Didn't find what you're looking for? Contact Support











As you are likely aware, the malicious “WannaCrypt” software has been impacting Microsoft Windows based systems around the world since Friday, May 12, 2017. We have reviewed all our client environments to identify any unpatched systems still vulnerable to WannaCrypt and as a temporary measure disabled the SMBv1 protocol, which is the targeted exploit of WannaCrypt.

 

Additionally, we will be performing an emergency deployment of the updates outlined in Microsoft Security Bulletin MS17-010 tonight, Tuesday, May 16 at 11PM local time to protect any vulnerable systems.