Unless you have been totally disconnected from the world the last few days, you have heard about the WannaCry ransomware attack that has been spreading around the world. This attack is being dubbed by some as the precursor to a larger, more focused attack once the extent of the vulnerability is revealed.
Those primarily affected are running unsupported systems like Windows XP, pirated or illegal copies of Windows, and those not staying current on operating system patches.
What is the right response to WannaCry? What should your IT team be doing?
In the wake of the news of the WannaCry ransomware attack, the cyber-security professionals of Blue Star went immediately to work.
While we believed that the workstations and servers we support had been patched appropriately to protect against the WannaCry attack, we still took the time to review all of the workstations and servers we support to determine if there are any that may have been missing the patches needed.
Beyond this immediate response, we also proactively surveyed the security of our internal network to protect the resources we depend on in delivering IT services to you.
Here’s a checklist that your IT support provider SHOULD be doing.
This can be frustrating to end users when their workstations interrupt their work by restarting or operating slowly, but it is a critical part of staying safe in today’s technology-infused world.
The cost of continually upgrading and replacing workstations and servers can feel like an unnecessary drain on company resources. WannaCry – and similar attacks – are the reason why Blue Star IT consultants talk regularly with our clients about replacing unsupported hardware.
The Windows 10 operating system was not affected at all by this attack. Staying current on operating systems and other software is a critical part of staying safe in today’s world.
Over the last year, the Blue Star team has been more forcefully recommending the creation of separate networks for guest workstations and employee-owned equipment. This has felt inconvenient to many, and in some ways, it is. Again, attacks like WannaCry are the reason why we recommend this change.
Blue Star works actively to keep our client’s equipment patched and up-to-date. But we cannot do the same for equipment we do not support. By providing a separate network for non-company owned equipment, we can provide the Internet connection needed without endangering the company’s valuable assets.
These are just some of the proactive steps we take to help secure the networks we support. But cyber security is a team effort. We cannot do this on our own.
What can you do to help in the process of securing your company against cyber crime?
Blue Star IT consultants recommend that the primary contact for your company meet regularly with your IT support team to discuss and plan the technology for the company. This will give you the clearest picture of what is being done with the company’s technology.
Armed with a high-level picture of your company’s IT strategy, you will be able to:
Whether you like it or not, technology has become an integral part of our daily lives. Properly cared for, it can be a valuable asset. But when ignored, it can be an ugly beast that can lay waste to the business.
Blue Star is proactively working to secure and maintain the networks of our clients, and we encourage our clients to take an active role in their own IT and to implement common sense cyber-security policies.
How has YOUR current IT support team responded to the WannaCry threat? Have they been efficient, informative, and communicative? Maybe it’s time for a change.
Bonus Info! – Here are some articles that we looked at as we researched this latest WannaCry threat. Take a look!
Looking to implement a new line of business applications or replace an old server? With our approach to IT project delivery, we help prevent scope creep and keep budgets in line with budgeted project costs.