Post Cyber-Attack: Know What You Have

Post Cyber-Attack

Know What You Have

Post Cyber Attack: Know What You Have

Over the past weekend, the so-called WannaCry crypto-virus attacked tens of thousands of international businesses, private persons and government agencies. It targeted devices running Microsoft Windows Operating Systems that lacked the necessary security patch levels. Our IT specialist Franz Schildberger weighs in.

Regularly Check and Update Your Patch Levels

Unfortunately, many people – and businesses – still do not grasp the importance of securing their systems with regular updates. In addition, many do not even know what software they are currently running and what patch level these might currently be on. A big risk. Over the past weekend when the crypto-virus “WannaCry” (also known as “WannaCrypt”) caused the complete encryption of tens of thousands of computers in more than ca. 75 countries (as per May 16), these weak spots became very apparent. The attack was so devastating that many corporations were forced to cease operations temporarily.

Once it takes control, this sophisticated ransomware – the original coding of which has been accredited to the American National Security Agency (NSA) – threatens to delete the encrypted files if the ransom (in Bitcoins) is not paid within a given deadline (usually 72 hours). Many frightened of the consequences have already paid the price. Experts warn, however, that paying the attackers does not guarantee that files will be restored again. Final analyses of this large-scale attack are ongoing. What is already clear though is that this global attack underlines the importance of keeping an up to date inventory of your software to minimize the risk of such a devastating violation of data.

Post Cyber-Attack
Keep an overview of your installations, e.g. with our Portfolio Management Platform

Top 5 Preventions:

Follow these simple rules to make sure your IT environment is well prepared in case of a cyber-attack:

  1. Make sure that each system has an updated security profile that is constantly reviewed
  2. Patch all systems to the latest security levels
  3. Backups, backups and backups. Most importantly: Test your backups!
  4. Use virtualization for fast system recovery
  5. Ensure awareness training within your business. You are only as good as your weakest link. Every user is a weak link.

What Software is Running on Your Device?

Our Managed Security team can help you to close security gaps caused by mismanaged or unknown software installations. Find out how you can ensure endpoint protection with consistently updated security levels.


Discover Managed Security

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Franz Schildberger

Franz Schildberger

Product Manager IT Finance

ITFM (IT Financial Management) including Software Asset Management

Related Articles

SoftwareONE Acquired B-lay

SoftwareONE Brings B-lay Into the Fold

After the acquisition of B-lay we sat down with Darryl Sackett, SoftwareONE’s Global Director of SLM to discuss the recent acquisition.

Threat protection for Windows clients: Microsoft Defender ATP
  • 08 July 2020
  • Jochen Berners
  • Managed Security
  • Security, Microsoft, ATP

Windows Threat protection: Microsoft Defender ATP

Explore how Microsoft Defender Advanced Threat Protection (ATP) helps enterprise networks prevent, detect, investigate, and respond to advanced threats.

How Insights Into Software Portfolio Drive Innovation and Cost Savings

How Insights Into Your Software Portfolio Drives Innovation and Cost Savings

Let's talk about the importance of software and cloud insights and cost savings for organizations.