Firms across the world are still showing reluctance to update their software despite the looming threat of ransomware attacks. And security experts from Kaspersky Labs say that this adverse reaction of businesses to update/upgrade their software can encourage hackers to launch more intense attacks than the previous Wanna cry.
A couple of months ago i.e. of May 12th, 2017 a ransomware variant called Wanna cry created havoc across the world by disrupting more than 200,000 computers in more than 150 countries.
Many companies in the United States felt the jolts given by Wanna cry Ransomware as it halted the day to day operations in their enterprise for days and to some for weeks.
As the attack took place only on Windows systems, Microsoft immediately reacted by announcing that a security patch to tackle the loophole exploited by Wanna cry spreading hackers is already available in the March’17 version of security updates.
But experts from Cisco Talos say that companies are showing hesitancy in adopting the updates as it makes their applications too slow to run. And as a result, they are inviting more trouble in near future.
“While our company immediately got down to adopt the security updates released by Microsoft, the task was halted midway as our applications were getting too slow”, said the CTO of FedEx.
Here, the reluctance to upgrade also holds true for most government offices and institutions which mostly use pirated software. As pirated software versions cannot be upgraded with security patches, some agencies could have halted the task of applying security patches on an immediate note.
Note- From a corporate viewpoint, application software developed for one application might be affected by a security patch. Thus, a gap between the security patch application and the latest version will surely exist.
But all the dislike to update the systems with latest security updates leads to only one trouble in future and that is being cyber attacked in an intense way.
What do you say….?
You can share your views through the comments section below.