On May 12, 2017 a new strain of the Ransom.CryptXXX (WannaCry) strain of ransomware began spreading widely impacting a large number of organizations, particularly in Europe. This virus specifically targets Microsoft Windows computers.

A hacking tool known as Eternal Blue, developed by US CIA has been enhanced by the hackers to super-charge an existing form of ransomware known as WannaCry, three senior cyber security analysts said.

Wcry is demanding a ransom of $300 to $600 in Bitcoin to be paid by May 15, or, in the event that deadline is missed, a higher fee by May 19. The messages left on the screen say files will remain encrypted. It’s not yet clear if there are flaws in the encryption scheme that might allow the victims to restore the files without paying the ransom.

If you have yet to install the Microsoft fix—MS17-010— you should do so immediately. You should also be extremely suspicious of all e-mails you receive, particularly those that ask the recipient to open attached documents or click on Web links.

If you are an existing client of ours on our Managed Services Platform, you would have already received the fix through your weekly patching cycle, If not please check with your IT and or Security provider to ensure you are covered

Read Reuters Article : http://www.reuters.com/article/us-britain-security-hospitals-idUSKBN18820S

 

What Are the Most Serious Cybersecurity Stories of 2019?

What Are the Most Serious Cybersecurity Stories of 2019?

We’re only halfway into 2019, yet data protection specialists and IT analysts have already seen an unfortunate spike in criminal activity across industries. Thus far, here are the biggest cybersecurity crises of the year. 2019’s Top Cybersecurity Stories #1 – Supply...

Top Ways to Avoid Phishing Scams (Including Spear Phishing)

Top Ways to Avoid Phishing Scams (Including Spear Phishing)

Top Ways to Avoid Phishing Scams (Including Spear Phishing) Phishing scams — and, increasingly, spear-phishing scams — are the number one way that cyber hackers gain access to closed computer systems, steal information and money, and corrupt data. Let’s take a look at...

How Do I Choose a Cloud Computing Model?

How Do I Choose a Cloud Computing Model?

How Do I Choose a Cloud Computing Model? No matter what your company or organization specializes in, it’s sure that you have some form or forms of data that needs to be stored, well, somewhere. Before the invention of cloud computing, most company data was always...