LEARN MORE

 

Our Team

 

Careers

 

Reviews

 

About

 

Contact Us

 

Blog

 

Community

 

FAQ

CONTACT

 

Phone: 909-949-9159

 

Fax: 909-949-9160

 

Address: 1945 West 9th Street, Upland, California 91786

 

 

Copyright © 2017 | Designed by RCS

The WannaCry Threat

On May 12, 2017 a massive Ransomware attack was launched and spread across 150 countries on nearly 57,000 computers. This malicious malware continued to grow and infect computers to over 200,000 devices by Monday morning, turning into by far the largest malware attack so far this year in 2017.

 

Viruses go by many names and WannaCry is no exception in that it can be referred to in different ways. Malware, WannaCrypt, and Ransomware are a few other names used to refer to the devastating WannaCry. You may be asking at this point, “What exactly is WannaCry though?” This specific malware is compared to being an extremely dangerous Trojan virus that is more commonly known as ransomware. Now as the name suggests, ransomware is a virus that takes your information on your device hostage and refuses to return it until a ransom is paid. The way that it is able to forcibly take your information away from you on your own computer is by actually encrypting it so that you cannot access it. A timer then begins to count down… The malware will give a set price for decrypting your information and should it remain to be unpaid, drastically increase in price. With further neglect and lack of payment, the virus will then delete the information from your computer.

 

With such an aggressive and dangerous virus on the loose and still going on even now is there any cure if your computer gets infected? Unfortunately there isn’t at this time. There are always ways to help yourself prevent these attacks form happening though such as watching out for phishing emails and being wary of suspicious links that lead to websites you are unfamiliar with and/or don’t trust. How can you tell if an email or link inside an email is suspicious or not? There are a few key red flags you can learn to spot and look for when trying to identify a phishing email.  Checking for major spelling and grammatical errors is a good way to see if the email is legitimate or not as companies and Brands take email messaging very seriously and take great care to avoid large spelling and grammatical errors. Another sign of a potential phishing email are threatening messages in the subject line stating how your count has been suspended or has had a failed login attempt. This sort of fear tactic is extremely common with dangerous emails and is unfortunately very effective. Being aware of these tactics and schemes devised by hackers will help to protect yourself and your information from their malicious attacks. Remember to never give personal information if prompted in an email and to learn more about other potential signs of dangerous phishing emails, check this helpful blog here.

 

Aside from scanning for malicious emails there is also the option of looking into SOPHOS who actually does in fact have preventative software that can block malicious malware from even entering your systems. By utilizing SOPHOS Intercept X and Endpoint Exploit Prevention you can protect yourself from this horrible outbreak! Should you have any other questions or concerns either about the malware or about preventative measures then call RCS now and speak with one of our certified technicians that can help you navigate through these dangerous times! For even more information on WannaCry specifically and even more preventative measures SOPHOS has posted information concerning this ransomware for people to view and learn from as well. With tips on what to do and their own overview of the situation the SOPHOS blog post is a valuable source of information for individuals to read through.

 

By Resource Computer Solutions

Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post

The WannaCry Threat

Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post
Resource Computer Solutions brand signature
Resource Computer Solutions WannaCry blog post