Post Cyber-Attack: Know What You Have

Post Cyber-Attack
Know What You Have

Post Cyber Attack: Know What You Have

  • Franz Schildberger
  • Managed Security, Software Lifecycle Management
  • Ransomware, Cyber-Attacks, Cyber-Security

Over the past weekend, the so-called WannaCry crypto-virus attacked tens of thousands of international businesses, private persons and government agencies. It targeted devices running Microsoft Windows Operating Systems that lacked the necessary security patch levels. Our IT specialist Franz Schildberger weighs in.

Regularly Check and Update Your Patch Levels

Unfortunately, many people – and businesses – still do not grasp the importance of securing their systems with regular updates. In addition, many do not even know what software they are currently running and what patch level these might currently be on. A big risk. Over the past weekend when the crypto-virus “WannaCry” (also known as “WannaCrypt”) caused the complete encryption of tens of thousands of computers in more than ca. 75 countries (as per May 16), these weak spots became very apparent. The attack was so devastating that many corporations were forced to cease operations temporarily.

Once it takes control, this sophisticated ransomware – the original coding of which has been accredited to the American National Security Agency (NSA) – threatens to delete the encrypted files if the ransom (in Bitcoins) is not paid within a given deadline (usually 72 hours). Many frightened of the consequences have already paid the price. Experts warn, however, that paying the attackers does not guarantee that files will be restored again. Final analyses of this large-scale attack are ongoing. What is already clear though is that this global attack underlines the importance of keeping an up to date inventory of your software to minimize the risk of such a devastating violation of data.

Post Cyber-Attack
Keep an overview of your installations, e.g. with our Portfolio Management Platform

Top 5 Preventions:

Follow these simple rules to make sure your IT environment is well prepared in case of a cyber-attack:

  1. Make sure that each system has an updated security profile that is constantly reviewed
  2. Patch all systems to the latest security levels
  3. Backups, backups and backups. Most importantly: Test your backups!
  4. Use virtualization for fast system recovery
  5. Ensure awareness training within your business. You are only as good as your weakest link. Every user is a weak link.

What Software is Running on Your Device?

Our Managed Security team can help you to close security gaps caused by mismanaged or unknown software installations. Find out how you can ensure endpoint protection with consistently updated security levels.


Discover Managed Security
  • Wednesday 17 May 2017

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Franz Schildberger

Franz Schildberger Product Manager IT Finance

ITFM (IT Financial Management) including Software Asset Management

Related Articles

Cyber Security Update 2020-01
  • 14 January 2020
  • Bala Sethunathan
  • Cyber-Security Updates, Managed Security
  • Cyber-Security, Cyber-Threats

Cyber Security Update - January 2020

Ransomware incidents have reached a new level of frequency and we expect the number to continue to increase. We’ve highlighted a few organizations which faced ransomware attacks in the past.

office 2010 EoS
  • 09 January 2020
  • Blog Editorial Team
  • Publisher Advisory, Managed Cloud, Managed Security
  • Microsoft, EoS, Office 2010

3 Decision Criteria to Inform Your Upgrade After Office 2010 EoS

Office 2010’s end of support is approaching on October 13th, 2020. Take a look at key decision criteria to find a clear path to upgrade.

Risks of Maintaining SQL 2008 After End of Support
  • 17 December 2019
  • Tony Mackelworth
  • Publisher Advisory, Managed Security
  • SQL Server, Security, EoS

Risks of Maintaining SQL 2008 After End of Support

With SQL EoS come and gone, organizations must update their SQL solution. Read this to learn the risks of keeping SQL Server 2008 after end of support.