New Variant Of “WannaCry” Virus Emerges Infecting Computers.

Users of computers world over are currently faced with an escalating threat of cyber-attacks which as at Friday, May 12, 2017, had infected over 200,000 systems in at least 150 countries and the numbers are increasing. Security threat reports indicate an escalation pattern unlike any ever witnessed before by the ransomware called “WannaCry”.

The attack launched using modified variant of ransomware; unlike the traditional ransomware deployed to users through emails and file attachment, this variant of ransomware used in combination with a worm has the added capability to spread through an infected system to other systems within the network(i.e. peer-to-peer). Ransomware is malicious software which infects computers and systems from compromised websites or attachments downloaded from websites or unsolicited emails. When your system is infected by a ransomware the entire system or files are encrypted and access to the system or files are denied the user until a ransom is paid.
With the widespread of the ransomware taking the world by storm (WannaCry); now is the best time to remind you of the Dos and Don’ts of Information Security as it relates to Ransomwares.

What to Do and What not to Do on Your System to protect this Virus:
1 . Do ensure that your Antivirus is up to date-  search for “system center endpoint protection”  on your computer, update status and carry out a manual update if  Virus and spyware definitions are not up-to-date.
2.  Do backup important business files and information on external resources (SharePoint)- Follow the document management policy requirements on data and files backup.
3. Do isolate your computer from the network if you notice any system malfunction or exceptions – if your computer displays unusual error messages or requests that you contact someone on specified numbers or email; remove the network cable.4. Don’t ignore system malfunctions or exceptions messages- read them and take action. .

4. Don’t ignore system malfunctions or exceptions messages- read them and take action.
5. Do stay alerted to these risks and know what actions to take if you suspect your computer is infected Don’t open suspicious attachments or unsolicited emails

6. Don’t open suspicious attachments or unsolicited emails

You may also like: