Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, BNMC can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from BNMC, call us at 978-482-2020.

 

Comments 1

Wallace Wallace on Tuesday, 30 May 2017 00:54

Unquestionably I were given a couple of new matters from appropriate here I appreciated over read your weblog distribute. Your blog have charming records, I got correct musings from this splendid weblog. i am ceaselessly looking like this sort weblog post. i am trusting i'm ready to see yet again your set up. Feel free to surf @ college paper writing service

Unquestionably I were given a couple of new matters from appropriate here I appreciated over read your weblog distribute. Your blog have charming records, I got correct musings from this splendid weblog. i am ceaselessly looking like this sort weblog post. i am trusting i'm ready to see yet again your set up. Feel free to surf @ [url=https://www.collegepaperwritingservices.com/]college paper writing service[/url]
Already Registered? Login Here
Guest
Tuesday, 16 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Email Malware Hackers Business Computing Internet Microsoft Hosted Solutions Software IT Services Business Ransomware Android Computer Smartphone Windows Google Network Security Windows 10 Backup Small Business Business Continuity Data Browser Innovation Internet of Things App Hardware Data Management Office 365 Managed IT Services Smartphones User Tips Cloud Computing Saving Money Artificial Intelligence Data Recovery Encryption Productivity Mobile Devices Outsourced IT IT Support Phishing Tip of the week Remote Monitoring Upgrade Gmail Office Tips Big Data Data storage Word Money Facebook Managed Service Provider Productivity Cybersecurity Efficiency Risk Management IT Support Windows 10 Settings Robot Vulnerability Google Drive IT Management Disaster Recovery Holiday Virtual Private Network Telephone Systems Business Management Passwords Alert Microsoft Office Firewall LiFi Outlook Administration Monitors Content Filtering Antivirus Employer-Employee Relationship Save Money Data Backup Automation Analytics Mouse Miscellaneous Government Apple SaaS Network Unified Threat Management Managed IT Services Maintenance Chrome Hosted Solution Server Computing Two-factor Authentication Bandwidth Workplace Tips Scam YouTube Mobile Device Social Media End of Support communications WannaCry Website Google Calendar Safety Servers VPN Google Docs Google Maps Dark Web Data Security Network Congestion Unified Communications Hacks Sports Data loss Google Wallet Legislation Server Management Wi-Fi Business Growth The Internet of Things Microsoft Excel Techology Computers Quick Tips desktop Password Digital Drones VoIP Politics Tablet Statistics Blockchain Mail Merge WiFi Hacker Cybercrime Collaboration Marketing Samsung Unified Threat Management Display VoIP Bluetooth Spyware Comparison Permissions Address Alt Codes File Sharing User Error Avoiding Downtime Solid State Drive Budget Websites Specifications Fraud Humor IT solutions Typing Printer Time Management Hard Disk Drive Current Events Search Black Friday Mobile Security Virtual Reality Emergency Cabling Cryptocurrency Running Cable Going Green Buisness Access Control Communication Network Management How To Virtual Desktop Cyber Monday Hotspot Business Technology Storage Infrastructure Bitcoin Laptop Printing BYOD SharePoint Writing Deep Learning Touchscreen Managed IT Firefox Legal Digital Payment Smart Technology Language Lenovo Dark Data Spam Disaster Windows 8 Downtime Downloads Retail Bring Your Own Device Shortcut Distributed Denial of Service Gadgets Computing Infrastructure Superfish Customer Service Uninterrupted Power Supply IBM Computer Care Office Vendor Management Patch Management Operating System Wireless Managed IT Service Users Alerts Apps Customer Relationship Management Social Halloween Corporate Profile Information Technology Training Multi-Factor Security Social Engineering Heating/Cooling Education Best Practice Automobile Break Fix Networking Dell Scary Stories Staffing Personal Information Administrator Web Server Processors Cortana what was your? GPS Cameras Virtualization Tracking Computer Repair CCTV Mobile Device Management Document Management Tech Support How To Health Notifications Black Market Mobile Computing Identity Theft Electronic Medical Records Travel G Suite Crowdsourcing Twitter Upgrades CrashOverride Supercomputer Botnet Motion Sickness Taxes Remote Computing 3D Printing IT Budget Machine Learning IT Consultant Unsupported Software Relocation Update Meetings Cleaning Work/Life Balance Mobile Data Private Cloud Webcam Recovery Law Enforcement Error Point of Sale Chromebook Ben McDonald shares Gadget Physical Security Paperless Office Licensing Emoji

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3