Protecting your Computer

With so many emails coming your way, we wanted to send some helpful tips to make sure you know how to protect your computer and systems. Our guest columnist is a trusted expert in proactively securing small business networks:

Yigal Behar

CEO of 2Secure Corp.


As you may know, on May 12, hackers launched a global ransomware campaign against tens of thousands of corporate and governmental targets. The attack, known asWannaCry (also known as WannaCry, WCry, WanaCrypt, WanaCrypt0r, or Wanna Decrypt0r)is encrypting files and changing the extensions to: .wnry, .wcry, .wncry and .wncrypt, encrypts files on an infected computer and asks the computer’s user to pay a ransom in order to regain access.

So far we have learned that this ransomware spreads via an email attachment or link. Once a user opens the attachment, WannaCry executes on that computer, encrypts files on local drives, and spreads across the network.

Affected Microsoft Products Include

• Windows Server 2016

• Windows Server 2012 and Windows Server 2012 R2

• Windows Server 2008 R2

• Windows Server 2008

• Windows Server Core installation   option

• Windows 10

• Windows RT 8.1

• Windows 8.1

• Windows 7

• Windows Vista

The ransomware spreads itself over the network using a vulnerability in the SMB protocol, which is used by Microsoft for file sharing purposes. This flaw in Windows systems, now codenamed EternalBlue, was first leaked in the latest dump by a hacking group known as the Shadow Brokers. It’s believed that the US National Security Agency (NSA) originally created EternalBlue, the tool that allowed WannaCry to quickly spread across large networks.

Microsoft released a patch MS17-010 to combat EternalBlue in March, yet the majority of targets that were hit on the 12th had neglected to update their systems.

The WannaCry malware attack spreads as a worm, which makes it even more devastating to its targets.

Preventive Measures

1. Remove old computers and servers operating on old Microsoft Windows operating systems, specifically Windows XP and Windows Server 2003.
2. Patch all systems with the latest updates, this includes both operating systems and applications.
3. Change passwords, making sure they are at least ten characters long and complex.
4. Backup files often – at least twice a day.
5. Regularly test your backups by restoring files.
6. Teach your employees to NOT click on suspicious links or open suspicious attachments.
7. Make sure your AV is up-to-date.

What to Do While It’s Happening

1. Power-Off Infected Machines
2. Unplug Unaffected Machines
3. Backup Files
4. Update All Machines with Latest Updates

In case you are not sure what to do or have questions, please call us 646-755-3933 or request a FREE WannaCry Audit.

You will be scheduled on a first come, first served basis, timing is CRITICAL.

A BIG Thank You to our guest columnist:


Yigal Behar, President & CEO

2Secure Corporation

464 Kings Highway, 2nd Flr Brooklyn, NY 11223

TEL: 646-755-3933


And more on the subject . . . 

10 Tips on How to Identify a Phishing or Spoofing Email

Another very important piece of information we all have to be aware of is spoofing. We have received these fake emails at our own BIG headquarters, and have heard from clients who also have been targeted. Please read this great blog that has some important information we can all use!