Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, Telesys Voice and Data can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from Telesys Voice and Data, call us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Windows 10 Internet Hosted Solutions Backup Software Ransomware Computer IT Services Managed Service Provider Network Security Mobile Devices Android Smartphone User Tips Managed IT services IT Support Workplace Tips Google Communication Social Media Hardware Browser Outsourced IT Disaster Recovery Business Continuity Efficiency Data Management Smartphones App Innovation Holiday Upgrade Small Business Office Business Management Cloud Computing Data Data Backup Facebook Microsoft Office Server Remote Monitoring Office 365 Windows Miscellaneous WiFi Internet of Things Network Encryption Artificial Intelligence Gmail Spam Big Data Robot Apps Phishing Data Recovery Hosted Solution Recovery Password Firewall How To Content Filtering Government Apple Avoiding Downtime Save Money Money Paperless Office Infrastructure Work/Life Balance Customer Service Mobile Device Management Office Tips Tip of the week Employer-Employee Relationship Productivity Saving Money Remote Computing Risk Management Cybersecurity Word Unified Threat Management Hacker Passwords Chrome Education Cybercrime Antivirus Health Virtual Reality Mobile Device Managed IT Data loss SaaS BYOD Hacking Social Mobile Computing Website Tech Support Wi-Fi Tech Term Windows 10 Operating System Telephone Systems Two-factor Authentication Document Management Settings VoIP Presentation Business Growth Analytics Vendor Management Data Security Applications The Internet of Things Computers IT Support Alert Customer Relationship Management Outlook Managed IT Services Data storage Bandwidth Computing IT Management Retail IT service Cortana Virtualization Best Practice Computer Care Administration Lithium-ion battery Business Owner Project Management Training IT solutions Safety Marketing Business Technology Tablet Wireless Technology Automobile Upgrades Wireless Budget Downtime End of Support Competition communications Mouse YouTube Information Technology Collaboration Unified Communications Legal Humor Scam Vulnerability File Sharing LiFi Twitter Analyitcs Politics Monitors VPN Travel Identity Theft Google Drive Websites Automation Augmented Reality Going Green Virtual Private Network Physical Security Specifications Taxes Running Cable Server Management Botnet IBM HIPAA Printing Samsung Mobile Security Licensing User Search Maintenance Bring Your Own Device Digital Payment Sports Storage Mirgation Bluetooth Comparison Relocation Software Tips iPhone IP Address Google Wallet Cookies Redundancy Break Fix Webcam Corporate Profile Alt Codes Electronic Medical Records Printer Crowdsourcing Dark Data IT Consulting Language Quick Tips Migration Black Friday Private Cloud Mobile Office Drones Nanotechnology Dark Web Point of Sale WannaCry Typing Time Management Access Control Buisness Data Breach Computing Infrastructure Chatbots Cyber Monday Error Cabling Knowledge Data Warehousing Cryptocurrency Network Management SharePoint Technology Laws Alerts PowerPoint Identity flu season Bitcoin Update Staffing Experience Consumers Lenovo Microsoft Excel Web Server VoIP Touchscreen Downloads BDR Unified Threat Management Cooperation Shortcut Fort Worth Administrator Disaster 3D Printing Windows 8 Chromebook GPS Superfish Blockchain Cameras Digital Multi-Factor Security Law Enforcement Google Maps Network Congestion eWaste Domains business communications systems Staff 5G Compliance Entrepreneur Patch Management flu shot IT Sevices Uninterrupted Power Supply Unsupported Software Emoji Tracking Application Permissions CCTV Spyware Google Calendar Gadget Users Display Environment Public Speaking Internet Protocol Flexibility Hacks Regulations Fort Worth IT Solid State Drive Mobile Data Networking Fraud How To Heating/Cooling Legislation Troubleshooting VoIP streamlines Operations Current Events Social Networking DFW IT Service Hard Disk Drive Processors Laptop Hard Drives Net Neutrality G Suite Firefox Servers Virtual Desktop business network infrastructure Wearable Technology Phone System Motherboard Smart Technology Motion Sickness Supercomputer Halloween Google Docs Refrigeration Techology Internet Exlporer Assessment Software as a Service Help Desk Writing data services Fun Router Mail Merge Distributed Denial of Service Deep Learning Personal Information IT Budget Scary Stories Disaster Resistance IT Consultant Consultation Statistics Technology Tips Machine Learning Social Engineering User Error IT Technicians Modem Address Managed IT Service Meetings Computer Repair Notifications Undo Proactive IT Hotspot Cleaning

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code