HELP DESK Support(678) 387-5715

  IT Services(678) 387-5717


Avoiding WannaCry Ransomware

Jett Business TechnologyJETT BT has been protecting our customers from this threat and other Internet menaces well before the WannaCry event hit the news media. The key to this protection has been our delivery of consistent and meticulous maintenance to our customers’ PCs and network devices.  Our monthly service programs are designed to ensure that all security patches are applied and working for our customers in a timely manner.

The WannaCry ransomware is delivered through a phishing email and infects the user’s PC or server when a link is clicked from the opened email.

Tips for being watchful of Phishing activities arriving in your Inbox

Phishing and cyber-threats continue to evolve. With added frequency, sophistication, and more economic impact, it is extremely important to protect yourself and your business before it happens. To help prevent infection by the threats similar to WannaCry, learn to look for the signs of a phishing email and delete these immediately:

Signs indicating potential phishing messages may include:

  • A request to verify your name, email address, personal data by clicking a link from an unknown sender
  • URLs that state one destination, but direct you to a different one – check this by hovering your mouse over the URL
  • Poor spelling and/or grammar and a request to click a link
  • Various threats of ‘your account will be closed’ or ‘your account has been compromised’ or ‘urgent action required’

As good as the malware protection is on your PC, you must do your part and remain alert for suspicious emails and NEVER click on links in emails in which you are suspicious of or unfamiliar with the sender or content.

If you would like help securing the network of your business, call 770-667-6178

Recent News

Modern Businessman managing IT assets digitally

Professional IT Asset Management: A Modern Business Necessity

In the current business environment, IT asset management (ITAM) — proactive deployment, tracking, maintaining, planning for replacement (or upgrade) and disposal of all IT assets …

Read More →
Hacker on the Dark Web

The Dark Web in 2022: What You Need to Know; What You Must Do Now

In the late 1990s, the U.S. Department of Defense (DoD) launched what would later be known as the dark web. Designed for anonymous communications with …

Read More →
Warning - Phishing Scam Alert

Phishing Training and Testing: A Necessary Defense Against Cyberattacks… and Worse

With cyber risks being one of the biggest concerns for companies in 2022, shrewd organizational leaders are taking steps to reduce their exposure. From ransomware …

Read More →
Multi-Factor Authentication

Multi-Factor Authentication: The Security “Option” that Isn’t Optional

With 61% of data breaches involving lost or stolen credentials such as passwords, the evidence is overwhelming that simple password authentication is inadequate for any …

Read More →
Scroll to Top