TIPS TO PREVENT THE WANNA CRY
RANSOMWARE?
What is Wanna Cry Ransomware?
 WannaCry Ransomware is a virus (malware) that has the ability to
secretly load on your computer systems, it locks files, usually by
encrypting them. it is usually delivered via email attachments or via
spoofed websites that are well crafted to makes a person believe
that the mail and either a link or attached file is from trusted
source.
Need Help For WannaCry Ransomware?
 WanaCRY Ransomware attack is currently impacting organizations and
businesses worldwide. This alert is directed to everyone in your
organization and is sent to you an effort to raise awareness about this
malware. Once affected it will and can cause significant downtime,
affect your organization`s ability to serve customers, and may
potentially result in financial harm.
Protection Against Ransomware
5 Steps for preventing ransomware
1. Back up your Computers and Servers Regularly
 Regularly back up files on both the client computers and
servers. Either back up the files when the computers are offline
or use a system that networked computers and servers can’t
write to.
 If you don't have dedicated backup software, you can copy
important files to a removable media. Be sure to eject and
unplug the removable media when you're done.
2. Deploy and enable all Symantec Endpoint
Protection technologies
 IPS blocks some threats that traditional virus definitions alone cannot
stop.
 SONAR provides real-time protection, using heuristics and reputation
data, to detect emerging and unknown threats.
 Insight quarantines questionable files that haven’t been proven safe
yet by the Symantec customer base.
3. Use an email security product to handle email
safely
 Ransomware threats are often spread through spam emails that
contain malicious attachments. Scanning inbound emails for threats
with a dedicated mail security product or service is critical to keep
ransomware and other malware out of your organization.
4. Lock down mapped network drives
 Secure them with a password and access control restrictions.
 Use read-only access for files on network drives, unless it’s absolutely
necessary to have write access for these files. Restricting user
permissions limits which files the threats can encrypt.
5. Download the latest patches and plug-ins
 Attacking exploit kits can’t exploit vulnerabilities that have been
patched. Historically, attacks were delivered through phishing and
web browsers.
 In the future, it’s likely we’ll see more attacks delivered through
vulnerable web applications, such as JBOSS, WordPress, and Joomla.
Our IT support Engineer will check and fix any
underlying issues that may leave your PC
unprotected against ransomware attacks.
Contact US:
 Address: Al Quoz 3 Dubai, United Arab Emirates
 P O Box : 38149
 Phone #: +971 4 33 82 500
 EMAIL: info@whitehats.ae
 Fax: +971 4 33 88 78 5
 Website Name: whitehatsme.com

TIPS TO PREVENT THE WANNA CRY RANSOMWARE

  • 1.
    TIPS TO PREVENTTHE WANNA CRY RANSOMWARE?
  • 2.
    What is WannaCry Ransomware?  WannaCry Ransomware is a virus (malware) that has the ability to secretly load on your computer systems, it locks files, usually by encrypting them. it is usually delivered via email attachments or via spoofed websites that are well crafted to makes a person believe that the mail and either a link or attached file is from trusted source.
  • 3.
    Need Help ForWannaCry Ransomware?  WanaCRY Ransomware attack is currently impacting organizations and businesses worldwide. This alert is directed to everyone in your organization and is sent to you an effort to raise awareness about this malware. Once affected it will and can cause significant downtime, affect your organization`s ability to serve customers, and may potentially result in financial harm.
  • 4.
    Protection Against Ransomware 5Steps for preventing ransomware
  • 5.
    1. Back upyour Computers and Servers Regularly  Regularly back up files on both the client computers and servers. Either back up the files when the computers are offline or use a system that networked computers and servers can’t write to.  If you don't have dedicated backup software, you can copy important files to a removable media. Be sure to eject and unplug the removable media when you're done.
  • 6.
    2. Deploy andenable all Symantec Endpoint Protection technologies  IPS blocks some threats that traditional virus definitions alone cannot stop.  SONAR provides real-time protection, using heuristics and reputation data, to detect emerging and unknown threats.  Insight quarantines questionable files that haven’t been proven safe yet by the Symantec customer base.
  • 7.
    3. Use anemail security product to handle email safely  Ransomware threats are often spread through spam emails that contain malicious attachments. Scanning inbound emails for threats with a dedicated mail security product or service is critical to keep ransomware and other malware out of your organization.
  • 8.
    4. Lock downmapped network drives  Secure them with a password and access control restrictions.  Use read-only access for files on network drives, unless it’s absolutely necessary to have write access for these files. Restricting user permissions limits which files the threats can encrypt.
  • 9.
    5. Download thelatest patches and plug-ins  Attacking exploit kits can’t exploit vulnerabilities that have been patched. Historically, attacks were delivered through phishing and web browsers.  In the future, it’s likely we’ll see more attacks delivered through vulnerable web applications, such as JBOSS, WordPress, and Joomla.
  • 10.
    Our IT supportEngineer will check and fix any underlying issues that may leave your PC unprotected against ransomware attacks. Contact US:  Address: Al Quoz 3 Dubai, United Arab Emirates  P O Box : 38149  Phone #: +971 4 33 82 500  EMAIL: info@whitehats.ae  Fax: +971 4 33 88 78 5  Website Name: whitehatsme.com