News

News

7 Tips that may prevent from infected by WannaCry Ransomware

7 Tips that may prevent from infected by WannaCry Ransomware

Date : 16 May 2017

Reported by : WebMaster

Category : News


Share
This is another follow awareness "WannaCry Ransomware" Cyber Attack. The impact of this cyber attack seems very damaging as it locked important data of several institution across the globe and halted their operations. 
 
 
 
Ransomware Wannacry
 
 
Therefore, IIUM Cybersafe again encourage the IIUM Community to perform the following preventive measures in order to protect your crucial and important data from the ransomware infection:
 
1. Always perform external data backup - external hard drive or Cloud Storage alternatively you may use your IIUM Google Drive storage as it provides unlimited storage for IIUM staff.
 
2. Patch your SMB Vulnerabilities in Windows Operating System with MS17-010 Microsoft Security bulletin;
 
Please download the security update here. (make sure it related to your OS ) 
 
 
 
3. Disable SMB
 
Even if you have installed the patches, you are advised to disable Server Message Block version 1 (SMBv1) protocol, which is enabled by default on Windows, to prevent against WannaCry ransomware attacks.
 
Here's the list of simple steps you can follow to disable SMBv1:
 
- Go to Windows' Control Panel and open 'Programs.'
- Open 'Features' under Programs and click 'Turn Windows Features on and off.'
- Now, scroll down to find 'SMB 1.0/CIFS File Sharing Support' and uncheck it.
- Then click OK, close the control Panel and restart the computer.
 
 
4. Update your windows to the latest patch.
 
your may refer the guide here
 
 
5. Do not click on any links or attachments received from unsolicited emails
 
6. Update your Antivirus Program with Malware protection
 
7. Enable your Firewall and Block SMB Ports
 
Always keep your firewall enabled, and if you need to keep SMBv1 enabled, then just modify your 
firewall configurations to block access to SMB ports over the Internet. The protocol operates on TCP ports 137, 139, and 445, and over UDP ports 137 and 138.
 
We sincerely hope everyone can implement this simple step to prevent your precious data from permanent lost should your machines are infected by the ransomeware.