Cyber Extortion: Is Your Business Software At Risk?


2017 looks set to be the year of global ransomware attacks – a type of malware that blocks access to a computer and demands money to release it. In recent months, cyberattacks named ‘WannaCry’ and ‘Petya’ have infected hundreds of thousands of computers across the world, hitting large organizations such as Britain’s National Health Service (NHS), Russian steel and oil firms Evraz and Rosneft, and Pittsburg’s Heritage Valley Health System.

Ransomware is a growing risk

Both WannaCry and Petya targeted vulnerabilities in Microsoft Windows operating systems called EternalBlue. In doing so, these campaigns of cyber extortion have emphasized growing concerns that a huge number of businesses rely on software that is at risk from aggressive hackers. With most security experts predicting more attacks to come, companies that don’t act now run a greater risk of exposure to threats.

Unpatched, outdated systems are a ticking time bomb

The EternalBlue flaw in Windows was first revealed in March this year. Although Microsoft issued a patch almost immediately to protect current versions of the software, the company didn’t release a patch for older systems such as XP until after WannaCry struck, despite the fact an estimated 7 percent of the world’s PCs still run on the software.

The huge number of outdated, unpatched systems should act as a wake-up call for businesses to put better security measures in place. Unfortunately, there are still a lot of businesses that don’t receive adequate support and don’t realize they are in possession of a vulnerable system that needs patching.

Ransomware attacks strengthen the case for cloud migration

Putting your business’ critical systems in the cloud eliminates the ticking time bomb presented in outdated systems. Software as a Service and managed cloud providers continuously update systems. This simplifies operations, reduces failures and minimizes vulnerabilities. Beyond automatic patching, hosting systems in the cloud also provides other security benefits. At NewVoiceMedia, for example, we are constantly working to improve the robustness of our cloud-based contact center service, and are ISO27001 certified with externally audited Level 1 PCI DSS compliance.

Proactive threat detection

When using the services of a cloud provider, businesses get to enjoy the benefit of a centralized monitoring system. Put simply, this means that security incidents are quickly detected and managed on a proactive rather than reactive basis. Cloud providers also have dedicated security experts on hand, which means they are better equipped for crisis management than most businesses.

Improved disaster recovery capabilities

In the event of an attack, cloud systems offer more robust disaster recovery options than traditional applications. Cloud computing puts your entire IT infrastructure onto a managed environment than can span multiple geographic regions. If one region gets hit, this means you can shift everything from one data center to another in a matter of minutes, ensuring maximum continuity.

Final thoughts

As our economy gets ever more reliant on digital technology, businesses cannot afford to get complacent about cybersecurity. At present, many businesses don’t have the capacity or expertise to take full responsibility for data security. However, in a lot of these cases, migrating to the cloud will provide the support needed to prevent ransomware attacks and other unforeseen threats.

About the Author

Ashely Unitt, co-founder and chief scientist at NewVoiceMedia, has more than 20 years’ experience in developing advanced messaging software. He leads NVM’s architecture and research teams, and heads up NVM Labs.

Edited by Alicia Young
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Related Articles

Protecting Your Digital Fortress Through Threat Exposure Management

By: Contributing Writer    5/23/2024

In today's digital landscape, cybersecurity threats loom large, posing significant risks to businesses, organizations, and individuals alike. With the…

Read More

Why Block Websites? Understanding the Reasons

By: Contributing Writer    5/6/2024

The internet is such an expansive network where every click can lead to information, entertainment, or opportunities for productivity. However, this a…

Read More

ChatGPT Isn't Really AI: Here's Why

By: Contributing Writer    4/17/2024

ChatGPT is the biggest talking point in the world of AI, but is it actually artificial intelligence? Click here to find out the truth behind ChatGPT.

Read More

Revolutionizing Home Energy Management: The Partnership of Hub Controls and Four Square/TRE

By: Reece Loftus    4/16/2024

Through a recently announced partnership with manufacturer Four Square/TRE, Hub Controls is set to redefine the landscape of home energy management in…

Read More

4 Benefits of Time Tracking Software for Small Businesses

By: Contributing Writer    4/16/2024

Time tracking is invaluable for every business's success. It ensures teams and time are well managed. While you can do manual time tracking, it's time…

Read More