26 May WannaCry or GoingtoRelax?
On Dealing With Ransomware
A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were utilized to take down literally hundreds of thousands of computers, from hospitals, government, and large corporations.
For days people were freaking out and having a tremendous time securing their networks. Traditional methodologies failed. Traditional thought processes failed.
In the days and weeks since this attack, we have learned much. From the tools they use, to methodology and the exploits.
We Suffered No Incidents
At Triton Technologies, we were not affected at all. Not a single one of our clients’ computers, not a single compromise network, not even a rogue email. Not that we didn’t see a single remnant of it, but our technology, up dates and our near-religious security methodologies protected every single one of our clients.
That’s right, not a single person had a problem: business as usual. Just like with CryptoLocker.
Why We Weren’t Affected
The reason why? The exploits that were utilized by the WannaCry hackers dealt with old and unpatched systems. Every single one of our managed clients and their systems is patched daily and weekly. Every exploit mitigated, and every possible vector to enter into a network patched up.
We understand that has affected many businesses and many small business owners are freaking out. Not us. With the right managed plan and the right technology to head off potential disasters, issues like this will never affect the business. The proof is in the pudding, and not a single one of our clients is worried.