Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

On May 11, 2017, the WannaCry ransomware spread around the globe like wildfire and disabled computing infrastructures belonging to organizations of all shapes and sizes. As the world watched the news unfold, it seemed as if practically no business was immune to this ultra-powerful ransomware. Yet, many quick-thinking organizations were. All because they had the foresight to follow IT best practices.

What made the WannaCry ransomware particularly potent was the fact that its delivery method borrowed from recently stolen cyberspying tools developed by the NSA. Such a high-level attack caught many organizations off guard--except for the ones that applied a security patch issued by Microsoft in March, almost two months prior. These security patches were designed specifically to address the vulnerability exploited by the ransomware hackers. Basically, hackers were counting on organizations being slow to apply the security patches. Obviously, these hackers have enough knowledge about how businesses conduct their IT operations to know that such a gamble would pay off, handsomely.

The average PC user may not be aware of how a large business, especially one entrusted with sensitive data, could fail to apply important security patches in a timely manner. After all, many users simply have their PC set to automatically update. For these PC users, the patches from Microsoft are downloaded and applied quickly and painlessly. However, what the world needs to be aware of is something that hackers understand all too well is that many businesses and organizations do not immediately apply patches when they're published. Instead, organizations prefer to have their IT teams test the patches before applying them to the company network to ensure the patch does not impact operations.

For a business that relies on software to keep operations moving forward, making a change or even a slight adjustment to a system that’s working can be a big risk. What if upgrading to a new version of software means that new features aren’t compatible with established processes? What if a new security patch changes an OS in such a way as to disrupt day-to-day operations? This is why businesses make the choice to test all new software, upgrades, updates, and patches - even the major, security ones from Microsoft - before applying it to the network. The larger and more complex the company and its network, the more time and resources it will take to perform such a test. This is why the WannaCry ransomware was so much more effective against larger organizations than smaller businesses or PC users which had the ability to apply the patches in a more timely manner.

The companies that fell victim to the recent round of ransomware attacks aren’t completely off the hook. Between the time Microsoft issued its patches (March) to the time WannaCry hit (May), IT teams had ample time to test and apply the provided patches, which would have saved them a world of hurt. Therefore, for companies wanting to safeguard themselves from another worldwide ransomware attack (or even lesser attacks), it's vital to prioritize in following best practices like applying patches.

If you or your IT team has so much going on that it’s difficult to handle IT maintenance responsibilities like applying patches, then you can call on Computerware for assistance. Routine tasks like applying security patches can be outsourced to professionals, and for many IT tasks, they can be accomplished remotely. By outsourcing your IT to Computerware, you can rest assured that your systems are up-to-date and safeguarded from the latest threats, which means you won’t “wanna cry” should another round of ransomware ravish the world.

Call us today at (703) 821-8200 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 27 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Business Computing Backup Hackers Saving Money Hardware Data Business Malware Hosted Solutions IT Services IT Support Email Quick Tips Smartphones Gadgets Google Mobile Devices Efficiency Small Business Mobile Office Disaster Recovery Virtualization Business Continuity Microsoft Office Computer Network User Tips Server Miscellaneous Upgrade Social Media Network Security VoIP Windows 10 Mobile Device Management Unified Threat Management Windows Innovation BYOD Communication Smartphone WiFi Operating System Passwords Mobile Computing Marketing Ransomware Apps The Internet of Things Vendor Management Remote Computing Firewall Android Managed IT services Users History Holiday Apple Collaboration Remote Monitoring Facebook Analytics IT Consultant Alert Save Money Content Filtering Data Management Automation Bring Your Own Device Health Office Big data Lithium-ion Battery Hard Drives App Windows 8 Best Practice Hiring/Firing Going Green Tech Support Wireless Technology Outlook Budget Virus Productivity Phone System Outsourced IT Information Technology Phishing BDR Spam IBM Printer Gmail Browser Employer-Employee Relationship Search Internet of Things Managed IT Services Administration Maintenance Customer Service Proactive IT Help Desk Computers Education Save Time Data storage Money Humor Running Cable Saving Time Bandwidth Hacker communications Black Market Digital Payment Encryption Tablet Telephone Systems Networking Training Two-factor Authentication PowerPoint Wireless Social Networking Travel Website Antivirus Twitter Managed IT Artificial Intelligence Hacking Solid State Drive iPhone Fax Server Business Intelligence Flexibility Office 365 Legal User Document Management Mobile Device Computer Repair Avoiding Downtime Government Recovery Intranet SaaS Current Events Hosted Solution Risk Management IT Support Update Hard Drive Cost Management Compliance Gaming Console Chrome Downtime Automobile Processors USB Router Webcam Presentation Company Culture How To Computer Accessories Customer Relationship Management Virtual Desktop Business Growth Comparison Augmented Reality Monitors Settings Documents Programming Heating/Cooling Taxes YouTube Text Messaging Uninterrupted Power Supply VPN Politics End of Support Retail Co-managed IT Experience Law Enforcement Net Neutrality Lifestyle Cloud Computing Hack Laptop Safety Paperless Office Social Office Tips Computing Network Congestion DDoS Statistics Sports Pain Points IT service Public Cloud Cybercrime Word User Error Streaming Media Excel Robot Cybersecurity Password Inbound Marketing Cortana Leadership Computing Infrastructure Entrepreneur Access Music Computer Malfunction Business Managemenet Rental Service Upgrades HIPAA Mobility Memory Electronic Payment LiFi Device Management Wi-Fi Spyware Motion Sickness Best Practives Telephony IP Address Deep Learning Tracking Flash Windows 10 online Currency Visible Light Communication Human Resources Microserver Web Server Skype Workers Start Menu Advertising Mouse Banking Turn Key Google Wallet Teamwork Samsung Trojan GPS File Sharing Displays Storage Language PDF Organize Unified Communications G Suite Business Metrics Keyboard Drones Best Available Physical Security Disaster Tablets Product Reviews Ebay 3D Domains eWaste Data Protection Permissions Read Sync Recycling Chromebook Shortcut Value CCTV Securty Google Maps switches Pirating Information Adminstration Messenger Writing Troubleshooting Staffing Work/Life Balance Environment Corporate Profile In Internet of Things Download Competition Emails Business Owner Content Management Books Harddrive VoIP Cryptocurrency Microchip Application External Harddrive Google Docs Meetings Regulations Specifications Cabling IT consulting Private Cloud Video Surveillance Reading Electricity LinkedIn Cleaning Administrator Trending Saving ZTime Get More Done CIO Hacks Smart Phones Digital Signature Supercomputer Entertainment Worker Printer Server Archive Windows XP Machine Learning Debate Relocation Identity Theft WannaCry Society Distributed Denial of Service Point of Contact Notifications Micrsooft Employer Employee Relationship Licensing Analytic Reliable Computing Thin CLient Virtual Reality Digital Botnet Social Engineering Public Speaking Upselling Bluetooth Webinar Scalability

hp supplies medallionLarge2017