Let us be your IT department!
Call us Today! (703) 821-8200

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

Sadly, the WannaCry Ransomware Disaster Could Have Been Easily Prevented

On May 11, 2017, the WannaCry ransomware spread around the globe like wildfire and disabled computing infrastructures belonging to organizations of all shapes and sizes. As the world watched the news unfold, it seemed as if practically no business was immune to this ultra-powerful ransomware. Yet, many quick-thinking organizations were. All because they had the foresight to follow IT best practices.

What made the WannaCry ransomware particularly potent was the fact that its delivery method borrowed from recently stolen cyberspying tools developed by the NSA. Such a high-level attack caught many organizations off guard--except for the ones that applied a security patch issued by Microsoft in March, almost two months prior. These security patches were designed specifically to address the vulnerability exploited by the ransomware hackers. Basically, hackers were counting on organizations being slow to apply the security patches. Obviously, these hackers have enough knowledge about how businesses conduct their IT operations to know that such a gamble would pay off, handsomely.

The average PC user may not be aware of how a large business, especially one entrusted with sensitive data, could fail to apply important security patches in a timely manner. After all, many users simply have their PC set to automatically update. For these PC users, the patches from Microsoft are downloaded and applied quickly and painlessly. However, what the world needs to be aware of is something that hackers understand all too well is that many businesses and organizations do not immediately apply patches when they're published. Instead, organizations prefer to have their IT teams test the patches before applying them to the company network to ensure the patch does not impact operations.

For a business that relies on software to keep operations moving forward, making a change or even a slight adjustment to a system that’s working can be a big risk. What if upgrading to a new version of software means that new features aren’t compatible with established processes? What if a new security patch changes an OS in such a way as to disrupt day-to-day operations? This is why businesses make the choice to test all new software, upgrades, updates, and patches - even the major, security ones from Microsoft - before applying it to the network. The larger and more complex the company and its network, the more time and resources it will take to perform such a test. This is why the WannaCry ransomware was so much more effective against larger organizations than smaller businesses or PC users which had the ability to apply the patches in a more timely manner.

The companies that fell victim to the recent round of ransomware attacks aren’t completely off the hook. Between the time Microsoft issued its patches (March) to the time WannaCry hit (May), IT teams had ample time to test and apply the provided patches, which would have saved them a world of hurt. Therefore, for companies wanting to safeguard themselves from another worldwide ransomware attack (or even lesser attacks), it's vital to prioritize in following best practices like applying patches.

If you or your IT team has so much going on that it’s difficult to handle IT maintenance responsibilities like applying patches, then you can call on Computerware for assistance. Routine tasks like applying security patches can be outsourced to professionals, and for many IT tasks, they can be accomplished remotely. By outsourcing your IT to Computerware, you can rest assured that your systems are up-to-date and safeguarded from the latest threats, which means you won’t “wanna cry” should another round of ransomware ravish the world.

Call us today at (703) 821-8200 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 23 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Productivity Software Backup Business Computing Hackers Saving Money Hardware Data Business Malware IT Support IT Services Email Hosted Solutions Google Quick Tips Smartphones Efficiency Gadgets Mobile Devices Business Continuity Small Business Mobile Office Disaster Recovery Virtualization Computer Network User Tips Microsoft Office Server Miscellaneous Network Security Windows 10 Upgrade VoIP Social Media Windows Unified Threat Management Mobile Device Management Smartphone Innovation Operating System Remote Computing BYOD Communication WiFi Vendor Management Passwords Ransomware Marketing Mobile Computing Apps Android The Internet of Things History Holiday Managed IT services Facebook Users Remote Monitoring Firewall Apple Collaboration Analytics Data Management IT Consultant Save Money Alert Office Outsourced IT Automation Big data Content Filtering Health Bring Your Own Device Wireless Technology Search Managed IT Services Virus Hiring/Firing App Phishing Lithium-ion Battery Hard Drives Windows 8 Tech Support Best Practice Going Green BDR Spam Productivity Phone System Gmail Recovery Help Desk Browser Employer-Employee Relationship Antivirus Printer Information Technology Budget Internet of Things IBM Outlook Encryption Saving Time Administration Maintenance Save Time Money Running Cable Managed IT Proactive IT Data storage Computers Humor communications SaaS Bandwidth Customer Service Education IT Support Hard Drive Intranet Networking Hacking Update Telephone Systems Training Office 365 User Digital Payment Securty Solid State Drive Government PowerPoint Flexibility Social Networking Fax Server Word Risk Management Twitter Legal Password Artificial Intelligence Hacker Avoiding Downtime iPhone Business Intelligence Tablet Data Backup Hosted Solution Two-factor Authentication Current Events Document Management Wireless Mobile Device Computer Repair Website Travel It Management Black Market Gaming Console Statistics Retail Webcam Experience Business Growth Mobility Automobile Telephony Monitors Streaming Media Inbound Marketing YouTube How To Settings Chrome End of Support Router Safety Taxes Computer Accessories Law Enforcement Social Customer Relationship Management Uninterrupted Power Supply Co-managed IT Politics Comparison DDoS Augmented Reality Network Congestion Data Recovery Lifestyle Cybercrime Text Messaging Laptop VPN Cortana Cloud Computing Cost Management Office Tips Hack Paperless Office Processors Downtime Sports USB Net Neutrality Computing Presentation Company Culture Pain Points Robot Virtual Desktop IT service Excel User Error Documents Programming Compliance Public Cloud Trending Heating/Cooling Cybersecurity Best Available Rental Service Deep Learning Keyboard Point of Contact Memory Domains WannaCry Visible Light Communication Computer Malfunction Product Reviews Best Practives Wi-Fi Time Management eWaste Read Thin CLient Value Shortcut Flash Advertising Troubleshooting Motion Sickness Microserver Staffing Touchscreen Google Wallet Environment Tracking Competition Leadership Windows 10 Displays Digital Unified Communications Business Owner Web Server Turn Key Trojan Banking Device Management Websites Drones Workers Disaster Application Start Menu Organize File Sharing Language Access Permissions Specifications online Currency Business Metrics Software as a Service Samsung switches Digital Signature G Suite Writing Spyware Entertainment Physical Security Chromebook Mouse Tablets Data Protection Sync Messenger Work/Life Balance cache Cryptocurrency GPS CCTV Analytic Harddrive Download Google Docs Google Maps Public Speaking Corporate Profile IT consulting In Internet of Things Books Ebay Assessment Cleaning 3D Emails External Harddrive CIO Scalability Microchip Recycling Entrepreneur Regulations VoIP Windows XP HIPAA Business Managemenet Reading Smart Phones Get More Done Pirating Information Consultation Society Electronic Payment Adminstration Meetings Cabling Private Cloud Printer Server Hacks Micrsooft IP Address Administrator Relocation Content Management Identity Theft Human Resources Supercomputer Worker Machine Learning Notifications Distributed Denial of Service Skype Reliable Computing Virtual Reality Video Surveillance Google Drive Music Employer Employee Relationship Saving ZTime Licensing Teamwork Upselling Webinar LinkedIn Social Engineering Upgrades Bluetooth Electricity LiFi Storage Botnet Archive Computing Infrastructure Debate PDF CrashOverride 3D Printing Capital Productuvuty

hp supplies medallionLarge2017