logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
4th August 2017 by CyberVision 0 Comments 888 Views
4th August 2017 by CyberVision in Business Security

What WannaCry and NotPetya have taught us

 

 

Most of the world’s population has recently witnessed two of the biggest ransomware outbreaks ever in the space of only two months. Although the WannaCry and NotPetya malware attacks were individually unique and probably initiated by different sources, they both had similar characteristics.

Both threats spread like a worm through networks by taking files hostage, encrypting those files and then demanding payment for the release of the data that was stolen. Both threats also took advantage of a flaw in Microsoft Windows. Most importantly, both threats targeted corporate users but presented the risk to most home users, instilling a fear of one’s own device getting infected and then spreading the ransomware when connecting that device at work. It is safe to say that one should expect to see a lot more worms this year and defending yourself against this growing threat has become imperative to avoid any more disruption to businesses.

Never underestimate the power of updates.
Vulnerabilities in your software are inevitable and patches are what your various applications require to fix such vulnerabilities and prevent attacks such as ransomware. It is clear that vulnerabilities in Microsoft XP were exploited with WannaCry and fortunately the malware has subsequently been discontinued through the actions of a good Samaritan programmer who recognised the threat and managed to shut it down. Keeping all your devices updated is crucial to your online security.

Bitcoin changed the game.
Hackers thrive on figuring out ways to extort money directly from consumers and businesses and  Bitcoin assisted these criminals in their ventures. Because Bitcoin is a virtual currency that allows for virtual anonymity, hackers used Bitcoin when asking for payment. No criminal wants payment to be traced back to them, so Bitcoin was the perfect solution.

Layered protection is the way forward.
When a network is infected, it can spread through to all systems and have huge consequences. Compartmentalising your networks is the smart thing to do. This way, one infection does not pose a threat to all systems involved.

You want an anti-virus that detects threats and defends your data against those threats immediately. F-Secure has the ability to do this from the first moment of attack as it provides the quality standard of protection you need when facing criminals with malicious intentions.

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cyber-security
  • f-secure cyber security
  • NotPetya
  • online safety
  • ransomware
  • WannaCry
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo