The massive ransomware cyber-attack from the virus “WannaCry” has to date caused havoc on more than 200,000 computers in 150 countries. The virus is targeting Microsoft Windows devices.
Protecting our Customers
AV Patch customers - Our Engineers have reviewed all of our customer environments to ensure that any threat is minimised.
We are happy to confirm that all known supported Operating Systems (Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2 & Windows server 2012) have all had the Microsoft recommended March security release (MS17-010), which should mitigate the current threat.
Managed Service customers - Where we manage your file server, we have updated filename blacklists with Microsoft’s latest exclusions.
PSU's Recommended Actions
PSU strongly advises that all IT estates should be reviewed and ensure that Microsoft's March security release (MS17-010) is installed immediately to reduce the risk exposure.
- We advise you to ensure that files are backed-up and all your software patches & antivirus software is kept up-to-date.
- We advise all users to only open email attachments from known sources, where they can be confident about its origin & validity and to avoid the use of unknown websites.
- Have control measures in place to prevent the installation of software without authorisation of an administrator.
March security release (MS17-010) mitigates current threat for:
- Windows 7
- Windows 8.1
- Windows 10
- Windows Server 2008
- Windows Server 2008 R2
- Windows Server 2012
Windows OS at high risk:
- Windows XP
- Windows 8
- Windows Server 2003
Further information can be found at: https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
This latest outbreak is just another example of the global threat presented by cyber-attacks, and unfortunately it is not likely to disappear anytime soon. The risk of being infected by ransomware can be significantly reduced by taking the usual computer security steps. Installing patches and updates, as soon they are released by software firms, is a strong preventative action. Hackers often exploit known vulnerabilities in operating systems, web browsers, plug-in and applications that have been known about for some time.