You Are Viewing

A Blog Post

WARNING: New ransomware outbreak – WannaCry is in the wild

New reports worldwide regarding the attack appears to have affected a number of organizations in multiple countries. The count as of this article has exceeded 100 countries. The ransomware locks down all the files on an infected computer and asks the computer’s administrator to pay in order to regain control of them.

The ransomware, called “WannaCry,” is spread by taking advantage of a Windows vulnerability that Microsoft released a security patch for in March 2017. Computers that has not been updated will be at risk of getting infected. The exploit was leaked last month as part of a trove of NSA spy tools.

It has a new module that acts as a worm which seeks out other PCs on local area networks. So, if someone’s laptop is infected and he or she went to a coffee shop, it would possibly spread to PCs at the coffee shop. From there, to other companies.

What are best practices for protecting against ransomware?

  • New ransomware variants appear on a regular basis. Make sure to accept software updates from IT and reboot your system regularly to protect yourself and your company against them.
  • Email is one of the main infection methods. Be wary of unexpected emails especially if they contain links and/or attachments.
  • Be extremely wary of any Microsoft Office email attachment that advises you to enable macros to view its content. Unless you are absolutely sure that this is a genuine email from a trusted source, do not enable macros and instead immediately delete the email.
  • Backing up important data is the single most effective way of combating ransomware infection. Attackers have leverage over their victims by encrypting valuable files and leaving them inaccessible. If the victim has backup copies, they can restore their files once the infection has been cleaned up. However, organizations should ensure that back-ups are appropriately protected or stored off-line so that attackers can’t delete them.
Share
Ray Marmash
Ray Marmash

Ray has delivered business-driven technology solutions to growing companies for more than 18 years. As the founding President of ARX Networks, Ray has re-directed the company’s focus toward a re-vamped IT Support and Operations Procedures, as well as setup Quality Assurance Processes to meet the changing requirements within the outsourced IT industry.


Life Sciences

Stethoscope2

We have worked with medical device, biotech, and healthcare companies helping them to manage R&D environments, security compliance (including HIPPA), and onsite labs. 

 

×
Technology

Information-Technology-Graphic

ARX has experience providing customized IT infrastructure and outsourcing solutions to technology related organizations. 

 

×
Legal Industry

 

Law firms have specific challenges that we know how to address.

×
Financial Services

finance-assignment-help

Financial companies need to maintain internal and external security protocols. We provide:

×
Professional Services

 

Our experience in supporting professional services includes: 

×
Non-Profits

 

 

You can’t afford unplanned network crashes – a stable computer network, trusted IT support team, and planned IT budget is critical to your organization. 

×
Help Desk Services

help desk

Remote support for business critical problems  

×
Managed IT Projects

 

IPED_project-management

As your organization evolves to stay relevant in the changing business world, you will need to modify and adopt new IT technologies to support it. When your organization needs IT consulting guidance and experienced engineers for IT project management and implementation, ARX can help.

We Provide:

×
Backup & Risk Mitigation

Backup (2)

×
Hosted Cloud Solutions

 

Hosted cloud solutions1 (2)

×
VoIP Implementation

 

voip (2)

 

×
Procurement Management

 

computer-peripherals

×
Network Monitoring

Network picture

ARX Networks Monitoring detects and avoids performance events before they impact your business. We are constantly scanning, troubleshooting, and preventing incursions. Our tools include: firewall, VPN, and intrusion prevention systems.

ARX works to prevent spam, viruses, phishing, and denial of service (DoS) attacks on your network.  

 

×
On-Site Response

Capture

We can be onsite when you or your equipment need us.

While a technician is on their way we will be working remotely to get you back up and running.

×
Support Flexibility

 

time and calendar

We will provide the support that you need anytime and anywhere.

Remote and onsite hours can be tailored to support your company and employees.

Is it electronic? Ask us to manage it.

×
Strategic Approach

exit_22We bring a complete overview to all of your IT services, and work to provide the most efficient and economical strategy for current operations and future growth. 

×
Scalable Solutions

scalable

We work with you to help minimize upfront costs, hassles, and growing pains.

Infrastructure overload, clutter, and nuisances are minimized when we prepare your services for expansion.

The hardware and software that we install will grow with your company.

×