crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, Integrated Business Technologies can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from Integrated Business Technologies, call us at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 22 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Business Management Privacy Managed Service Provider Internet Microsoft Cloud Saving Money Productivity Business Computing Workplace Tips Best Practices IT Services Backup Hackers Hosted Solutions Email Malware Mobile Devices Small Business IT Support Software Business Network Hardware Communication Server Smartphones Data Upgrade Windows Business Continuity Mobile Device Management VoIP Virtualization Efficiency Microsoft Office Disaster Recovery Google Vendor Management Computer Miscellaneous Mobile Office Holiday Gadgets Innovation Social Media Android Quick Tips Outsourced IT BYOD WiFi Smartphone Windows 10 User Tips Mobile Computing Best Practice Bring Your Own Device Spam Passwords Remote Monitoring Browser Network Security Apple Users Remote Computing Wireless Technology Internet of Things The Internet of Things Trending Operating System Data Backup Firewall Content Filtering Ransomware History Alert Data Management Going Green Managed IT services Artificial Intelligence Unified Threat Management Gmail Managed IT Big Data Printer Tech Support Office Analytics IT Solutions Lithium-ion Battery Save Money Information Technology Current Events IT Consultant Avoiding Downtime Antivirus Maintenance Hard Drives App Customer Relationship Management Windows 8 Humor Facebook Saving Time Encryption Automation Application Virus Office Tips Retail Phishing Document Management Fax Server IT service Digital Payment Outlook Health VPN Business Growth Risk Management Employer-Employee Relationship Marketing Customer Service Hacking Excel Computers Phone System Collaboration Two-factor Authentication Data Recovery Apps Training Computer Repair Proactive IT Recovery Mouse Money Running Cable Social User Error Net Neutrality Licensing Project Management Co-Managed IT Mobile Device Chrome Managed IT Services PowerPoint Tablet Data Security Office 365 Router Inbound Marketing iPhone Cybersecurity Password Applications Administration Augmented Reality Cloud Computing Presentation Budget Sports Hacker User Point of Sale Programming HIPAA Regulations Infrastructure Analyitcs Bandwidth Education Redundancy Help Desk Safety Specifications Settings Flexibility Hosted Solution IBM Wireless Data storage Paperless Office Cybercrime File Sharing Save Time Wearable Technology Social Networking Data loss Mobile Security Wi-Fi Robot Unified Communications Hiring/Firing Alerts Printing Display End of Support LiFi Website Computing Statistics Scam Intranet Competition Business Intelligence Tip of the week Government Network Congestion Tech Term Mobility Downtime Search Files Virtual Desktop USB Piracy Business Owner Compliance Private Cloud Technology Tips Heating/Cooling Alt Codes Computer Accessories Technology Laws Crowdfunding Macro Blockchain Consumers YouTube Virtual Private Network Unified Threat Management Public Cloud Comparison Typing Twitter Permissions IP Address Google Drive Company Culture How To IT Technicians Access Control Sync Black Friday Refrigeration Cryptocurrency Disaster Gaming Console Touchscreen IT Support Fraud Google Docs Mirgation SharePoint Mobile Device Managment Cyber Monday Cost Management Bitcoin Digital Signature Memory Internet Exlporer Laptop communications Business Technology Storage Productivity Smart Technology Hacks Documents Conferencing Halloween Downloads Entrepreneur Adminstration Networking Migration 3D PC Care Travel Distributed Denial of Service Undo PDF Value People IT Management Hotspot 5G Scary Stories Virtual Reality Multi-Factor Security eBay Chatbots Remote Support Leadership Identity Theft Managed IT Service Skype Streaming Media New Additions Windows 10 Language Monitors SaaS Google Calendar Deep Learning Print Server Text Messaging Techology Identity Work Station Break Fix Domains Google Wallet LinkedIn Scheduling Congratulations Computing Infrastructure Fun Writing Legislation Word Law Firm IT Video Surveillance Disaster Resistance Recycling Dark Web Public Speaking Drones Windows 8.1 Update Best Available eWaste Buisness Server Management Cooperation Cortana Social Engineering Telephony Identities IT Consulting Data Warehousing Backups Environment CIO Staff Knowledge Software as a Service Solid State Drive Bluetooth Data Breach Samsung Software Tips Microsoft Excel Legal Online Currency Troubleshooting Debate Vulnerability Operations Experience

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...