Emerging Global Ransomware Attack Alert – WanaCrypt Virus


We understand that your focus is to drive business growth and stay ahead of the competition. That’s why our Expertly Managed IT services are curated to streamline your operations, help secure your business, and ensure your technology scales with your ambition. We bring a proactive approach to IT management, offering tailored solutions that keep you connected and protected. With services ranging from real-time monitoring to cutting-edge cybersecurity and disaster recovery planning, we’re here to empower your strategic decisions with our Virtual CIO and co-managed IT support. We stand by a security-first ethos, reinforced by our dedicated helpdesk, ensuring clear assistance in plain English, anytime you need it. We are your partner in building a resilient, efficient, and innovative IT infrastructure, freeing you to focus on what you do best: running your business.

Empower Your Business with Expert IT Support

Unlock efficiency and secure your digital assets with our Expertly Managed IT services—where peace of mind meets innovation.

Emerging Global Ransomware Attack Alert!

Ransomware attacks keep taking the unprepared world by surprise, and now the world has experienced one of the most severe ransomware outbreaks in history: WannaCrypt0r (also known as WannaCrypt, WannaCry, or WCry).
This ransomware has affected more than 200,000 computer systems including those at major companies such as FedEx, personal computers, ATM machines, and even hospitals, in over 90 countries.
This latest attack is so concerning that it has even captured the direct attention of the White House.
The good news is that right now, there has been a “Kill switch” initiated which drastically reduces the rate of the outbreak, but security experts are warning about other, more malicious versions on the horizon.

What is ransomware?

There are two types of ransomware: crypto-ransomware that encrypts files (rendering them unreadable), and screen-locking ransomware that locks the home screen.
In both cases, the authors of malicious software demand a ransom from its victims to access the files and device.
Ransomware is frequently spread via email: a cyber criminal sends an email with an attachment.
The unsuspecting user opens the document (or javascript file), which looks like gibberish.
Executing the document allows the ransomware to be secretly downloaded onto computers via a drive-by download. Once the payload is downloaded, the ransomware begins to encrypt all files, and replicate itself across unprotected networks.

What is so special about WannaCrypt0r?

In this case, it’s the ransomware’s way of spreading, which is more like a worm than a “normal” ransomware and its ability to self-propagate. That means that once it is on your system it will try and spread to another one on its own and by means of exploiting vulnerabilities that have either not been detected or patched yet. In the case of WannaCrypt0r, it’s a vulnerability called EternalBlue – one of the exploits recently released by Shadow Brokers in the leaked NSA tools archive.


Is my system protected?

The current version of WanaCrypt takes advantage of a flaw in the Microsoft Windows operating system which Microsoft has now patched. However, if your system is not actively being monitored, maintained and patched, MS17-010 could be missing leaving you vulnerable.
If you are currently enrolled in our Remote Care with patch management, or Enhanced Care plans, our team has already made every effort to verify that this patch has already been installed on your system and that you are protected.
Furthermore, we have already verified that all active firewalls and antivirus programs have the latest updates which will detect WanaCrypt and block its execution.
If you are not currently enrolled, call us today to find out how we can manage and protect your systems for you.

What do I do if I am infected?

In the worst case scenario, where you become infected, the first step is to unplug your system from the network and the internet.
Your next step is to check on your backups and come up with a plan to restore your data to a clean system.
You may have noticed that paying the ransom is not a recommended option as most victims are currently reporting making ransom payments without being able to regain access to their files.
Keep in mind these ransom payments are paid via Bitcoin, an untraceable, one-way form of internet currency.

This translates into a payment being sent to an unknown recipient and being at their mercy to take action.

How do I protect myself and my systems?

As ransomware becomes a household name, one thing is for certain: Global cybersecurity has reached a moment of emergency.

You need to make sure that you are aware of the latest updates, threats and tools, and that at the least bit, you are making sure that:

  • You have a backup and disaster recovery system in place, which is tested and verified on a regular basis.
  • All of your software up-to-date including the latest vendor patches (released multiple times a month).
  • You have the proper antivirus and web protection, and its kept updated with the latest definitions (multiple times a day).
  • Yu have the proper hardware based firewall installed, and that you are keeping it updated with the latest definitions to protect your network.
  • Monitor all of your systems 24x7x365 to catch and prevent outbreaks.

If you feel like any of these items are above and beyond your capabilities or job description, contact us immediately!

Our team can help you manage every aspect of your IT and take your IT to the next level, so you can take your business to the next level.

Don’t miss out on all the benefits – subscribe now and take your business to the next level!

  • Get exclusive access to expert insights and tips for leveraging technology to grow your business.
  • Stay up to date on the latest tech trends and advancements that can help you stay ahead of the competition.
  • Join a network of business leaders who are committed to using technology to drive success and innovation.
  • Receive personalized support and guidance from our team of IT experts.
  • Enjoy a more streamlined and secure digital experience with our insider tips and tricks.
Three people in a meeting at a table discussing schedule on their Microsoft laptop

Introducing the New Microsoft Planner (Everything You Need to Know)

Calendars, task lists, and project planning are important business tools. Many people use Microsoft’s apps to power these processes. Including Planner, Microsoft To Do, and Project for the web.These tools help keep processes on track and enable task accountability. But…
boost your miami business with expert it support

Boost Your Miami Business with Expert IT Support

Are you a business owner in Miami, Florida, wondering how to keep your IT infrastructure running smoothly without the hassle and headaches? You’re not alone. Many businesses in Miami struggle to manage their IT needs while focusing on their core…
Free internet of things iot network vector

How to Properly Deploy IoT on a Business Network

The Internet of Things (IoT) is no longer a futuristic concept. It’s rapidly transforming industries and reshaping how businesses operate. IoT is a blanket term to describe smart devices that are internet enabled. One example is smart sensors monitoring production…
Free lock security key vector

Here Are 5 Data Security Trends to Prepare for in 2024

With cyber threats evolving at an alarming pace, staying ahead of the curve is crucial. It’s a must for safeguarding sensitive information. Data security threats are becoming more sophisticated and prevalent. The landscape must change to keep up. In 2024,…