WannaCry: Lessons Learned One Year After Ransomware Attack

When WannaCry struck, it exploited a known weakness in Windows computers. Microsoft had released a fix a few months before the attack and systems administrators could have protected their networks by simply installing the patch.

But there were enough unpatched computers for both WannaCry – and then last year’s other big ransomware attack involving Petya/NotPetya – to create an opening for attacks to create serious disruption. That’s why you hear security experts preaching the virtue of patching to resolve any newly-discovered security vulnerabilities.

Another reason for their concern: Ransomware is no longer the exclusive preserve of run-of-the-mill cyber criminals. Targeted attack groups – often backed by the resources of nation-states – are taking an interest too.

Read more at Symantec

The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Leave a Reply

Latest from Cybersecurity

Go to Top
Malcare WordPress Security