{"id":4102,"date":"2017-06-21T12:24:57","date_gmt":"2017-06-21T12:24:57","guid":{"rendered":"https:\/\/itsc-tx.com\/?p=4102"},"modified":"2022-11-01T06:58:10","modified_gmt":"2022-11-01T06:58:10","slug":"how-to-stop-ransomware-attacks-in-2017","status":"publish","type":"post","link":"https:\/\/www.itsc-tx.com\/es\/how-to-stop-ransomware-attacks-in-2017\/","title":{"rendered":"How to stop ransomware attacks in 2017"},"content":{"rendered":"<h2>How to stop ransomware attacks in 2017<\/h2>\n<p>In May 2017, an ominous message greeted workers in the UK\u2019s National Health Service (NHS): \u201cOops, your files have been encrypted!\u201d<\/p>\n<p>This is how malware known variously as WannaCry, WannaCrypt or WannaCryptor 2.0 announced itself to the wider world. With systems locked and critical files encrypted, doctor&#8217;s offices had to close and hospitals turned patients away from essential treatments.<\/p>\n<p>How did this happen? Security experts believe an NHS user clicked a link or opened a file they shouldn&#8217;t have. Others pointed the finger at the NHS&#8217;s network of antiquated hardware and unsupported software as the main factor that facilitated the spread of WannaCry.<\/p>\n<h3>The worm spreads<\/h3>\n<p>Distributing ransomware isn\u2019t hard. This type of malicious software is easy and cheap to spread. In the case of WannaCry, and its related variants, it can infect connected systems without any user interaction, much like a worm that continually replicates itself.<\/p>\n<p>The victim then has a powerful incentive to pay up and, if they don&#8217;t, the criminals&#8217; investment has been minimal.<\/p>\n<h3>Why is healthcare vulnerable to ransomware?<\/h3>\n<p>Hospitals and other organizations in the healthcare sector are attractive targets, specifically because of the:<\/p>\n<p>Aging hardware, software and security systems that they often run.<br \/>\nMisconfigured systems, specifically security software that is easy to bypass.<br \/>\nValuable data they hold, including sensitive patient health records and personal information.<\/p>\n<h3>Should you pay hackers a ransom?<\/h3>\n<p>Cybersecurity experts advise against paying a ransom to hackers.<\/p>\n<p>In the first instance, there is no guarantee you will gain access to your encrypted files. A US study found that <a href=\"https:\/\/www.nationthailand.com\/Startup_and_IT\/30315380\">70 percent of affected organizations paid a ransom<\/a>, but doing so only encourages the criminals to continue their activities, and they could even re-target your organization.<\/p>\n<h3>How to stop ransomware infecting your organization<\/h3>\n<p>Like any infection, prevention is better than cure, especially when it comes to the security of your network. Even if you are dealing with a tight budget, skeleton IT staff and minimal cybersecurity expertise, you don\u2019t necessarily have to spend big to ensure your network remains free of malware like WannaCry.<\/p>\n<p>Your users should be the first line of defense. If employees don\u2019t know what to look for, how can you hope to remain malware free? As a matter of priority, you need to:<\/p>\n<p>Train your staff so they know how to identify phishing attacks that could contain malicious ransomware.<br \/>\nEnsure your organization is running updated software with the latest security patches.<br \/>\nRegularly back up your systems to physical sources and the cloud.<br \/>\nHave a clear email security protocol that discourages users from clicking on suspicious links, attachments or emails.<br \/>\nIf a computer is infected, isolate it from the network and alert all staff.<br \/>\nInvest in hardware that\u2019s up to the task of warding off threats.<br \/>\nRansomware is constantly evolving, so it\u2019s a case of mitigating the threat to ensure your networks, data and reputation aren\u2019t compromised.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to stop ransomware attacks in 2017 In May 2017, an ominous message greeted workers in the UK\u2019s National Health Service (NHS): \u201cOops, your files have been encrypted!\u201d This is how malware known variously as WannaCry, WannaCrypt or WannaCryptor 2.0 announced itself to the wider world. With systems locked and critical files encrypted, doctor&#8217;s offices [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":17038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15,31,38,33,34],"tags":[],"class_list":["post-4102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-healthcare-it","category-it-security","category-small-medium-business-it-solutions","category-technical-consulting"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"es","enabled_languages":["en","es"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"es":{"title":false,"content":false,"excerpt":false}}},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to stop ransomware attacks in 2017 - iTSC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to stop ransomware attacks in 2017 - iTSC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"iTSC\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-21T12:24:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-01T06:58:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/06\/How-to-Stop-Ransomware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michelle Richard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle Richard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/\"},\"author\":{\"name\":\"Michelle Richard\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\"},\"headline\":\"How to stop ransomware attacks in 2017\",\"datePublished\":\"2017-06-21T12:24:57+00:00\",\"dateModified\":\"2022-11-01T06:58:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/\"},\"wordCount\":496,\"image\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/How-to-Stop-Ransomware.png\",\"articleSection\":[\"All\",\"Healthcare IT\",\"IT Security\",\"Small-Medium Business IT Solutions\",\"Technical Consulting\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/\",\"name\":\"How to stop ransomware attacks in 2017 - iTSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/How-to-Stop-Ransomware.png\",\"datePublished\":\"2017-06-21T12:24:57+00:00\",\"dateModified\":\"2022-11-01T06:58:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/How-to-Stop-Ransomware.png\",\"contentUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2017\\\/06\\\/How-to-Stop-Ransomware.png\",\"width\":730,\"height\":365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/how-to-stop-ransomware-attacks-in-2017\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itsc-tx.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to stop ransomware attacks in 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#website\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/\",\"name\":\"iTSC\",\"description\":\"IT Support #PeaceofMind\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itsc-tx.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\",\"name\":\"Michelle Richard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"caption\":\"Michelle Richard\"},\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/author\\\/mrichard\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to stop ransomware attacks in 2017 - iTSC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/","og_locale":"es_ES","og_type":"article","og_title":"How to stop ransomware attacks in 2017 - iTSC","og_url":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/","og_site_name":"iTSC","article_published_time":"2017-06-21T12:24:57+00:00","article_modified_time":"2022-11-01T06:58:10+00:00","og_image":[{"width":730,"height":365,"url":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/06\/How-to-Stop-Ransomware.png","type":"image\/png"}],"author":"Michelle Richard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michelle Richard","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/#article","isPartOf":{"@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/"},"author":{"name":"Michelle Richard","@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc"},"headline":"How to stop ransomware attacks in 2017","datePublished":"2017-06-21T12:24:57+00:00","dateModified":"2022-11-01T06:58:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/"},"wordCount":496,"image":{"@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/06\/How-to-Stop-Ransomware.png","articleSection":["All","Healthcare IT","IT Security","Small-Medium Business IT Solutions","Technical Consulting"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/","url":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/","name":"How to stop ransomware attacks in 2017 - iTSC","isPartOf":{"@id":"https:\/\/www.itsc-tx.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/06\/How-to-Stop-Ransomware.png","datePublished":"2017-06-21T12:24:57+00:00","dateModified":"2022-11-01T06:58:10+00:00","author":{"@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc"},"breadcrumb":{"@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/#primaryimage","url":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/06\/How-to-Stop-Ransomware.png","contentUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2017\/06\/How-to-Stop-Ransomware.png","width":730,"height":365},{"@type":"BreadcrumbList","@id":"https:\/\/www.itsc-tx.com\/how-to-stop-ransomware-attacks-in-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itsc-tx.com\/"},{"@type":"ListItem","position":2,"name":"How to stop ransomware attacks in 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.itsc-tx.com\/#website","url":"https:\/\/www.itsc-tx.com\/","name":"iTSC","description":"IT Support #PeaceofMind","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itsc-tx.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Person","@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc","name":"Michelle Richard","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","caption":"Michelle Richard"},"url":"https:\/\/www.itsc-tx.com\/es\/author\/mrichard\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/comments?post=4102"}],"version-history":[{"count":2,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4102\/revisions"}],"predecessor-version":[{"id":17037,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4102\/revisions\/17037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/media\/17038"}],"wp:attachment":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/media?parent=4102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/categories?post=4102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/tags?post=4102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}