crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, Integrated Business Technologies can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from Integrated Business Technologies, call us at (918) 770-8738.


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 18 August 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Privacy Managed Service Provider Business Management Tip of the Week Internet Microsoft Saving Money Cloud Business Computing Productivity Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions Network Mobile Devices Hardware IT Support Business Malware Email Software Small Business Smartphones Data Communication Server Upgrade Windows Mobile Device Management Microsoft Office VoIP Virtualization Disaster Recovery Business Continuity Google Efficiency Miscellaneous Mobile Office Computer Gadgets Vendor Management Social Media Quick Tips Innovation Mobile Computing Holiday WiFi Windows 10 Passwords BYOD Bring Your Own Device Best Practice Users User Tips Wireless Technology Operating System Apple Spam Smartphone The Internet of Things Remote Monitoring Trending Content Filtering Remote Computing Going Green History Internet of Things Alert Big Data Office Unified Threat Management IT Solutions Save Money Lithium-ion Battery IT Consultant Browser Android Current Events Information Technology Firewall Hard Drives App Customer Relationship Management Analytics Facebook Windows 8 Printer Tech Support Humor Gmail Saving Time Avoiding Downtime Managed IT services Maintenance Fax Server Network Security Collaboration Outlook Phone System Data Management Health Marketing Office Tips Retail Excel Ransomware Phishing IT service Business Growth Apps Application Customer Service Virus Computers iPhone Co-Managed IT Presentation Administration Budget Automation Recovery Computer Repair Router Antivirus Inbound Marketing Running Cable Social Digital Payment Mobile Device Artificial Intelligence VPN PowerPoint Outsourced IT Risk Management Employer-Employee Relationship Training Hacking Password Competition Intranet Network Congestion User Error Encryption Business Intelligence Downtime Two-factor Authentication Search USB Augmented Reality Virtual Desktop Business Owner Piracy Hosted Solution Hacker Programming Data storage User Sports Proactive IT Managed IT Analyitcs Point of Sale Money Education Mouse Robot Printing Safety Document Management Licensing End of Support Settings LiFi Net Neutrality IBM Wireless Chrome Save Time Cybercrime File Sharing Hiring/Firing Social Networking Display Website Tablet Statistics Help Desk Text Messaging Legal Fun Gaming Console Print Server Work Station Compliance Word Alt Codes Public Speaking LinkedIn Congratulations Mobile Device Managment Video Surveillance Cortana eWaste Law Firm IT Windows 8.1 Update Recycling Regulations YouTube Typing Best Available Cybersecurity Google Drive Knowledge Environment How To Bandwidth Cryptocurrency Adminstration Samsung Mobility Google Docs Experience Troubleshooting 3D Bluetooth Debate Heating/Cooling Online Currency Flexibility Software Tips Bitcoin Consumers Crowdfunding Computer Accessories communications Data Backup Hacks IP Address Scam Unified Communications Refrigeration Company Culture Disaster Scheduling Twitter SaaS Specifications Touchscreen Cost Management Digital Signature Telephony Computing Memory Monitors Laptop Deep Learning Files Google Wallet Wi-Fi Documents Wearable Technology Writing Halloween Entrepreneur Undo Conferencing Private Cloud Drones 5G PDF People Macro Alerts PC Care Social Engineering Scary Stories Buisness Identities Value Public Cloud eBay Backups Office 365 Remote Support Leadership CIO Solid State Drive Domains Skype Streaming Media New Additions Sync

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...