What lessons can organizations learn from the WannaCry ransomware cyberattack, which infected 300,000 PC’s across 150 countries? WannaCry, also known as WannaCrypt, could have been easily avoided, it didn’t spread via email and the vulnerability it exploited had been fixed months before via a patch. An outbreak like this is indicative of failings or shortcomings in following basic security principles. Using WannaCry as an example, we will cover how organizations can be better prepared using an assume breach stance and to be mindful of issues like technical debt.
In the UK alone, WannaCrypt has caused havoc in hospitals, delaying appointments and vital operations putting patient care at risk. There are many other high profile examples of companies with WannaCry infections around the world.
This article isn’t specifically about how to remove WannaCry infections, it’s more aimed strategically at how organizations can reduce risk and better avoid similar cyber-attack outbreaks. Firstly, for reference, here are Microsoft's posts about WannaCrypt (WannaCry):
Microsoft provides comprehensive security products and services, much of which is integrated and enabled by default. Taking a step back though, it’s easy to forget about the more mundane elements of protection that come from an organization culture and its preparedness for cyber-attacks.
The author is a firm believer in that security isn't as simple as purchasing products or configuring features. It comes from a solid foundation that is built on an organization’s culture including policies and procedures.
When looking at an organization’s competency with dealing with cyber-attacks like WannaCry, here are some questions to ask:
For example, if any end-user phones their IT Service Desk/helpdesk saying they can't access their files anymore and they are getting a message on their screen, what would happen next? Is there a well prepared scripted response from IT staff that minimizes further infection?
While the above questions are all very well, there are two areas specifically worth looking into at greater depth.
Organizations should adopt an assume breach stance. This means expecting to be hacked and to be targeted for cyber-attack and building systems and processes around this. This is a well-known and respected information security approach but it is not always heeded. Without assume breach, the risk is an organization reacts to cyber attack and are not as well prepared.
With what is sometimes known as technical debt, it’s the work that tends to be put off indefinitely and poses an increased risk as a result. This can often be the trickier pieces of work that could have blockers or dependencies that mean they often get delayed. This could be work like upgrades, migrations, replacing legacy systems, that don’t get done as quickly as they should.
More information:
Now going into some more specifics, here are some additional points to consider:
This reminder from Microsoft illustrates how we are all responsible for cybersecurity:
"This attack is a powerful reminder that information technology basics like keeping computers current and patched are a high responsibility for everyone, and it’s something every top executive should support." (Microsoft's Brad Smith, President and Chief Legal Officer)
If all organizations take this on board, we can all be better prepared for the for the next WannaCrypt. Let’s not make it any easier for cybercriminals. Even for organizations that haven’t been hit with WannaCry infections, now is a great time to shore up defences against cyber attack.