4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

Microsoft has even released patches for some older, unsupported versions of Windows to combat the threat that infected PCs all over the world over the weekend.

What’s Going On?
A ransomware worm variant dubbed ‘WannaCry’ struck critical systems all around the world. While the attack has been addressed by Microsoft and halted for the time being, the threat is far from over, especially for users who don’t keep their computers updated.

Discovered early in the morning hours of Friday, May 12, WannaCry spread at a startling rate, reaching victims in 11 countries within its first few hours, and over 45,000 attacks (spread through 99 countries) after a few more hours. By Monday, over 150 countries had been hit by this global cyberattack.

There’s No Specific Target
The victims included many companies that provide utilities, like telecommunications, electrical, and gas companies. Even more frightening, WannaCry caused serious trouble in England’s healthcare systems, leading to massive numbers of non-critical patients being sent home or turned away at hospital doors. Russia found that thousands of its interior ministry computers had been infected. In the United States, the ransomware managed to infect FedEx’s systems, and these are just the big highlights. Businesses everywhere went dark as a result of this attack.

However, WannaCry did not target businesses of any specific industry. This particular ransomware worm is a threat to essentially any PC, old and new.

WannaCry was first discovered by security company Malwarebytes, whose director of malware intelligence, Adam Kujawa, had a few choice words to describe the malware, “The spread is immense. I’ve never seen anything before like this. This is nuts.” This opinion was repeated by many others in the industry.

How Do I Prevent WannaCry?
WannaCry relies on a security vulnerability in Windows. Microsoft deployed a security patch on March 14, so it is critical that users run the update, especially before putting themselves at risk and opening unsolicited emails. Computers that are patched face a significantly smaller risk of getting the ransomware. Key words here; significantly smaller, as in not totally in the clear.

To run your Windows Updates in Windows 10, open up your Start Menu and type “updates” in the search box and choose Check for Updates - system settings from the results. A window titled Windows Update should appear. From there, click the Check for updates button. If it says your device is up to date, you have the latest update. If not, you’ll need to allow your PC to install them.

Evaluating your computer and network security would be a good step in the right direction, as well as educating employees on some basic best practices like not downloading and opening unsolicited attachments.

It’s also critical that your files are backed up securely. If ransomware infects your network, it makes your files inaccessible unless you pay the ransom which only feeds into the problem. Utilizing an offsite backup solution that can easily be restored is the only way to go.

I’m Updated, am I Still at Risk?
There is also the risk that WannaCry is still waiting on some systems that have not been used since the attack began, so this initial attack is still far from over. Any PC on your network that gets infected could infect the rest. Plus, even with the patch, a user could still accidentally download an infected file. It’s also possible that those behind WannaCry will devise a workaround to the patch. Therefore, you should always be mindful as you review your incoming email and do your best to protect your network with managed IT security solutions and backing up your files.

Events like these are why we always encourage timely updates to your systems. WannaCry depended on a vulnerability in Windows, and will continue to infect outdated, unpatched PCs to be effective, and so your first defense against it is to make sure yours has the most recent security patches from Microsoft.

As Microsoft's president and chief legal officer Brad Smith said, “The governments of the world should treat this attack as a wake-up call.”

What If I’ve Been Infected By WannaCry?
Contact us at 305-278-7100 immediately. Under no circumstance should you attempt to pay the ransom.

If you haven’t been targeted, count your blessings. That said, it’s time to start thinking about having your IT managed and maintained to prevent issues like this. Contact 4IT at 305-278-7100 and ask how we can help prevent business-crippling issues and security threats like WannaCry.

 

Comments 2

Delor Dilley on Wednesday, 24 May 2017 08:36

Interesting statistics and satisfy honestly can create a page popular, a success greetings.. Very useful for readers who need a reference.Thanks for sharing. All the factors shared right here is useful facts and big life.

Essay writing service reviews

Interesting statistics and satisfy honestly can create a page popular, a success greetings.. Very useful for readers who need a reference.Thanks for sharing. All the factors shared right here is useful facts and big life. [url=https://essayreviewratings.com/]Essay writing service reviews[/url]
mpate mpate on Friday, 17 November 2017 06:44

In this blog you can read different type of news articles. That all given for helping college students and the top essay writing service news for all of them. Then everyone happy to chose the values and essays.

In this blog you can read different type of news articles. That all given for helping college students and the [url=https://canadianessayreviews.com/]top essay writing service[/url] news for all of them. Then everyone happy to chose the values and essays.
Already Registered? Login Here
Guest
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Virtualization Upgrade Windows 10 Miscellaneous Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Email Alert Save Money Microsoft Office Communication Network Quick Tips communications Small Business Smartphone BYOD Going Green Mobile Office Information Technology Social Media Smartphones Android Apps Health Office Managed IT Services Outsourced IT Browser Application Ransomware Gadgets Operating System Chrome Avoiding Downtime Disaster Productivity Tablet Managed IT WiFi Holiday Mobility Firewall Passwords Remote Computing Unified Threat Management IT Solutions Best Practice Data Management Spam Risk Management BDR Cybercrime Telephone Systems Search Cybersecurity The Internet of Things Facebook Hacking Vendor Management Hard Drives Saving Time Remote Monitoring History Employer-Employee Relationship Budget Automation VPN Apple Data Recovery Office Tips Marketing Big Data Money Content Filtering Phishing Data Backup Password Proactive IT Hosted Solution iPhone Computers User Error Customer Relationship Management Collaboration Law Enforcement Phone System Recovery Wireless Technology Bring Your Own Device Printer Antivirus Shortcut USB Social Analytics Encryption Gmail Router Humor Administration Government Wearable Technology Telephony Maintenance PowerPoint Lithium-ion battery Virus Work/Life Balance Office 365 Current Events Vulnerability Personal Information SaaS Audit HaaS Tech Support Wireless Business Intelligence Unsupported Software Point of Sale Outlook IT COnsultant Cloud Computing Google Drive Computer Repair Save Time Social Engineering Data Security App Cost Management Data Protection Intranet Bandwidth Private Cloud Printer Server Users Laptop OneNote Windows 8 Trending Education Net Neutrality Politics Excel Transportation Display Augmented Reality Computer Care Battery Network Congestion Robot Data Storage Paperless Office Travel Help Desk Automobile End of Support Update Fax Server Customer Service Biometrics Workplace Retail Internet Exlporer Virtual Reality Streaming Media Meetings Internet of Things Uninterrupted Power Supply Identity Theft online currency Solid State Drive Emails Flexibility Sports Instant Messaging Social Networking HIPAA Entertainment Benefits DDoS Computer Accessories Samsung Efficency Wi-Fi Artificial Intelligence Mouse Compliance Emergency IT Support Applications Windows 10 Two-factor Authentication Managing Stress hacker Wiring Value IT Security Cameras Cleaning Sync OneDrive Information Amazon User Data Loss Experience iOS Keyboard Managed IT Service Avoid Downtime Debate Co-managed IT Science Presentation Adobe Managed IT Services Virtual Desktop Bluetooth Best Available Google Docs Music Computer Fan Hiring/Firing IT Technicians Lifestyle Licensing Data storage Ebay Computing SharePoint Microsoft Excel Books Dark Web Smart Technology Screen Mirroring Video Games Document Management Nokia Advertising Teamwork File Sharing Data Breach Busines Continuity Cast Legal Networking Near Field Communication Mobile Device Windows 10s Touchpad systems Managed Security Nanotechnology Scam Human Resources Twitter IT consulting Tablets Hard Disk Drive Running Cable hack Root Cause Analysis Employer Employee Relationship HBO Surge Protector Television Reliable Computing NFL Worker Commute best practices Operating Sysytem PDF 3D Printing Cortana CrashOverride IT Management Scalability Files Hard Drive Bloatware Word data breach Text Messaging Legislation Safety Settings WIndows Server 2008 How To ISP Uograde Chromecast Images Branding Upgrades Windows Ink risk management Distributed Denial of Service Training Patch Management Programming Administrator Blogging WIndows 7 Consultant Google Maps Colocation eWaste Storage Inbound Marketing The Blindside Of Commerce Regulations Company Culture Regulation Black Market Access Website Touchscreen Software as a Service Conferencing Shadow IT Domains Relocation Gifts Redundancy Webinar Credit Cards Buisness Mobile IT solutions FAQ Tutorial Professional Services Taxes Supercomputer Electronic Medical Records IT Budget Microblogging Youtube Gift Giving Reputation Sales Comparison Managed Service Provder Webinar Specifications IT service