Ransomware Isn’t the Worst That Can Happen

Jordan Roxas
On March 14, 2017, Microsoft released patch MS17-010 for vulnerabilities. For those who did not install the patch for a whole two months after its release, May 12, 2017 was the day panic ensued. The WannaCry ransomware outbreak had arrived.
If asset owners are patching routinely, they would not be susceptible to attacks. Assuming that the appropriate controls are in place such as regular patch management and vulnerability assessments, then this could have been avoided.
Having the right security measures in place will help you prepare for the next attack, which is predicted to be much worse than WannaCry.
Here’s how you can prevent such attacks:
- Endpoint protection – up to date virus definitions to block attacks on each endpoint
- Vulnerability management – vulnerability scanning to identify vulnerable assets
- Threat monitoring – visibility/alerting of potentially malicious traffic
- Log management – keeping logs pertaining to DNS queries and firewall traffic to malicious sites and correlation with other tools
It does get trickier for older devices such as Windows XP and Windows 2003 as these Operating Systems are no longer supported by Microsoft. Fortunately, Microsoft recently provided patches for XP and 2003, due to WannaCry.
Social Share
Don't miss the latest from Ensono
Keep up with Ensono
Innovation never stops, and we support you at every stage. From infrastructure-as-a-service advances to upcoming webinars, explore our news here.
Blog Post | April 14, 2025 | Technology trends
IBM z17: The Age of AI on The Mainframe Has Arrived. Are You Ready to Meet It?
Blog Post | March 19, 2025 | Industry trends
The Hidden Costs of Legacy Data Centers – Are You Paying More Than You Realize?
Blog Post | March 7, 2025 | Industry trends