Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, Telesys Voice and Data can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from Telesys Voice and Data, call us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Best Practices Hackers Cloud Privacy Business Computing Productivity Malware Business Microsoft Email Windows 10 Internet Backup Hosted Solutions Computer IT Services Software User Tips Smartphone Ransomware Network Security Workplace Tips Google Managed Service Provider Android Hardware Browser IT Support Mobile Devices Social Media Business Continuity Efficiency Smartphones Communication Disaster Recovery Managed IT services App Office Upgrade Miscellaneous WiFi Data Innovation Microsoft Office Windows Data Management Facebook Remote Monitoring Holiday Office 365 Network Big Data Small Business Outsourced IT Phishing Hosted Solution Recovery Spam Artificial Intelligence Gmail Firewall Password Internet of Things Data Backup Robot Apps Save Money Money Data Recovery Work/Life Balance Office Tips Tip of the week Employer-Employee Relationship Server Productivity Risk Management Cloud Computing Apple Avoiding Downtime Unified Threat Management Word Hacker Mobile Device Management Customer Service How To Business Management Content Filtering Remote Computing Business Growth SaaS Presentation Encryption Social Customer Relationship Management Outlook Chrome Passwords Telephone Systems Settings Health Cybersecurity IT Support Computers Alert Hacking Managed IT Services Data storage Computing Education Operating System Cybercrime Saving Money Government IT solutions Safety VoIP Managed IT Paperless Office Data loss Wireless Technology BYOD Tablet Automobile Upgrades Wireless Budget Downtime End of Support Specifications Website communications Wi-Fi Mouse YouTube Windows 10 Collaboration User Legal File Sharing LiFi Two-factor Authentication Retail Twitter Monitors Best Practice Applications Politics Travel Analytics Vendor Management Lithium-ion battery Business Owner Google Drive The Internet of Things Websites Virtual Private Network Physical Security Going Green Marketing Taxes Botnet IBM Running Cable Mobile Computing Printing Samsung Bandwidth Competition Tech Support Maintenance Bring Your Own Device Search Sports IT Management Digital Payment Information Technology IT service Cortana Humor Virtualization Computer Care Administration Antivirus Virtual Reality Analyitcs Training Mobile Device Error Cabling Troubleshooting flu season Lenovo Cryptocurrency Knowledge Unified Threat Management Network Management Downloads Infrastructure Phone System Fort Worth Superfish Web Server VoIP Bitcoin Update Staffing Experience business communications systems Touchscreen Multi-Factor Security BDR Administrator Disaster 3D Printing Shortcut flu shot Scam Cameras Digital Windows 8 Chromebook GPS Network Congestion Domains Internet Protocol Google Calendar Law Enforcement Google Maps Uninterrupted Power Supply Unified Communications Unsupported Software 5G Entrepreneur Patch Management Fort Worth IT Application Networking CCTV Spyware Emoji Tracking Users Display Public Speaking VoIP streamlines Legislation Gadget Solid State Drive Mobile Data iPhone Hacks Vulnerability DFW IT Service Data Security How To Document Management business network infrastructure Heating/Cooling Smart Technology Hard Disk Drive Current Events VPN Hard Drives Techology G Suite Firefox Processors Identity Theft Laptop Virtual Desktop Automation data services Servers Software as a Service Distributed Denial of Service Motion Sickness Augmented Reality Refrigeration Disaster Resistance Assessment Supercomputer Halloween Google Docs Help Desk Writing User Error PowerPoint Server Management Technology Tips Mail Merge Managed IT Service Deep Learning Personal Information Fun Scary Stories Consumers Proactive IT IT Consultant Consultation IT Budget Machine Learning Licensing Social Engineering Printer Statistics Comparison Address Break Fix Meetings Computer Repair Storage Undo IT Consulting Cleaning Notifications Relocation Software Tips eWaste IP Address Bluetooth Black Friday Project Management IT Sevices Dark Web Webcam Corporate Profile Alt Codes Electronic Medical Records Google Wallet Dark Data Data Breach Quick Tips Access Control Crowdsourcing Private Cloud Environment Mobile Office Cyber Monday Business Technology Point of Sale WannaCry Typing Drones Buisness Technology Laws Time Management SharePoint

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...