The WannaCry ransomware threat is only going to get worse on Monday as more employees log into their computers, and India's Computer Emergency Response Team (CERT) will be holding an webcast on how to protect against this.
This time, however, the move-known as sinkholing-thwarted WannaCry.
The phenomenon of companies failing to update their systems has been a persistent security problem for years. Machines that contained the patch are much less at risk than those that didn't.
Afterwards, immediately move data to devices running non-Windows OS (Linux, Mac) and/or BACK UP/COPY all data to a separate MEDIA STORAGE. And according to many security researchers, the attack method was first developed inside the NSA. "That means those customers will not have received the above mentioned Security Update released in March".
Since security professionals typically focus on building walls to block hackers from entering, security tends to be less rigorous inside the network.
"How did the malware manage to spread if Microsoft had already shipped a Windows update that fixed the vulnerability WannaCrypt was exploiting?" wrote Forbes contributor Lee Mathews.
Steve Grobman, chief technology officer at McAfee, which makes the popular antivirus software, disagrees with Smith.
The country should not be lacking in tech-savvy individuals who can improve cyber security.
Apple's Mac computers were not targeted by this ransomware attack so are clear.
It quickly became apparent that Wanna was spreading with the help of a file-sharing vulnerability in Windows. The money was stolen by hackers, believed to be from North Korea, from the Bangladesh central bank's account in the US Federal Reserve in NY.
Hackers have used "ransomware" to freeze at least 200,000 computers so far, and they have demanded that users pay up to regain access.
The damage might have been temporarily contained. It spread evenly around the world until a cybersecurity researcher accidentally discovered a kill switch in the code to halt it.
The cyber agency advised users to apply patches to their Windows systems in order to prevent its infection and spread. "Talk about a wake-up call", Hypponen said. But U.K. hospitals, Chinese universities and global firms like Fedex also reported they had come under assault. "Part of what an organization needs to understand and assess is what those two risks are".
On Friday, the whole world was met with a cyber-attack like no other. And while other attackers might use the same flaw, such attacks will be steadily less successful as organizations patch it. While Microsoft took the unusual step to issue a patch for Windows XP, the patch will only work if installed, and authorities have been warning businesses to ensure that their systems are updated.
"Ransomware doesn't have to go viral in your organisation; limit access to your data and file systems to those with a business need to use them".
A Microsoft spokesperson based in the United States told AFP: "Microsoft offers custom support agreements as a stopgap measure" for companies that choose not to upgrade their systems.