To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.
Outdated software offers familiarity for IT teams, but that's cold comfort when it comes to the hot seat of legal challenges and ransomware infections.
With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge.
IBM X-Force Malware Analysis enables security teams to examine potentially problematic files, prioritize events and respond to threats quickly.
IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.
An effective response to an advanced threat such as WannaCry can be broken down into two phases: vulnerability management and proactive monitoring.
Blocking refers to the practice of deploying network security devices to block threats as they traverse the network.
While Microsoft could have slowed the spread of WannaCry, the real problem lies in the widespread practice of deploying outdated software and systems.
Effective defense against large-scale ransomware attacks such as WannaCry starts with basic endpoint protection and patch management.