Cyber attacks are an increasing concern for organisations of all sizes, with attacks in 2017 attacking thousands of organisations worldwide including numerous NHS trusts and hospitals and even global telecoms giants.
In our blog we have mentioned the risks of ransomware numerous times in the past, highlighting how users and organisations should guard against the threats and adopt best-practices to mitigate the risks.
In case you are unaware, ransomware is malware which encrypts the contents of a machine’s hard drive. Once infected, users have a stark choice: ignore the warning and hope that their back-up procedure is effective, or pay the ransomware demand and trust that the criminals will decrypt their data.
As an absolute minimum, IT administrators must ensure that they:
- Keep your software up-to-date. A huge number of Windows XP machines were affected by the WannaCry attack – we highlighted the risk of running unsupported software in a recent blog. In an unexpected move, Microsoft took it upon themselves to issue patches for even unsupported software so it is imperative that these updates are installed and system administrators look to upgrade to more secure software. Download English language security updates: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64
- Educate staff! The majority of ransomware attacks can be prevented by an informed and vigilant user base. We have produced a guide that is available on request.
- Invest in a security review from a specialist such as Akita.
Strong security measures are imperative, not just on servers and hard drives but on all parts of your network. With Ransomware attacks now using worms to spread, this remains crucial to protect your business.
To ensure that your business is well-protected, contact Akita today and arrange for a security review and audit of your IT systems. This will ensure that any potential weaknesses are identified, staff issues are addressed, and the risks of costly security breaches are minimised.
Other services Contact us