Post Cyber-Attack
Know What You Have

Post Cyber Attack: Know What You Have

  • Franz Schildberger
  • Managed Security, Software Asset Management
  • Ransomware, Cyber-Attacks, Cyber-Security

Over the past weekend, the so-called WannaCry crypto-virus attacked tens of thousands of international businesses, private persons and government agencies. It targeted devices running Microsoft Windows Operating Systems that lacked the necessary security patch levels. COMPAREX IT specialist Franz Schildberger weighs in.

Regularly Check and Update Your Patch Levels

Unfortunately, many people – and businesses – still do not grasp the importance of securing their systems with regular updates. In addition, many do not even know what software they are currently running and what patch level these might currently be on. A big risk. Over the past weekend when the crypto-virus “WannaCry” (also known as “WannaCrypt”) caused the complete encryption of tens of thousands of computers in more than ca. 75 countries (as per May 16), these weak spots became very apparent. The attack was so devastating that many corporations were forced to cease operations temporarily.

Once it takes control, this sophisticated ransomware – the original coding of which has been accredited to the American National Security Agency (NSA) – threatens to delete the encrypted files if the ransom (in Bitcoins) is not paid within a given deadline (usually 72 hours). Many frightened of the consequences have already paid the price. Experts warn, however, that paying the attackers does not guarantee that files will be restored again. Final analyses of this large-scale attack are ongoing. What is already clear though is that this global attack underlines the importance of keeping an up to date inventory of your software to minimize the risk of such a devastating violation of data.

Post Cyber-Attack
Keep an overview of your installations, e.g. with our Portfolio Management Platform

Top 5 Preventions:

Follow these simple rules to make sure your IT environment is well prepared in case of a cyber-attack:

  1. Make sure that each system has an updated security profile that is constantly reviewed
  2. Patch all systems to the latest security levels
  3. Backups, backups and backups. Most importantly: Test your backups!
  4. Use virtualization for fast system recovery
  5. Ensure awareness training within your business. You are only as good as your weakest link. Every user is a weak link.

What Software is Running on Your Device?

Our Managed Security team can help you to close security gaps caused by mismanaged or unknown software installations. Find out how you can ensure endpoint protection with consistently updated security levels.


Discover Managed Security
  • Wednesday 17 May 2017

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Franz Schildberger

Franz Schildberger Product Manager IT Finance

ITFM (IT Financial Management) including Software Asset Management

Related Articles

Cyber-Security Bulletin September 2019
  • 17 September 2019
  • Bala Sethunathan
  • Cyber Security Updates, Managed Security
  • Security, Cyber-Security

Cyber-Security Updates – September 2019

This month’s edition informs about latest data breaches, a data-stealing Android malware, a master decryption key provided by the FBI, and cyber-threat intelligence updates such as multi-stage attack delivering backdoor to turn Elasticsearch…

6 Steps to Transform Your Digital Supply Chain Program
  • 16 September 2019
  • Gabe Honesto
  • Software Asset Management
  • Software Lifecycle Management

6 Steps to Transform Your Digital Supply Chain Program

When it comes to digital supply chain management, new ways to improve and optimize your organization’s current methods are always cropping up. Let’s break down 6 steps to transforming your digital supply chain program.

Proactive Configuration Management: The Key to Good Cybersecurity
  • 11 September 2019
  • Bala Sethunathan
  • Managed Security
  • Security, Cyber-Security

Proactive Configuration Management: The Key to Good Cybersecurity

Prioritize and protect mission critical assets with the help of our security expert team to build a proper cybersecurity strategy