In 2017, WannaCry hit Windows computers globally and resulted in more than 300,000 machines being infected with this ransomware worm. In 2018, 3388 cases of WannaCry was found on Australian systems. Globally, that number was closer to three million computers. Would an automated patch management have helped in this situation?
Meanwhile, the BlueKeep vulnerability has been found in Microsoft’s Remote Desktop Protocol. Concerns surrounding its potential severity has prompted New Zealand’s Cyber Security Centre and Microsoft to issue urgent warnings for users to update their operating systems.
About a million Windows users are at risk of a highly spreadable ransomware attack. Experts fear this could be as troubling as 2017’s WannaCry cyberattack.
Microsoft alerted users to BlueKeep’s issues earlier this year, but have warned that more than a million computers are still vulnerable.
Microsoft lists BlueKeep as a 9.8 out of 10 in threat severity, prompting its Director of Security to compare it to WannaCry.
What if you ignore it?
Hackers can take over a computer without any authentication and can get into other network systems without needing to deploy malware.
The vulnerability involves a common Windows protocol, which allows hackers to remotely takeover a computer without any input from the machine’s owner.
Ideal practice is to stay on top of the large number of patches released every day, using an effective patch management software.
Desktop Central is a fully automated patch management solution for Windows, Mac, Linux and third-party applications. It offers features to help keep your devices safe and protected:
- Updated Vulnerability Database
- Periodic Patch Scanning
- System Health Policy
- Automate Antivirus Updates
- Decline Patches for Specific Applications
- Disable Automatic Updates
- Automatically Test and Approve Patches before Deployment
- Schedule Patch Deployment
- Automated Patch Deployment
- Patch Management using Mobile App