Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 28 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Petya ransomware attack: How UK businesses can stay protected online

by The Gurus
June 30, 2017
in Editor's News
Share on FacebookShare on Twitter
  • The recent Petya attack hit companies across Europe and the US
  • Ebuyer offers businesses across the UK tips on how to protect themselves from online ransomware

Yesterday (27th June, 2017), businesses and organisations across Europe and the US were hit by a large-scale cyber attack, known as Petya, leaving them unable to access systems and data.
 
Petya is a form of ransomware, meaning it is a computer virus which encrypts files and keeps them encrypted until the hacker receives payment. Petya takes advantage of vulnerabilities in old Microsoft Windows systems, leaving anyone without the latest version in jeopardy.
 
So far, Petya has infected high-profile victims including advertising giant WPP, French construction materials company Saint-Gobain and Russian steel and oil firms Evraz and Rosneft. The attack was first reported in Ukraine, where the government, banks, state power utility and Kiev’s airport and metro system were all affected.
 
With this in mind Ebuyer.com, shares five ways businesses can protect themselves against online ransomware:
 
IT managers and directors should be taking regular steps to ensure their network is secure and all security software is up to date.
 
Gateway security (a machine through which data packets flow) should be employed and next-generation firewalls installed to allow for deep-packet inspection – a form of computer network packet filtering that examines data as it passes an inspection point. This will help identify hidden threats passing into your network.
Implement internal monitoring and endpoint protection; a method of protecting corporate networks when accessed via remote devices such as laptops or other wireless and mobile devices. This will prevent malicious files from gaining access to the network by human error.
It is essential that a reliable and thoroughly tested backup solution be put in place. This should be segregated from the rest of the network to prevent malware from spreading to it once infected.
Ensure systems are up to date and supported for exploit patches.
New data protection laws are coming into play in May 2018 which will replace the current Data Protection Act (DPA) with the General Data Protection Regulation (GDPR).
Businesses need to ensure that their systems are fully protected in order to minimise the risk of breaches. Protecting malware from gaining access is also essential for any company which relies on its network or software to run its service.
 
Paul Lyon, IT Director at Ebuyer, said: “The cyber attacks on such large companies and the resulting fallout have once again brought into focus the importance of security both at home and in the office. Ransomware has been around for some time but this is by far the most high-profile attack.
 
“Cybercrime is a growing industry and criminals are becoming significantly more sophisticated and their attacks more destructive. New threats are constantly being developed. Businesses of all sizes, as well as the ordinary home user, are vulnerable to attacks and should always be on their guard.”
 
To find out more about ransomware and how you can protect yourself, please visit: http://www.ebuyer.com/blog/2017/05/ransomware-and-how-you-can-protect-yourself/

FacebookTweetLinkedIn
Tags: CyberpetyaRansomwaresecurityTechnology
ShareTweet
Previous Post

The costs of VPNs: It’s not the printer…it’s the ink

Next Post

Over 90% of cyber security experts believe the UK’s political landscape has been manipulated by fake news

Recent News

software security

Research reveals 80% of applications developed in EMEA contain security flaws

September 27, 2023
Cyber insurance

Half of organisations with cyber insurance implemented additional security measures to qualify for the policy or reduce its cost

September 27, 2023
Fraud and online banking

Akamai Research Finds the Number of Cyberattacks on European Financial Services More Than Doubled in 2023

September 27, 2023
ICS Reconnaissance Attacks – Introduction to Exploiting Modbus

ICS Reconnaissance Attacks – Introduction to Exploiting Modbus

September 27, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information