Actually, it’s more like #globalcyberattack. For those of you who are still hiding in their bunkers in case Trump nukes North Korea, the short version is that some crims have used a nasty bug in Windows to spread ransomware across the globe. It still had to get in via an email, and Microsoft patched the bug two months ago, so anyone who’s been infected definitely has to shoulder some of the blame.
I was interviewed by ITV News for their news bulletin tonight and gave the standard-issue advice for preventing ransomware, which I blogged here three months ago. It’s all still true, but now that we know a bit more about the current infection, it’s worth adding these tips:
- If you’re using a currently-supported version of Windows, you need to read this Microsoft bulletin and apply the relevant patches. Do this now.
- If you’re still using Windows XP, Server 2003 or any of the other unsupported older products, upgrade. “If it ain’t broke don’t fix it” is a fine aphorism, but it’s broke. So fix it.
- While you’re at it, you should also make sure that you update Office – there’s a very nasty bug in there too that could not only cause a repeat of today’s events, but that doesn’t require as much user interaction to start the infection. Again, if you’re running a version of Office that’s too old to patch, upgrade it. It’ll be cheaper than paying the ransom.
Or you could come onto our DesktopLive service and get the latest versions of everything, properly managed security and our performance and availability guarantee. Just sayin’…