There have recently been a huge increase in ransomware and cryptolocker attacks. This is rapidly becoming one of the most significant threats to UK organisations.
Friday’s high profile cyber-attack has affected more than 200,000 victims in 150 countries as of Sunday PM 14/05/17.
It is imperative if you are running an affected system that you apply the latest security patch from Microsoft as there are reports of a new version of the ransomware already in circulation.
Microsoft have released guidance for those that may be affected.
Customers who are running supported versions of the operating system (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows Server 2012 R2, Windows Server 2016) will have received the security update MS17-010 in March. If customers have automatic updates enabled or have installed the update, they are protected. For other customers, we encourage them to install the update as soon as possible.
For those organizations who have not yet applied the security update, we suggest you immediately deploy Microsoft Security Bulletin MS17-010. Customers running Windows 10 are not affected by this attack and need take no action.
Download English language security updates here:
Three easy things you can do to protect yourself online:
1, Install security patches – keeping your operating system up to date with the latest security hot-fixes and patches is one of the most effective ways to stay safe online. Automatic updates are enabled by default on the latest Microsoft operating systems.
2, Don’t open unexpected attachments – if you don’t expect to receive an attachment don’t open it. Also do not click on links from within an email. Instead type the website address manually into your web browser if you are unsure.
3, Update to the latest operating system – running older operating systems such as Windows XP means you are more vulnerable to these sorts of attacks. Upgrade where possible to the latest operating system for the most secure experience.