RiskVision Statement on the WannaCry Ransomware Attack
RiskVision has not been affected by the WannaCry Ransomware Attack either for internal systems or at RiskVision hosted servers.
RiskVision security defenses that block this WannaCry Ransomware attack are:
- Using the RiskVision platform to manage, prioritize and remediate RiskVision security and risk lines of defense.
- RiskVision patches all systems on a regular and scheduled basis: Servers, desktops, laptops, and VMs are fully patched at least weekly and all systems are patched at least once per month.
- RiskVision has deployed End Point protection systems that block any known attacks.
- RiskVision IP addresses are scanned weekly by a vulnerability scanner to identify any known vulnerability and so that RiskVision personnel can respond quickly to any issues or concerns.
- RiskVision does not use the obsolete Windows XP (no active patch) or the Windows 2003 operating system.
- RiskVision has multiple backups of critical business data and RiskVision hosted customer data. This is backed up and encrypted at least once daily which is part of the RiskVision Disaster Recovery Plan which protects RiskVision and RiskVision hosted Customers from Ransomware type attacks.
In addition, for RiskVision Customers on RiskVision Hosted Servers:
- RiskVision servers and VMs cannot be attacked by the WannaCry Ransomware as no User is reading email and opening infected attachments on RiskVision applications
- Ports used by the WannaCry Ransomware to spread this attack are tightly controlled by RiskVision and only specific IP addresses can access these port and as stated above, the RiskVision Hosted Servers and VMs are fully patched and are immune to the WannaCry Ransomware attack
- If you would like more information on RiskVision preventative measures and how RiskVision predictive and actionable intelligence’ risk management system can prevent this ransomware from affecting your systems