Friday’s outbreak of Ransomware quickly became one of the most significant cyber security events in recent history. The rate at which the Malware spread within a 24-hour window was unprecedented, with 99 countries affected at the time of writing.
The Ransomware, referred to under several names, including Wannacry, Wanna Decryptor, and WCry, spread by using a known vulnerability in computers running the Windows operating system. Affected systems include;
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
- Windows 8.1
- Windows Server 2012 and Windows Server 2012 R2
- Windows RT 8.1
- Windows 10
- Windows Server 2016
Microsoft released a patch for this vulnerability in March, however, many computers remain un-patched and many networks remain open. In a very unusual move, Microsoft also announced the release of patches for Windows XP and Server 2003, which have not had official support for over 2 years.
To ensure you’re protected from this latest outbreak, we would strongly encourage you to take the following steps immediately;
Apply updates to all machines on the network running the Windows operating system (if running Windows XP or Server 2003, this can be downloaded HERE)
- Ensure your network Firewall services are enabled; Intrusion Prevention Systems, and that Web Filtering on the network is enabled
- If you are still using outdated operating systems, plan to replace these as a matter of urgency
- Ensure you have a regular, local and offsite backup, that is verified and encrypted
- Ensure each computer on the network has up to date, preferably managed, antivirus software, conducting regular scans
- Establish a business continuity response strategy to a ransomware breakout on the network
Resolve are specialists in providing all the above solutions, and can offer honest and open advice on how to implement each one. If you have any concerns or would just like to chat, please get in touch.
For further information on who to protect yourself against Ransomware in general, check out Al's blog from a few months ago here.