WannaCry Does Not WannaDie !

Average Rating:
A.K.A WannaCry
WannaCry (the Microsoft Windows system vulnerability) made its debut in 2017, notably effecting major NHS services. It’s now 2019 and these styles of vulnerability remain active (Ransonware). What is the reason? Why are lessons not being learned from main stream industry failures?
Are we still not enforcing patch cycles? Using badly coded websites? Blocking the wrong ports? Incorrectly using Indicators of Compromise? … it could be all these reasons.

If you are still mystified on how to deal with Ransomware, then a good starting point would be to attend the IET's Central London September 2019 event, where a Use Case on how the WannaCry outbreak was stopped using technology innovation and industry best practices.

Free registration : Click here.
 
Posted by Rimesh Patel on Aug 29, 2019 6:09 PM Europe/London

Log in

Want to read the comments or add your own? Please Log in 

The Cyber Lens

  • You must enable blog
    in the Account settings to
    receive email notifications.
  •  

With a background in interacting with Security Systems and Cyber Platforms, I will use this blog to offer views on industries and their use of different & trending technologies ~ The Third Verse.

|

Share: