Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

Microsoft has even released patches for some older, unsupported versions of Windows to combat the threat that infected PCs all over the world over the weekend.

What’s Going On?
A ransomware worm variant dubbed ‘WannaCry’ struck critical systems all around the world. While the attack has been addressed by Microsoft and halted for the time being, the threat is far from over, especially for users who don’t keep their computers updated.

Discovered early in the morning hours of Friday, May 12, WannaCry spread at a startling rate, reaching victims in 11 countries within its first few hours, and over 45,000 attacks (spread through 99 countries) after a few more hours. By Monday, over 150 countries had been hit by this global cyberattack.

There’s No Specific Target
The victims included many companies that provide utilities, like telecommunications, electrical, and gas companies. Even more frightening, WannaCry caused serious trouble in England’s healthcare systems, leading to massive numbers of non-critical patients being sent home or turned away at hospital doors. Russia found that thousands of its interior ministry computers had been infected. In the United States, the ransomware managed to infect FedEx’s systems, and these are just the big highlights. Businesses everywhere went dark as a result of this attack.

However, WannaCry did not target businesses of any specific industry. This particular ransomware worm is a threat to essentially any PC, old and new.

WannaCry was first discovered by security company Malwarebytes, whose director of malware intelligence, Adam Kujawa, had a few choice words to describe the malware, “The spread is immense. I’ve never seen anything before like this. This is nuts.” This opinion was repeated by many others in the industry.

How Do I Prevent WannaCry?
WannaCry relies on a security vulnerability in Windows. Microsoft deployed a security patch on March 14, so it is critical that users run the update, especially before putting themselves at risk and opening unsolicited emails. Computers that are patched face a significantly smaller risk of getting the ransomware. Key words here; significantly smaller, as in not totally in the clear.

To run your Windows Updates in Windows 10, open up your Start Menu and type “updates” in the search box and choose Check for Updates - system settings from the results. A window titled Windows Update should appear. From there, click the Check for updates button. If it says your device is up to date, you have the latest update. If not, you’ll need to allow your PC to install them.

Evaluating your computer and network security would be a good step in the right direction, as well as educating employees on some basic best practices like not downloading and opening unsolicited attachments.

It’s also critical that your files are backed up securely. If ransomware infects your network, it makes your files inaccessible unless you pay the ransom which only feeds into the problem. Utilizing an offsite backup solution that can easily be restored is the only way to go.

I’m Updated, am I Still at Risk?
There is also the risk that WannaCry is still waiting on some systems that have not been used since the attack began, so this initial attack is still far from over. Any PC on your network that gets infected could infect the rest. Plus, even with the patch, a user could still accidentally download an infected file. It’s also possible that those behind WannaCry will devise a workaround to the patch. Therefore, you should always be mindful as you review your incoming email and do your best to protect your network with managed IT security solutions and backing up your files.

Events like these are why we always encourage timely updates to your systems. WannaCry depended on a vulnerability in Windows, and will continue to infect outdated, unpatched PCs to be effective, and so your first defense against it is to make sure yours has the most recent security patches from Microsoft.

As Microsoft's president and chief legal officer Brad Smith said, “The governments of the world should treat this attack as a wake-up call.”

What If I’ve Been Infected By WannaCry?
Contact us at (800) 588-4430 immediately. Under no circumstance should you attempt to pay the ransom.

If you haven’t been targeted, count your blessings. That said, it’s time to start thinking about having your IT managed and maintained to prevent issues like this. Contact Telesys Voice and Data at (800) 588-4430 and ask how we can help prevent business-crippling issues and security threats like WannaCry.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Friday, 22 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Internet Hosted Solutions Windows 10 Software Backup Managed Service Provider Computer Ransomware IT Services Mobile Devices Network Security Android Smartphone Managed IT services User Tips Workplace Tips Social Media Google IT Support Outsourced IT Hardware Browser Communication Disaster Recovery Business Continuity Efficiency Innovation Data Management App Smartphones Data Holiday Cloud Computing Small Business Data Backup Office Business Management Upgrade Office 365 Microsoft Office Windows Facebook Remote Monitoring Miscellaneous WiFi Server Artificial Intelligence Network Gmail Big Data Internet of Things Encryption Data Recovery Spam Firewall Password Apps Robot Save Money Paperless Office Phishing Hosted Solution Recovery Risk Management Apple Cybersecurity Avoiding Downtime Tech Term Word Unified Threat Management Managed IT Services Hacker Bandwidth Customer Service Mobile Device Management How To Content Filtering Saving Money Government Remote Computing Money Infrastructure Work/Life Balance Customer Relationship Management Office Tips Chrome Tip of the week Passwords Employer-Employee Relationship Productivity Document Management Analytics Vendor Management Health Data Security The Internet of Things Computers IT Support Alert Hacking Mobile Computing Data storage Compliance Tech Support Computing IT Management Education Operating System Cybercrime Antivirus Virtual Reality Applications Mobile Device VoIP Managed IT Business Growth Data loss SaaS Presentation BYOD Social Website Wi-Fi Outlook Windows 10 Telephone Systems Two-factor Authentication Settings Best Practice Politics Monitors Lithium-ion battery VPN Travel Identity Theft Google Drive Business Owner Websites Automation Physical Security Augmented Reality Going Green Virtual Private Network Taxes Assessment Marketing IBM Running Cable Server Management Botnet Printing Samsung Competition Licensing Maintenance Bring Your Own Device Search Digital Payment Sports Storage Regulations Information Technology IT service Cortana Virtualization Computer Care Humor Administration Project Management Analyitcs Training IT solutions Safety Smart Technology Business Technology Wireless Technology Tablet HIPAA Upgrades Wireless Automobile Budget Mobile Security Specifications BDR Downtime End of Support communications Mouse YouTube Unified Communications User Patch Management Collaboration Legal Scam LiFi Retail Vulnerability File Sharing Twitter VoIP streamlines Cyber Monday Heating/Cooling Chatbots Utility Computing Current Events Data Warehousing Hard Disk Drive G Suite Firefox Processors Laptop Alerts Hard Drives SharePoint business network infrastructure flu season Servers Virtual Desktop Identity Healthcare Microsoft Excel Motion Sickness Supercomputer Halloween Google Docs Cooperation Refrigeration Techology Downloads data services Fort Worth PowerPoint Help Desk Writing Deep Learning Personal Information Cost Management Fun Blockchain Mail Merge Disaster Resistance Multi-Factor Security IT Consultant Consultation IT Budget Scary Stories Staff Consumers User Error flu shot Statistics Machine Learning Social Engineering Meetings Computer Repair Management Permissions Address Proactive IT Google Calendar Cleaning Notifications Flexibility Undo eWaste IP Address Fort Worth IT Bluetooth Relocation Software Tips Webcam Corporate Profile Alt Codes Electronic Medical Records Enterprise Resource Planning Google Wallet Fraud Redundancy IT Sevices IT Consulting Legislation Quick Tips Crowdsourcing Dark Data Operations Social Networking Environment Mobile Office DFW IT Service Private Cloud Point of Sale WannaCry Typing Mobile Drones Net Neutrality Data Breach Time Management Buisness Wearable Technology Motherboard Troubleshooting Error Cabling Cryptocurrency Knowledge Internet Exlporer Technology Laws Software as a Service Network Management Router Distributed Denial of Service Phone System Web Server VoIP Bitcoin Update Staffing Experience Lenovo Unified Threat Management Technology Tips Touchscreen IT Technicians 3D Printing Modem Managed IT Service Shortcut Administrator Disaster Cameras Digital Windows 8 Chromebook GPS Hotspot Superfish Domains business communications systems Comparison Law Enforcement Google Maps Network Congestion Mirgation Unsupported Software Cookies 5G Break Fix Entrepreneur Uninterrupted Power Supply CCTV Spyware Emoji Tracking Language Application Printer Public Speaking Internet Protocol Black Friday Gadget Users Display Migration Mobile Data Nanotechnology iPhone Hacks Dark Web Solid State Drive How To Computing Infrastructure Networking Access Control

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code