WannaCry Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/wannacry/ Your Office Technology Partner Thu, 24 Sep 2020 14:22:26 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png WannaCry Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/wannacry/ 32 32 Is WannaCry Making You Wanna Cry? https://lesolson.redpeppersoftware.net/blog/is-wannacry-making-you-wanna-cry/ Sat, 25 Mar 2017 21:44:30 +0000 https://lesolson.com/?p=10451 Picture this. You are working on an important proposal at your company workstation when all of a sudden, your screen goes black. You receive a small, striking message on the top of your monitor: “Your files are being held for ransom.” What do you do? How can you fix it? Will your files ever be recovered? This is a small example of what can happen when you are not protected from ransomware.

The post Is WannaCry Making You Wanna Cry? appeared first on Les Olson IT.

]]>
[cz_image id=”cz_87908″ image=”11506″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_27251″ cz_title=””]Picture this: you are working on an important proposal at your company workstation when all of a sudden, your screen goes black. You receive a small, striking message on the top of your monitor,

 

“Your files are being held for ransom.”

 

What do you do? How can you fix it? Will your files ever be recovered? This is a small example of what can happen when you are not protected from ransomware.

 

Many organizations have recently been affected by an outbreak of a new ransomware variant, Wanna, which is known by a variety of aliases such as WannaC, WannaCryptor and, best of all, WannaCry. As a Sophos reseller, we want to provide you with the information that you need to protect your home and your business from these virulent attacks.

 

What is ransomware, and how do I protect my network from it?

Ransomware is a type of malicious software that holds true to its name. The ransomware will sporadically encrypt important files, documents and data and hold it hostage until a ransom is paid electronically. Programs such as InterceptX by Sophos serve a similar role as Liam Neeson from the Taken movies–they will find the ransomware, and they will kill the ransomware. Sophos InterceptX, Sophos Exploit Prevention (EXP), and Sophos Server Protection Advanced customers were protected proactively against Wanna ransomware from the first instance or outbreak that occured across many businesses at the beginning of May (see Wanna DecryptOr Outbreak).

 

On Friday, May 12th and Saturday, May 13th, Sophos was able to update their protection rules, and their endpoint software–Sophos Endpoint–now blocks every variant of Wanna from executing. This protection is crucial in protecting your business or organization from malicious software that could entirely halt business productivity.

 

How do I protect myself from Wanna and other ransomware?

This video demonstrates how Sophos products can help protect your network against Wanna ransomware.[/cz_title][cz_gap height=”25px”]

[cz_title id=”cz_102178″ cz_title=””]We have compiled a list of three simplified, important steps that ANYONE can take to ensure that you are protected from all variants of Wanna.

 

1. Patch up your network.

Wanna ransomware exploits a Windows vulnerability in small or midsize businesses for which Microsoft released a patch in March. It is highly likely that new attacks will appear based on the leaked exploit and is therefore critical to patch this vulnerability at the first opportunity. In order to patch the vulnerabilities, it is imperative that you update all Windows environments as described in Microsoft Security Bulletin MS17-010.

2. Update your endpoint software.

Endpoint software is essentially software that adds extra protection to the entirety of your network. That can include other phones, laptops and desktops that are on the network and vulnerable to attacks. Once the endpoint software is updated and running according to the Microsoft Security Bulletin featured above, your network should be protected from ransomware.

 

3. Ensure you are running advanced ransomware protection such as InterceptX by Sophos.

With this advanced protection, InterceptX serves as a safeguard from any future attacks by intercepting spontaneous file encryption and then reversing the encryption before it causes any permanent damage to your files. Home users should consider signing up for the Sophos Home Premium, which adds protection from ransomware in your home and on your personal devices.

 

If you still have questions about how to protect yourself from ransomware, click on the following button! Sophos wrote a great, all-inclusive article on protecting from ransomware that is user-friendly and easy to understand. We hope that you will be able to use this information to protect and safeguard your company and your home.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_77978″ sk_overall=”background-repeat:no-repeat;background-position:right bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/09/artArtboard-1types-of-cyber-attacks.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:%2Finfo%2Ftypes-of-cyber-attacks-and-how-to-prevent-them%2F|||”][cz_title id=”cz_68272″ link=”url:%2Finfo%2Ftypes-of-cyber-attacks-and-how-to-prevent-them%2F|||” sk_overall=”background-color:rgba(255,255,255,0.84);left:-16px;” cz_title=””]

TYPES OF CYBER

ATTACKS AND HOW

TO PREVENT THEM

[/cz_title][cz_gap height=”30px” id=”cz_62034″][cz_social_icons fx=”cz_social_fx_10″ id=”cz_98811″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Finfo%2Ftypes-of-cyber-attacks-and-how-to-prevent-them%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;” cz_social_icons=””][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_13803″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/10/artArtboard-1deeplearning.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||”][cz_title title_pos=”cz_title_pos_right” id=”cz_24640″ link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||” sk_overall=”background-color:rgba(255,255,255,0.83);” cz_title=””]

DEEP LEARNING

ENHANCES

ENDPOINT SECURITY

[/cz_title][cz_gap height=”30px” id=”cz_62034″][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_60704″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post Is WannaCry Making You Wanna Cry? appeared first on Les Olson IT.

]]>