paperless Office Wi-Fi Net Neutrality Social Office 365 Project Management PowerPoint Social Networking Password Training Government Tablet Presentation Data Security iPhone User Error Budget Co-Managed IT Compliance Administration Regulations Recovery Augmented Reality Money Bandwidth Running Cable Licensing Proactive IT Computer Repair Scam Wireless Data storage Point of Sale Cybercrime Save Time Vulnerability Twitter Robot Unified Communications Hiring/Firing HIPAA Productivity Printing IBM End of Support LiFi Redundancy Computing File Sharing Statistics Data loss Wearable Technology Internet Exlporer Competition Display Network Congestion Alerts Smart Technology Downtime Mobile Security Help Desk Search Virtual Desktop Intranet USB Files Mobility Business Owner Business Intelligence Hacker Programming Tip of the week User Analyitcs Education Piracy Safety Specifications Hosted Solution Sports Settings Flexibility Cost Management Memory Cache Microsoft Excel communications Operations Laptop Mobile Device Managment Technology Tips Hacks Company Culture Scheduling Cookies IT Support Blockchain Documents Entrepreneur Touchscreen Virtual Private Network Halloween Technology Laws Comparison Undo Nanotechnology People Permissions 5G PDF IT Technicians Scary Stories Virtual Reality Unified Threat Management Travel Black Friday Screen Reader Fraud Monitors Deep Learning Mirgation SaaS Access Control BDR Cyber Monday Domains Google Wallet Conferencing Smart Tech Assessment Fun Writing Word Macro Business Technology Storage PC Care SharePoint Identity Theft Public Speaking Drones Value Connectivity eBay IT Management Cortana Social Engineering eWaste Buisness Identities Remote Support Networking Migration Leadership Telephony Downloads New Additions Distributed Denial of Service Backups Skype Streaming Media IoT Print Server Gaming Console Text Messaging Network Management Hotspot Knowledge Environment CIO Solid State Drive Work Station Chatbots Multi-Factor Security Star Wars Congratulations Managed IT Service Legal LinkedIn Samsung Law Firm IT Debate Video Surveillance Windows 10 Language Experience Troubleshooting Google Calendar Heating/Cooling Alt Codes Windows 8.1 Update Recycling Techology Identity Machine Learning Utility Computing Break Fix Best Available Consumers Crowdfunding Computing Infrastructure YouTube Private Cloud Legislation Typing Disaster Resistance Adminstration Healthcare Software Tips Dark Web IP Address Google Drive Bluetooth 3D Server Management Cooperation How To Public Cloud Refrigeration Cryptocurrency Online Currency Disaster IT Consulting Motherboard Hard Drive Data Warehousing Google Docs Computer Accessories Staff Sync Software as a Service Bitcoin Digital Signature Data Breach Modem

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...