On May 12, 2017 a new strain of the Ransom.CryptXXX (WannaCry) strain of ransomware began spreading widely impacting a large number of organizations, particularly in Europe. This virus specifically targets Microsoft Windows computers.

A hacking tool known as Eternal Blue, developed by US CIA has been enhanced by the hackers to super-charge an existing form of ransomware known as WannaCry, three senior cyber security analysts said.

Wcry is demanding a ransom of $300 to $600 in Bitcoin to be paid by May 15, or, in the event that deadline is missed, a higher fee by May 19. The messages left on the screen say files will remain encrypted. It’s not yet clear if there are flaws in the encryption scheme that might allow the victims to restore the files without paying the ransom.

If you have yet to install the Microsoft fix—MS17-010— you should do so immediately. You should also be extremely suspicious of all e-mails you receive, particularly those that ask the recipient to open attached documents or click on Web links.

If you are an existing client of ours on our Managed Services Platform, you would have already received the fix through your weekly patching cycle, If not please check with your IT and or Security provider to ensure you are covered

Read Reuters Article : http://www.reuters.com/article/us-britain-security-hospitals-idUSKBN18820S

 

Business Intelligence Tools For Small Business

Business Intelligence Tools For Small Business

We all wish we had a magic crystal ball that would make our lives easier, whether that means knowing when to change our hairstyle, or when to apply for that dream job. In business, there is no magic crystal ball that will tell us what’s going to happen, but with...

The Invisible Dangers of Public Wi-Fi

The Invisible Dangers of Public Wi-Fi

Public Wi-Fi may be convenient, but it’s not necessarily safe. Are you putting your data at risk when you connect? Have you ever been to a Starbucks? Stayed in a hotel? Taken a flight or had a layover? It’d be hard to find a person who can say...