WannaCry Ransomware

As you may be already aware, a widespread ransomware attack is affecting various organizations with reports of a large number of infections in many countries, including the United States. Currently, the latest version of this ransomware software is recognized as WannaCry, WCry, or Wanna Decryptor.

According to some sources, one possible infection method is via phishing emails.  Please see the resource link below on protecting your company from phishing attacks.
 
One recommended step for prevention is to apply Microsoft patch for the MS17-010 SMB vulnerability dated March 14, 2017.

Per the United States Computer Emergency Readiness Team “US-CERT” alert (TA17-132A – linked provided below) revised today, May 15, 2017, initial reports indicate the hacker or hacking group behind the WannaCry campaign is gaining access to enterprise servers either through Remote Desktop Protocol (RDP) compromise or through the exploitation of a critical Windows SMB vulnerability. Microsoft released a security update for the MS17-010 vulnerability on March 14, 2017. Additionally, Microsoft released patches for Windows XP, Windows 8, and Windows Server 2003 operating systems on May 13, 2017. 

Resources for all licensees, especially for small businesses

Other resources for all licensees: