Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

10 Lessons Learned From The Biggest Ransomware Attacks

CRN asks technical leaders at IBM Security, Malwarebytes and Symantec about what organizations need to do differently going forward to avoid becoming the victim of ransomware attacks.

Back 1 ... 6   7   8   9   10   ... 11 Next
photo

Patches And Updates Must Be Deployed Quickly

Updating systems isn't typically as easy as people in the security community make it sound due to the presence of proprietary software that runs in a specific version of Java or Flash, according to Malwarebytes's Kujawa. As a result, Kujawa said businesses might need to spend time testing how their proprietary software works under the new conditions before formally pushing the update through.

Businesses would be wise to examine ways in which they could deploy patches and updates across the entire organization without hindering day-to-day operations, Kujawa said. Bright IT employees should be able to ensure that nothing is killed or destroyed when a new patch is deployed, according to Kujawa.

Ransomware such as WannaCry has targeted exploits where a patch was already available, but organization hadn't yet gotten around to deploying it for their outward-facing systems, Kujawa said. This often happens because organizations assume they're not important enough for anything bad to happen to them, according to Kujawa.

 
 
Back 1 ... 6   7   8   9   10   ... 11 Next

sponsored resources