In 2017, WannaCry hit Windows computers globally and resulted in more than 300,000 machines being infected with this ransomware worm. In 2018, 3388 cases of WannaCry was found on Australian systems. Globally, that number was closer to three million computers. Would an automated patch management have helped in this situation?

Meanwhile, the BlueKeep vulnerability has been found in Microsoft’s Remote Desktop Protocol. Concerns surrounding its potential severity has prompted New Zealand’s Cyber Security Centre and Microsoft to issue urgent warnings for users to update their operating systems.

About a million Windows users are at risk of a highly spreadable ransomware attack. Experts fear this could be as troubling as 2017’s WannaCry cyberattack.

Microsoft alerted users to BlueKeep’s issues earlier this year, but have warned that more than a million computers are still vulnerable.

Microsoft lists BlueKeep as a 9.8 out of 10 in threat severity, prompting its Director of Security to compare it to WannaCry.


What if you ignore it?

Hackers can take over a computer without any authentication and can get into other network systems without needing to deploy malware.

The vulnerability involves a common Windows protocol, which allows hackers to remotely takeover a computer without any input from the machine’s owner.

Ideal practice is to stay on top of the large number of patches released every day, using an effective patch management software.


Desktop Central is a fully automated patch management solution for Windows, Mac, Linux and third-party applications. It offers features to help keep your devices safe and protected:


Download your 30-day trial today. Reach out to our team at for any queries.

patch management