Ransomware Patching: How to avoid becoming hostage of the next WannaCry

Businesses all over the world – whether they are big fortune 500 companies or small businesses run out of a home – are susceptible to ransomware attacks more so now than ever before. Some companies can recover from these attacks while others are not as fortunate. Don’t let your clients become hostages. Reduce the risk for ransomware by sound patching processes.

While you read this blog post the next WannaCry attack is being planned. The bad news – ransomware attacks aren’t going away anytime soon. They will only intensify in terms of sophistication and scale as time goes on. That being said, there are steps you can take to make sure you are prepared to defend your clients’ networks against cyber-attacks.

Most of the time, these attacks happen to businesses that fail to regularly patch their computers and servers. Seems simple right… Well, it is. By always making sure there are no devices that need an update, you are assuring yourself of having the lowest possible risk of being attacked.

How solid patching prevents ransomware

In a prior blog post – Patch Management Best Practices – we outlined some things you can do to help with your patch management process, and these practices can be beneficial when it comes to avoiding ransomware attacks:

  • Educate Your Team: If everyone within your organization knows the benefits of patch management, you will have more people on the front line helping with security against attacks.
  • Automate Your Process: By automating, you’re not going to miss out on any updating any devices which is critical.
  • Communicate To Your Team: Let your team know when there will be downtime and why – it may impact them slightly at first, but they will understand what you are doing and why you need to do it when communicated properly.
  • Continue To Leverage Your Patch Strategy: Don’t stop with the obvious patches; dig deeper and find areas where you can best leverage your patch management tool.

How vulnerable are you to an attack?

Through the Panorama9 Dashboard, you can actually check how vulnerable your applications and operating systems are. To check, navigate to “Vulnerabilities” -> “Software” to see what needs to be updated.

Some devices may need to be rebooted before a patch is fully implemented, so make sure you educate and notify your employees to reboot to ensure a successful patch implementation.

P9 - check vulnerability before the next ransomware attack

To get more specific – such as looking at specific KB numbers – you can filter your options to search for things like ‘Microsoft Vulnerabilities’.

React to the threats found in the report

Your security is only as strong as your weakest link, and you can be certain that these ransomware programs will find their way in if you are not on top of your patching game. By taking the necessary steps and precautions, and being on top of software vulnerabilities, you can be in a much more advantageous position to defend ransomware attacks in the future.

The good news is that Panorama9 is here to help. By enabling the P9 patch feature, you can automatically patch all computers and servers. You can rest easy and feel confident knowing you have a team of people with your best interests in mind.

Fresh Tips Directly in Your Inbox

Submit your email address below and get our updates on the most important things MSPs should know.

Leave a Reply

Your email address will not be published. Required fields are marked *