Refresh page or whitelist this site in you Ad-block if you are seeing this

How To Tell if You Are Attacked By Wannacry Ransomare And What To Do

Am I at risk?
The WannaCry ransomware affects machines running the Windows operating system. It was a security flaw that was originally exploited by the U.S. National Security Agency (NSA) which was then leaked earlier this year. Hackers are now using this themselves.

If you or your organization is running a version of Windows, you could be at risk.

What should I do to protect myself?

Authorities in the U.S. and U.K. have issued guidance on what to do.

Individuals and small businesses should:

  1. Run Windows Update to get the latest software updates
  2. Make sure any anti-virus product is up-to-date and scan your computer for any malicious programs. It's also worth setting up regular auto-scans
  3. Back up important data on your computer in case it gets held for ransom

Large organizations should:

  1. Apply the latest Microsoft security patches for this particular flaw
  2. Backup key data
  3. Ensure all outgoing and incoming emails are scanned for malicious attachments
  4. Ensure anti-virus is up-to-date and conducting regular scans
  5. Educate employees on identifying scams, malicious links, and emails that may contain viruses
  6. Make sure to run "penetration tests" against your network's security, no less than once a year, according to the Department of Homeland Security

What if I've already been attacked?
Do not pay the ransom demanded by the WannaCry ransomware, cybersecurity firm Check Point warned in a blog post on Sunday. The company said there is no evidence of the hackers giving people files back
For individuals, it might be worth contacting local IT support services
Businesses should contact law enforcement and provide as much information as possible
Restore back-ups of data
How can I prevent ransomware attacks?

There are also steps that can be taken to protect against ransomware more generally. These include:

Making sure anti-virus is up-to-date and updating all software
Back up copies of data
Scrutinize links and files contained in emails
Only download software from trusted sources

Read Also:How 22 year Old Stopped World-Wide Cyber Attack

No comments:

Leave A comment