If you require our remote support, please click the button below and we will provide you with a unique code.GET STARTED USING A MAC?
If you still have problems, please let us know, by sending an email to email@example.com. Thank you!
With more than 200,000 victims in 150 different countries, many are braced for more attacks to come. But as workers across the globe head back into the office at the start of the working week, how will you know if your computer has been infected?
The National Cyber Security Centre (NCSC) has issued a statement on their website, offering advice to both organisations and private individuals on how to protect themselves from further attacks.
The ransomware called Wanna Decrypt, also known as WannaCry, encrypts files on the machine, effectively locking them.
A message will appear onscreen with a ransom demand, countdown timer and Bitcoin wallet to pay the anonymous virtual payment into.
People have been asked to pay ransoms of £230 or more to regain access to their computers.
While 47 NHS health trusts across England have so far been affected, the good news is that home users are believed to be at low risk to this attack.
The malicious software only infects machines running Windows operating systems, so Windows users should immediately run a Windows Update.
An up-to-date anti-virus programme should also be in place – this can stop ransomware from being downloaded.
A full scan should be carried out – this will locate any malware that may have already found its way onto your computer.
Important data should be backed up – you can’t be held to ransom if you’ve got the data somewhere else.
An external hard drive is particularly useful here, as it doesn’t need to be connected to the internet, and can keep your valuable information at a distance from the hackers.
Exercise caution when opening emails – and don’t click on any attachments or links sent to you by an unknown sender.
Never download an app that hasn’t been verified by an official store.
A final fail-safe is to shut down vulnerable systems.