On May 12, 2017 a new strain of the Ransom.CryptXXX (WannaCry) strain of ransomware began spreading widely impacting a large number of organizations, particularly in Europe. This virus specifically targets Microsoft Windows computers.

A hacking tool known as Eternal Blue, developed by US CIA has been enhanced by the hackers to super-charge an existing form of ransomware known as WannaCry, three senior cyber security analysts said.

Wcry is demanding a ransom of $300 to $600 in Bitcoin to be paid by May 15, or, in the event that deadline is missed, a higher fee by May 19. The messages left on the screen say files will remain encrypted. It’s not yet clear if there are flaws in the encryption scheme that might allow the victims to restore the files without paying the ransom.

If you have yet to install the Microsoft fix—MS17-010— you should do so immediately. You should also be extremely suspicious of all e-mails you receive, particularly those that ask the recipient to open attached documents or click on Web links.

If you are an existing client of ours on our Managed Services Platform, you would have already received the fix through your weekly patching cycle, If not please check with your IT and or Security provider to ensure you are covered

Read Reuters Article : http://www.reuters.com/article/us-britain-security-hospitals-idUSKBN18820S

 

Healthcare Fines For Breaches Are Increasing

Healthcare Fines For Breaches Are Increasing

Healthcare was a lucrative target for hackers in 2018. Cybercriminals are getting more creative despite better awareness among healthcare organizations. And fines for breaches of patient information are increasing. What more can you do to ensure your patient data is...

Windows Server 2008 End of Support (Questions and Answers)

Windows Server 2008 End of Support (Questions and Answers)

Unfortunately, all good things must come to an end — and on January 14, 2020, Microsoft will be stopping mainstream service for their highly popular Windows 2008 Server. If you are one of the millions of organizations who are still using this secure and highly...