Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Granted, there’s nothing that any of us could have done to prevent hackers from using a leaked NSA cyberspying tool to deliver their ransomware. Companies that took the time to apply the latest security patches issued by Microsoft back in March were generally spared having their files encrypted against their will. Meanwhile, companies and PC users alike that put off applying the updates were the ones that got slammed.

This incident highlights the importance of applying security patches in a timely manner, as well as poses the question, “Why were there so many organizations that put off applying such a critical patch?” Compared to the average PC user that simply has their system set to automatically install Windows updates as soon as they’re released, enterprises tend to take a different approach.

When it comes to business computing, it’s best practice to first test a new patch before applying it to the company network. A major reason for this is because one can’t be certain of how applying a patch will affect other software until testing first takes place. Worst-case scenario, a patch is applied to a company network that unexpectedly interferes with a mission-critical application. When this happens, productivity is hindered and operations may even grind to a halt.

Considering the potential fallout from this outcome, you can see why a lot of IT departments choose to delay applying newly issued patches. After all, should a patch that’s been applied end up disabling important systems, then going back and undoing the damage just makes the problem worse, and much more expensive.

All that said, organizations hit with the WannaCry ransomware had adequate time for their IT departments to test the security patches issued by Microsoft (in March), before the ransomware began infiltrating systems around the world (in May). Now, we understand that every business has different priorities, and those priorities are reflected by how IT resources get allocated. As an IT company ourselves, we get that and therefore don’t wish to criticize organizations that didn’t apply the security patches soon enough. Instead, we offer our condolences to any business hit with the WannaCry ransomware, and we’re standing by to help resolve any related IT issues.

At the very least, we hope this ransomware attack serves as a wake-up call for organizations of all shapes and sizes when it comes to following through with routine IT maintenance, especially the likes of promptly applying security patches (a top priority, obviously) and properly managing your backups. If you don’t have time for this or find yourself routinely pushing IT responsibilities like testing/applying patches off to the side, Voyage Technology can help.

With our managed IT services, you can outsource routine IT tasks to our trained technicians, which can often be handled remotely. They will make sure these tasks are taken care of promptly and efficiently, meaning you “won’t cry” should another ransomware attack make the rounds. To get started today with managed IT from Voyage Technology, call us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 18 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Compliance Gadgets Cloud Computing Covid-19 Training Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Tip of the week Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Conferencing How To BDR Computing Hacker HIPAA Information Technology Avoiding Downtime Applications Marketing Office 365 Access Control Augmented Reality Storage Retail Password Bring Your Own Device Healthcare Big Data Managed IT Services Operating System Computers Router Physical Security Risk Management Virtual Private Network Website Health Analytics 2FA Office Tips Help Desk Firewall Excel Document Management Managed IT Service Remote Workers The Internet of Things Telephone Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Customer Service Remote Monitoring Vulnerability End of Support Cybercrime Vendor Management Solutions Display Printer Windows 11 Paperless Office Infrastructure Monitoring Video Conferencing Money Humor Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Safety Sports Maintenance Mouse Antivirus Downloads iPhone Licensing Administration Vulnerabilities Entertainment Data Privacy Images 101 Customer Relationship Management Telephone System Multi-Factor Authentication Robot Mobility Settings Wireless Cost Management Printing Content Filtering Hacking Presentation YouTube IT Management VPN Employees Meetings Cryptocurrency Wireless Technology Integration User Tip Modem Computer Repair Mobile Security Virtual Desktop Processor Data storage LiFi Holidays Word Data Storage Outlook Smart Technology Supply Chain Public Speaking Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Lithium-ion battery Management PCI DSS Chatbots Navigation Entrepreneur Writing Distributed Denial of Service Workplace Scary Stories Lenovo Gig Economy Screen Reader Hacks Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Fun Server Management Regulations Compliance Private Cloud Identity Deep Learning Evernote Paperless Co-managed IT Superfish Bookmark Undo Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Education Financial Data Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Connectivity IT Mobile Computing Upload Procurement Remote Computing Azure Hybrid Work Search Social Network Telework Application Cyber security Best Practice Multi-Factor Security Tech Human Resources Dark Web Cables Buisness CES Tablet IoT Communitications IBM Trends Supply Chain Management Legal Alert IT solutions Managed IT Customer Resource management FinTech File Sharing Regulations Business Growth Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Business Intelligence Cortana Organization Travel Social Networking Alt Codes Legislation Shortcuts Ransmoware Downtime Techology Fileless Malware Digital Security Cameras Competition Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Hosted Solution Health IT Unified Threat Management Motherboard Data Breach Typing Comparison Google Play Be Proactive Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Google Drive User Wasting Time Threats Knowledge Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Fraud Meta 5G User Error Microchip IP Address Username Google Docs Managing Costs Amazon Unified Communications Experience Black Friday SSID Running Cable Point of Sale eCommerce Bitcoin Database Surveillance Google Wallet Virtual Assistant Outsource IT Network Management Recovery Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Laptop Proxy Server Reviews Hard Drives Cookies Windows 8 Domains Tactics Development Drones Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays PowerPoint Halloween Shopping Refrigeration Nanotechnology Optimization

Blog Archive