crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, Integrated Business Technologies can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from Integrated Business Technologies, call us at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Privacy Business Management Managed Service Provider Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup IT Services Best Practices Hackers Hosted Solutions IT Support Network Business Mobile Devices Hardware Malware Email Software Small Business Data Smartphones Communication Windows Server Upgrade Business Continuity Mobile Device Management Microsoft Office VoIP Virtualization Efficiency Disaster Recovery Google Computer Miscellaneous Mobile Office Vendor Management Gadgets Social Media Quick Tips Innovation Mobile Computing Holiday WiFi Windows 10 User Tips Best Practice Bring Your Own Device Smartphone Passwords BYOD Trending Operating System Apple Users Spam Remote Monitoring Wireless Technology Content Filtering Remote Computing Android History Browser Alert Internet of Things Going Green The Internet of Things IT Consultant Network Security Firewall Unified Threat Management Big Data Office Data Management IT Solutions Managed IT services Information Technology Current Events Lithium-ion Battery Save Money Avoiding Downtime Ransomware Hard Drives App Customer Relationship Management Gmail Windows 8 Printer Tech Support Humor Analytics Saving Time Facebook Virus Office Tips Retail Phishing Maintenance Antivirus Fax Server IT service Outlook Health Business Growth Managed IT Artificial Intelligence Data Backup Customer Service Marketing Excel Hacking Computers Outsourced IT Collaboration Phone System Apps Application Recovery Computer Repair Proactive IT Running Cable User Error Co-Managed IT Social Digital Payment Mobile Device VPN PowerPoint Employer-Employee Relationship Risk Management Router Inbound Marketing Password iPhone Presentation Budget Administration Automation Training User Programming Project Management Money Sports Analyitcs Education Help Desk Cybersecurity Point of Sale Safety Mouse Licensing Mobility Settings Document Management Wireless Hosted Solution Chrome Cybercrime Save Time Net Neutrality Data storage IBM Hiring/Firing File Sharing Robot Social Networking Printing End of Support Website Statistics Display LiFi Tablet Files Competition Network Congestion Tip of the week Downtime Intranet Business Intelligence Data Recovery Two-factor Authentication Search Virtual Desktop USB Business Owner Augmented Reality Hacker Piracy Encryption Online Currency Mobile Device Managment Alt Codes Regulations IP Address Computer Accessories YouTube Typing Google Drive Refrigeration Gaming Console Disaster Networking How To Bandwidth Specifications Company Culture Twitter Cryptocurrency Google Docs Cost Management Digital Signature Data Security Memory Flexibility Touchscreen Software Tips Laptop Bitcoin Techology Wi-Fi communications Documents Entrepreneur Adminstration Halloween Hacks Undo 3D Disaster Resistance People Wearable Technology SaaS 5G Unified Communications PDF Managed IT Services Scary Stories Conferencing IT Consulting Telephony Office 365 Alerts PC Care Scam Data loss Value Computing Data Breach Monitors Domains eBay Fun Remote Support Deep Learning Leadership Scheduling Google Wallet Word New Additions Skype Streaming Media Technology Laws Print Server Writing Public Speaking Text Messaging Private Cloud Cortana Work Station eWaste Drones Congratulations LinkedIn Unified Threat Management Law Firm IT Social Engineering Video Surveillance Buisness Windows 8.1 Update Public Cloud Knowledge Recycling Identities Environment Backups Best Available Virtual Private Network CIO Samsung Troubleshooting Debate Sync Experience Solid State Drive Legal Heating/Cooling Redundancy Crowdfunding Bluetooth Compliance Consumers Macro

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code