crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, Integrated Business Technologies can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from Integrated Business Technologies, call us at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 14 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips IT Services Best Practices Backup Hackers Hosted Solutions Business IT Support Network Malware Mobile Devices Hardware Small Business Email Software Smartphones Data Communication Server Upgrade Windows Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Disaster Recovery Google Efficiency Computer Miscellaneous Mobile Office Vendor Management Gadgets Quick Tips Innovation Holiday Social Media WiFi BYOD Windows 10 User Tips Mobile Computing Bring Your Own Device Passwords Remote Monitoring Browser Smartphone Best Practice Apple Spam Wireless Technology Android Trending Users Operating System Content Filtering Remote Computing History Alert Internet of Things Outsourced IT Going Green Managed IT services The Internet of Things Firewall Office Data Management Unified Threat Management Printer Information Technology Current Events IT Solutions Save Money Lithium-ion Battery Network Security IT Consultant Big Data Customer Relationship Management Managed IT Windows 8 Artificial Intelligence Ransomware Tech Support Data Backup Humor Saving Time Gmail Analytics Avoiding Downtime Facebook Maintenance Hard Drives App Outlook Antivirus Health Collaboration Digital Payment Marketing Excel Office Tips Retail Risk Management Phishing IT service Business Growth Apps Application Phone System Virus Employer-Employee Relationship Customer Service Hacking Computers Fax Server Mouse Two-factor Authentication Presentation Social Budget Mobile Device Automation Router VPN PowerPoint Recovery Inbound Marketing Money Tablet Running Cable iPhone Training Administration Office 365 User Error Password Data Recovery Proactive IT Co-Managed IT Computer Repair Point of Sale Downtime Hosted Solution Search Document Management Data storage Virtual Desktop USB Net Neutrality Cybersecurity IBM Business Owner Project Management Robot Mobility Printing Hacker File Sharing Programming End of Support User LiFi Government Social Networking Computing Analyitcs Education Display Safety Specifications Licensing Settings Files Wireless Chrome Save Time Intranet Cybercrime Applications Business Intelligence Hiring/Firing Augmented Reality Encryption Website Tip of the week Piracy Help Desk Statistics Sports Competition Network Congestion Productivity Cryptocurrency Public Speaking Black Friday Virtual Private Network Google Docs Cortana eWaste Company Culture Access Control Twitter Flexibility Travel Bitcoin Cyber Monday Redundancy Adminstration Touchscreen Knowledge Environment communications SharePoint 3D Hacks Samsung Debate Experience Troubleshooting Unified Communications Heating/Cooling Downloads SaaS Consumers Crowdfunding Wearable Technology Networking Scam Multi-Factor Security Conferencing Software Tips Scheduling IP Address Smart Technology Data Security Alerts Monitors PC Care Deep Learning Refrigeration Disaster Google Calendar Value Telephony eBay Google Wallet Distributed Denial of Service Techology Remote Support Writing Leadership Cost Management Digital Signature Skype Legislation Streaming Media New Additions IT Support Text Messaging Drones Memory Managed IT Service Print Server Disaster Resistance Work Station Social Engineering Laptop Buisness Identities LinkedIn Private Cloud Congratulations Managed IT Services Video Surveillance Backups Wi-Fi Documents Break Fix Law Firm IT Windows 8.1 Update IT Consulting Recycling Halloween CIO Entrepreneur Solid State Drive Undo Best Available Software as a Service Public Cloud Macro Data loss Legal 5G PDF People Dark Web Data Breach Compliance Scary Stories Alt Codes Technology Tips Sync Microsoft Excel Bluetooth Online Currency Technology Laws Gaming Console Regulations YouTube Typing Domains Comparison Mobile Device Managment Computer Accessories Google Drive Fun Word Unified Threat Management How To Bandwidth

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...