Over the weekend an enormous cyber-attack hit more than 200,000 Windows computers in 150 countries. It used WannaCry/WannaCrypt ransomware, malicious software which locks up your files or systems and prevents access to them unless you pay a ransom.
The attack was slowed yesterday, but it’s now back to work.
Here’s a few things you need to know to keep you protected.
Patch your workstations
Microsoft released security patches in March which protect against the vulnerability. If you have automatic Windows updates – and you’ve allowed them to carry out – you’re protected.
If you haven’t allowed automatic updates – or you’re not sure – please download the appropriate security update for your operating system from the Microsoft website.
If you need guidance with how to do this, we can help. Just get in touch.
Patch your servers
Like your workstations, your servers should also be patched with the most up-to-date security.
ServerDefence, our cloud-based server security, prevents WannaCry from spreading. With ServerDefence, you’re in the best position you can be to stop WannaCry spreading through your network. Its virtual patching means you’re protected against even the latest threats. If you haven’t got it yet, talk to us about getting it set up.
Be careful with emails and file downloads
WannaCry has so far spread by other means, but it could potentially be spread via email attachments. So as always, be careful with your emails.
- Be cautious about opening attachments, even if look like they’re from someone you know.
- If in doubt, call the sender or talk to them face-to-face to confirm they sent the file.
We’ve got a couple of ways to help keep you email-safe.
- MailProtect: identifies, filters out and quarantines anything it identifies as spam, viruses or spoofed emails.
- ScamProtect: an awareness and testing campaign to help train your staff to spot email-borne scams and viruses.
Restrict external access
If you’re unpatched, as a precautionary measure, we recommend you:
- Don’t allow laptops from outside your organisation to connect to your network.
- Disable or restrict virtual private network (VPN) access.
Photo credit: Christiaan Coler via Flickr