HELP DESK Support(678) 387-5715

  IT Services(678) 387-5717

JETT News

Avoiding WannaCry Ransomware

 A Person Operating His SmartphoneJETT BT has been protecting our customers from this threat and other Internet menaces well before the WannaCry event hit the news media. The key to this protection has been our delivery of consistent and meticulous maintenance to our customers’ PCs and network devices.  Our monthly service programs are designed to ensure that all security patches are applied and working for our customers in a timely manner.

The WannaCry ransomware is delivered through a phishing email and infects the user’s PC or server when a link is clicked from the opened email.

Tips for being watchful of Phishing activities arriving in your Inbox

Phishing and cyber-threats continue to evolve. With added frequency, sophistication, and more economic impact, it is extremely important to protect yourself and your business before it happens. To help prevent infection by the threats similar to WannaCry, learn to look for the signs of a phishing email and delete these immediately:

Signs indicating potential phishing messages may include:

  • A request to verify your name, email address, personal data by clicking a link from an unknown sender
  • URLs that state one destination, but direct you to a different one – check this by hovering your mouse over the URL
  • Poor spelling and/or grammar and a request to click a link
  • Various threats of ‘your account will be closed’ or ‘your account has been compromised’ or ‘urgent action required’

As good as the malware protection is on your PC, you must do your part and remain alert for suspicious emails and NEVER click on links in emails in which you are suspicious of or unfamiliar with the sender or content.

If you would like help securing the network of your business, call JETT Business Technology 770-667-6178

Recent News

Spear Phishing in Cybersecurity: A Comprehensive Guide

Spear Phishing in Cybersecurity: A Comprehensive Guide

In today’s interconnected world, “spear phishing” in cyber security is a term that’s gaining increasing significance. This sophisticated cyber-attack involves sending personalized emails to specific ...
Read More →
The Critical Importance of Data Security in Today's Enterprises

The Critical Importance of Data Security in Today’s Enterprises

In today’s digital age, understanding why data security is important is a fundamental aspect of every enterprise. Data security goes beyond mere protection—it also involves ...
Read More →
Exploring the Landscape of Cloud Computing

Exploring the Landscape of Cloud Computing

Navigating through the world of cloud computing can often seem like a complex journey. With various options available, each offering unique benefits, businesses must understand ...
Read More →
What To Do When You're Facing a Hacking Threat

What To Do When You’re Facing a Hacking Threat

In today’s digital age, encountering a cybersecurity breach is not just a possibility—it’s increasingly becoming a question of when rather than if. This post is ...
Read More →
Scroll to Top