Blog Layout

Malicious Malware like WannaCry Fact or Fiction?

Malicious Malware like WannaCry Fact or Fiction?


Nils Desmet • May 15, 2017
Nils Desmet • May 15, 2017

Hackers Never Sleep

Earlier this year, an international ransomware attack incapacitated England’s National Healthcare System (NHS) while also disrupting operations at several private and public agencies in countries across the globe. Christened WannaCry, the ransomware attack ultimately infected over 400,000 machines by exploiting a well-known vulnerability in the Windows 7 operating system. While only .07% of WannaCry victims paid the requested ransomware, the total losses resulting from the attack have been calculated in the billions.


Ransomware attacks garner most of the attention when it comes to hackers and cyber crime, and with good reason. In a nutshell, ransomware is part of the larger malware type of attack that disables a computer’s functionality by encrypting files. Once it sneaks in via an email attachment or camouflaged link, ransomware begins automatically locking down all the files on a computer or network drive. Once the files are encrypted, a ransom message will appear, demanding payment in exchange for a decryption key.


Because their only goal is to collect a ransom, the perpetrators of these types of attacks make compliance easy and will often help victims navigate through the process with detailed instructions about Bitcoin payments and even help lines manned by informed and courteous support staff.


Viruses, spyware, and automated bots also fall under the category of Malware, which includes any malicious software designed to harm or compromise computers, mobile devices or cloud services. But there are things you can do to help safeguard your system against attacks.

Always Have a Backup

When malware strikes, the loss of files and critical data can paralyze an organization. As the business community continues to switch from paper to digital records, every gigabyte becomes a precious commodity. While hackers represent the flashiest threat to your database, in truth there are many other reasons you should store critical information in multiple formats – natural disasters, accidents, and even user error can wipe your entire trove in an instant.



Of course, the easiest way to back up your data is by replicating your information on to a separate service with scheduled updates. Unfortunately, if your secondary data system remains connected to your network, it can also be vulnerable to malware attacks, as well as any incident, like fire or a power surge, that could damage your primary database. As a result, for many businesses, a cloud-based data storage system offers a cost-effective and secure alternative. By storing your information in the cloud, either independently or with the help of a managed service provider, you gain extra security and the peace of mind that comes with knowing you can access your data whenever you need it.

Stengthen Your Security Perimeter

As a small business owner, deploying powerful security protocols will keep your system safe, but even the toughest battlement can be compromised if the gatekeepers aren’t paying attention. Your employees access your network every day, and their inattention or ignorance could lead to catastrophe.


Because users represent the weakest part of any security system, training staff on secure passwords and phishing schemes must be a priority. Malware only succeeds once it gets inside your network, and while a layered security approach including firewall and antivirus protection is a must, your staff must remain vigilant as well. Educating personnel on secure passwords and the dangers of social engineering can go a long way towards safeguarding your system. When it comes right down to it, the weakest point in your network is not your hardware or even your software; it’s the person sitting in front of the keyboard.


If staff access the network through mobile devices, you must also take device management into account, including user onboarding and termination as well as identifying the appropriate level of remote access assigned to an employee based on their responsibilities and “need-to-know” status. Mobile devices expand the security perimeter beyond a physical location. Because sensitive material is now portable, mobile device management demands precise tracking and permissions management.

Your Partner in Protection

These days, to defend yourself from cybercriminals you must go far beyond the standard by deploying layers upon layers of security. A firewall alone is not enough. Antivirus software will only get you so far. Email filters work, but only if employees follow the safety guidelines. Anti-spam tools can work wonders, but they must be used in concert with cloud storage and network oversight.


Data security remains a moving target: as online attacks are repelled, hackers adapt. That’s why complacency is often an organization’s weakest link. Waiting for a breach is not an option; companies must pay attention and prepare for anything. Digital records and mobile devices have introduced convenience and improved productivity, but that success comes with a price. As always the best defense is a good offense. With the advanced protection we provide against ransomware, zero-day threats, and evolving malware, Makios offers small business owners and operators the most comprehensive security platform by leveraging the power of multi-core processing for maximum protection and blazing fast throughput.

You may also like

An envelope with a piece of paper and a red shield with a padlock on it.
By Nils Desmet 28 Mar, 2024
Learn the importance of DMARC in enhancing email security and how to implement it to protect against spam and phishing. It’s essential for businesses and email senders.
A screenshot of a web page with a list of next steps.
By Sarahi Miranda 13 Mar, 2024
Unlock the potential of Microsoft Loop with Makios Technology for seamless team collaboration and organization. Elevate your workflow effortlessly.
A dell desktop computer is sitting on a white surface.
By Ivan Flores 04 Mar, 2024
Discover the Dell Precision 3460 SFF, a powerful workstation designed for businesses. In our review, learn about its performance, design, and customization options.
a woman is holding a magnifying glass with the word scam on it.
By Nils Desmet 28 Feb, 2024
Protect yourself from scams and fraud with the help of Makios Technology. Learn how to identify potential scams and take legal action against them.
a telephone is sitting in front of a computer monitor
By Nils Desmet 13 Feb, 2024
Discover the key to success with our guide on creating and implementing a technology strategy that aligns with your business goals. Essential tips and steps are included.
a person is holding a cell phone in their hands in front of a laptop.
By Sarahi Miranda 06 Feb, 2024
Learn about the latest privacy and security features in iOS 17.3 for your iPhone. Keep your personal information safe and secure with these tips.
a man is sitting on the floor talking to a robot on a cell phone .
By Sarahi Miranda 26 Jan, 2024
Discover the top AI tools that businesses can leverage for efficiency, creativity, and gaining a competitive edge. Learn how to integrate these tools in 2024.
a person is holding a telephone next to a headset .
By Nils Desmet 16 Jan, 2024
See the advantages of Makios Cloud Phones with our comprehensive guide. Explore our models, their features, and the benefits they offer for optimal communication.
a man is standing in front of a computer monitor with an envelope with a red warning sign on it .
By Nils Desmet 10 Jan, 2024
Learn about spoofing, a common cybersecurity threat, and how to protect yourself and your organization from it. Contactus for more information.
a computer screen updating
By Nils Desmet 27 Dec, 2023
Explore the importance of software updates for system security through this comprehensive guide highlighting seven crucial reasons.
More Posts
Share by: