HELP DESK Support – (678) 387-5715

  IT Services – (678) 387-5717

JETT News

Avoiding WannaCry Ransomware

Jett Business TechnologyJETT BT has been protecting our customers from this threat and other Internet menaces well before the WannaCry event hit the news media. The key to this protection has been our delivery of consistent and meticulous maintenance to our customers’ PCs and network devices.  Our monthly service programs are designed to ensure that all security patches are applied and working for our customers in a timely manner.

The WannaCry ransomware is delivered through a phishing email and infects the user’s PC or server when a link is clicked from the opened email.


Tips for being watchful of Phishing activities arriving in your Inbox

Phishing and cyber-threats continue to evolve. With added frequency, sophistication, and more economic impact, it is extremely important to protect yourself and your business before it happens. To help prevent infection by the threats similar to WannaCry, learn to look for the signs of a phishing email and delete these immediately:


Signs indicating potential phishing messages may include:

  • A request to verify your name, email address, personal data by clicking a link from an unknown sender
  • URLs that state one destination, but direct you to a different one – check this by hovering your mouse over the URL
  • Poor spelling and/or grammar and a request to click a link
  • Various threats of ‘your account will be closed’ or ‘your account has been compromised’ or ‘urgent action required’


As good as the malware protection is on your PC, you must do your part and remain alert for suspicious emails and NEVER click on links in emails in which you are suspicious of or unfamiliar with the sender or content.

If you would like help securing the network of your business, call JettBt.com 770-667-6178

Recent News

Warning - Phishing Scam Alert

Phishing Training and Testing: A Necessary Defense Against Cyberattacks… and Worse

With cyber risks being one of the biggest concerns for companies in 2022, shrewd organizational leaders are taking steps to reduce their exposure. From ransomware …

Read More →
Multi-Factor Authentication

Multi-Factor Authentication: The Security “Option” that Isn’t Optional

With 61% of data breaches involving lost or stolen credentials such as passwords, the evidence is overwhelming that simple password authentication is inadequate for any …

Read More →
Protect Your Data

Why It Is Important to Protect Your Company’s Intellectual Property

Are You Doing Everything You Should to Protect Your Company’s Intellectual Property? Data Loss Prevention (DLP) is an information security tool that can detect and …

Read More →
Insider Threat

Have you Assessed a Potential Insider Threat to Your Business?

It’s nothing new.  Confidential information, sensitive financial records, critical customer data, and intellectual property are core assets for any successful business.   Protection of these assets …

Read More →
Scroll to Top