Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, BNMC can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from BNMC, call us at 978-482-2020.


Comments 1

Wallace Wallace on Tuesday, 30 May 2017 00:54

Unquestionably I were given a couple of new matters from appropriate here I appreciated over read your weblog distribute. Your blog have charming records, I got correct musings from this splendid weblog. i am ceaselessly looking like this sort weblog post. i am trusting i'm ready to see yet again your set up. Feel free to surf @ college paper writing service

Unquestionably I were given a couple of new matters from appropriate here I appreciated over read your weblog distribute. Your blog have charming records, I got correct musings from this splendid weblog. i am ceaselessly looking like this sort weblog post. i am trusting i'm ready to see yet again your set up. Feel free to surf @ [url=]college paper writing service[/url]
Already Registered? Login Here
Saturday, 18 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Privacy Malware Hackers Business Computing Hosted Solutions Microsoft Ransomware Internet Software IT Services Windows Google Network Security Computer Backup Business Smartphone Windows 10 Data Management App Hardware Data Small Business Business Continuity Innovation Android Saving Money Managed IT Services Productivity User Tips Phishing Tip of the week Remote Monitoring Browser Mobile Devices Cloud Computing IT Support Internet of Things Google Drive Efficiency IT Support Upgrade Risk Management Artificial Intelligence Outsourced IT Data Recovery Data storage Settings Office 365 Office Tips Gmail Word Big Data Smartphones Productivity Cybersecurity Facebook Robot End of Support Analytics Antivirus Unified Threat Management Managed IT Services Maintenance Network Microsoft Office Encryption Money Chrome Outlook Hosted Solution Monitors Server Windows 10 Mobile Device Save Money Workplace Tips YouTube Mouse Miscellaneous communications Social Media Vulnerability Telephone Systems Apple SaaS Alert Disaster Recovery IT Management Passwords Virtual Private Network LiFi Computing Employer-Employee Relationship Managed Service Provider Administration Content Filtering Best Practice Address Cabling Government User Error Avoiding Downtime IT solutions Safety How To Data Backup Infrastructure Google Docs Network Congestion BYOD Running Cable Hacks Printer Time Management Digital Payment Buisness Google Wallet Firefox Search Business Growth Emergency Disaster Virtual Desktop Computers Laptop Password Access Control Network Management Deep Learning Drones Hacker Business Technology Uninterrupted Power Supply Display SharePoint IBM Touchscreen Computer Care Spam Managed IT Wireless Bring Your Own Device Downtime Alt Codes Lenovo Gadgets Downloads Corporate Profile Training Shortcut Automobile Budget Typing Superfish Dell Bandwidth Humor Apps Automation Halloween Current Events Users Two-factor Authentication WannaCry Patch Management Google Maps Cryptocurrency Scam Customer Relationship Management Virtual Reality Education Communication Scary Stories Going Green Multi-Factor Security Data loss Heating/Cooling Website Bitcoin Networking desktop Storage Unified Communications Writing Politics Sports Printing Google Calendar Digital Servers VPN Firewall Collaboration Legal Samsung The Internet of Things Windows 8 Data Security Dark Data Retail Legislation Spyware Server Management File Sharing VoIP Customer Service Cybercrime Techology Solid State Drive Quick Tips WiFi Office Websites Marketing Tablet Statistics Mail Merge Vendor Management Operating System Social Unified Threat Management Hard Disk Drive VoIP Social Engineering Information Technology Bluetooth Physical Security Motion Sickness Emoji Taxes IT Budget Machine Learning Specifications Personal Information Cortana IT Consultant Relocation Black Friday Wi-Fi Meetings Work/Life Balance Virtualization Cleaning Private Cloud Cyber Monday Computer Repair Webcam Law Enforcement Mobile Device Management How To Error Ben McDonald shares Health Point of Sale Gadget Mobile Computing Black Market Electronic Medical Records Paperless Office Twitter Staffing Upgrades Administrator what was your? Web Server Processors Holiday Remote Computing GPS 3D Printing Business Management Cameras Tracking Unsupported Software Update CCTV Document Management Tech Support Mobile Data Notifications Recovery Identity Theft Travel Crowdsourcing Chromebook G Suite Supercomputer Botnet Comparison CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3