The ransomware does not go out of style - A new attack by WannaCry

The ransomware does not go out of style - A new attack by WannaCry

 

The ransomware continues to increase and is again present with the latest attack of WannaCry to the US multinational Boening, the same that caused shock in companies such as FedEx, Telefónica, Renault, and although it is increasingly frequent, even among those who are disconnected of the computer world, there are still many companies that are vulnerable to an attack in the absence of a digital culture and to update the operating systems of their computers, in addition to using tools that allow the backup of information.

But how does it happen? After turning on your computer, you connect to WiFi to check your mail and in your inbox you receive an email that calls your attention. Download the attached document and without noticing, your system has been infected, the ransomware blocked access to the files on your computer.

Ransomware is a form of malicious lethal software that hijacks the information of the computers where it is installed and reproduced as a worm, which allows that when a computer that is part of a network becomes infected, all those computers that are connected are also infected, as long as they have the same vulnerability.

Now: how to avoid being a victim of a cyber attack ?. The defense mechanisms such as the antivirus and firewall are insufficient, since they focus on validating the virus headers and their behaviors. However, taking preventive measures will help your company; Some recommendations are:

  • 1. If you are one of those who still have the Windows XP version, it is time to update the operating    system. These types of operating systems are no longer supported by Microsoft and, given their age, do not have a security patch or updates against the latest ransomware attack.

  • 2. Get used to having support for your information. Make a backup, keep the information safeguarded and just enough to configure it to be done automatically and with the periodicity that is considered according to the volume of information handled by the company.

  • 3. Pay attention to the sender of the emails that arrive to you. A cybercriminal can leave a Word, a PDF or an infected image on your computer and the chances of it coming through your mail is most likely. So if you did not expect that company to write to you or do not trust the sender, do not open any file or link.

  • 4. Having a good ally in information security is key to mitigate the security incidents that affect your computer assets.