Published: Thu, May 18, 2017
Hi-Tech | By Grace Becker

How to secure yourself against a WannaCry ransomeware attack

How to secure yourself against a WannaCry ransomeware attack

Britain's NHS is the world's fifth-largest employer after the USA and Chinese militaries, Wal-Mart Stores and McDonald's.

"Practically speaking, it's not possible to completely isolate the NHS network", said cyber-security expert Prof Alan Woodward.

At present, patients are being advised to still turn up to their scheduled appointments, and while the NHS systems can not confirm details of them, they are doing their best to instil as little inconvenience as possible.

The recent NHS computer hack put ransomware in the spotlight, but this isn't a new or unusual kind of malware. "How the hell did this get on there, and could this be repeatedly used again?" said Barlow.

"Our banks may be affected in a couple of hours".

The attack has effected governments, hospitals and corporations, especially those running outdated computer systems.

How can I personally protect my device from ransomware?

It's hard to blame Microsoft, Litan said, since it issued fixes and generally did what it should.

As long as your operating system is up-to-date, you should be protected from this strain of ransomware.

US should take some blame for cyber attack: Chinese state media
Then there's the US government, whose Windows hacking tools were leaked to the internet and got into the hands of cybercriminals. ET had on Tuesday reported that many Indian companies after being attacked by WannaCry , had even paid the hackers.

"The operating systems on our computers and software downloads are managed centrally so that regular users can not download executable files from the internet without administrative rights", he said in an email. Experts expect additional attacks to occur due to residual system infections, copy-cat viruses or the release of additional malware arising from the NSA leaks. If you don't have a backup, there's no way to recover the files without paying the ransom.

Back up your computer and store the safety version in the cloud or on a drive that is not connected to your computer.

"The bottom line is that all you can really do is keep your software, including your virus checker, up to date". FireEye said it was aware customers had used its reports to successfully identify some associated with the attack. The initial attack had started after many offices had closed Friday.

Scottish targets included 11 health boards, NHS National Services and the Scottish Ambulance Service.

It may be that the attackers created their virus without knowing exactly how far it would spread. Organizations that had applied the March critical Microsoft Windows patches were not vulnerable to WannaCry.

"One of the most common methods of infecting computer systems is through links and attachments in emails".

"Practice ABC - assume nothing, believe no-one, check everything", says Prof Woodward. A cyber coordination centre to take precautions against such attacks would start operations by June.

Will the people behind the ransomware be caught?

"The National Cyber Security Centre and the NCA are working with Europol and other worldwide partners to make sure that we all collect the right evidence, which we need to do, to make sure we have the right material to find out who has done this and go after them, which we will", she said.

Like this: