Producers or consumers? Who will take responsibility for security?

A ransomware epidemic called WannaCry, which has recently caused systems infections in dozens of countries and has also affected public services, hindering in many cases the functioning of society, is based on a vulnerability in the Windows Server Message Block (SMB) protocol, MS17-010. Microsoft released a revised update in March that allowed WannaCry to spread less.

According to experts from F-Secure, most companies fall victim to cyber attacks due to non-updated software that contains previously identified security flaws. The second most common reason is the use by cybercriminals of social engineering such as phishing, that is, sending faked messages to employees and impersonating a person or an institution in order to obtain certain information.

One of the last experiments carried out by F-Secure showed that the link contained in a fake e-mail pretending message from LinkedIn has been clicked by as many as 52% of employees.

Telemetry data from F-Secure Radar, a tool for managing vulnerabilities, indicates that the Windows SMB protocol works in 15 percent. hosts. The WannaCry example shows why administrators should ensure that the system is always updated.

Hardware and software manufacturers can not provide 100% security. Patching gaps by updating software and systems before someone tries to use them remains the best way to combat cyber attacks.

Learn more about our offer

If you sell security solutions, are a distributor, authorized partner or developer and would like to share your portfolio with a group of potential customers, advertise an event, software, hardware or other services on AVLab - simply write to us. Or maybe you had to deal with ransomware? We can also help you decrypt your files.
Read more

We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.