Spyware contains many Windows-based exploits, the hack program targets the protocol used to share files Windows Server Message Block (SMB). They work by making the OS execute remote code, thereby installing malware on the victim's computer.
Companies using old Windows Server can still protect themselves. Williams suggests that they do not use the background to hide the server behind the firewall, but use a technique called network segmentation.
This can restrict access to important servers and ensure only system managers can control them. 'Instead of having 20,000 people in the company visit, drop it to 20,' said Williams. Even if hackers break the firewall, they can only access every small partition of the enterprise network.
Network segment is inexpensive. Business routers often have access control capabilities, limiting how far the computer can communicate, Williams said.
Businesses should consider managing vulnerable servers or at least servers that contain important information. Any unusual data traffic going through it may be a sign that a hacker has been attacked.
To keep the malicious activity from the system, whitelists can be used, it is advised by Jason Leitner, president of Below0Day, IT security service provider.
Whitelists only allow trusted applications to run on the computer. This is the opposite of antivirus products when these tools blacklist dangerous software based on indicators.
Businesses can make backups of sensitive data on these machines. A growing threat in recent years is ransomware extortion code. It works by infecting the machine, encrypting all data on it. To get back, the victim must pay the extortion charge, usually bitcoin.
However, according to security experts, even if there are these ways, the best solution to protect Windows Server systems is to upgrade. Even if it is expensive, but an investment can help avoid carpeting. future leak or loss of data. Tiago Henriques, CEO of BinaryEdge security company, recommends that businesses calculate more 'The cost of upgrades and damages suffered by the company and customers when hacked, which side is greater?'