Understanding “WannaCry” and Preventing the Next Attack
Since Friday, May 12, a ransomware attack known as WannaCry has been causing massive disruptions to organizations across the globe. It’s leveraging a well-known vulnerability in Windows and Windows Server operating systems, which was disclosed two months ago. A patch was available as well for supported products at that time, which excluded End-of-life versions such as Windows XP.
Catching the attackers is proving difficult as they change the malware to continue to avoid detention.
Systems that are properly patched are immune to this attack.
The WannaCry attacks and its consequences highlight how neglecting security patches can have a catastrophic impact on businesses.
We believe that one of the main reasons for the success of this attack is the gap in processes to remediate known software vulnerabilities.
Flexera’s Software Vulnerability Management products are built to address the specific gaps between IT Security and IT Operations (SecOps), and patch management processes, which leave organizations vulnerable to attacks like this one.
Upcoming Webinar: Prevention is Futile: A story that will make you WannaCry
30th May 2017
Podcast: Getting Ready for the Next WannaCry Attack
Join Flexera Software’s CISO and VP of Information Security, Conal Gallagher, and Tom Canning, VP, Enterprise Solutions and Strategy as they discuss what we can learn from the WannaCry ransomware attack and some security best practices all organizations should adopt to be better prepared the next time.