Viruses: What You Need To Know

Posted by   manager on    28 March 2018

Over the last year, we’ve seen plenty of viruses – and sadly, we’re not just talking about the cold and flu types.

Over the last year, multinational companies Maersk and FedEx, among others, have suffered immense losses as a result of the damage caused by malware in their systems.

The virus attacks suffered at Maersk, caused by the ransomware known as NotPetya, were spread through a hacked update to MeDoc – the most widely-used accounting software in Ukraine.

According to a statement from Soren Skou, CEO of Maersk, “Business volumes were negatively affected for a couple of weeks in July, and as a consequence, our Q3 results will be impacted. We expect that the cyber attack will impact results negatively by USD 200-300m.”

Although many companies will not be using this software, it is still a timely reminder to ensure that your practices remain secure.

Skou, who sat in on daily meetings which reviewed the rebuilding of the damages, learned that there was nothing that could have been done to stop the attack from taking place, but still wants to strengthen the security systems to prevent possible further attacks. “It was frankly quite a shocking experience […] Your email goes down, all your address system. We ended up having to use WhatsApp on our private phones.”

Using cloud-hosted systems, such as those built on the Amazon Web Services (AWS) platform, is widely regarded as being a far safer way to host your applications – here are just a few reasons why.

-        Protection and Encryption Included as Standard

On-premise systems require firewalls to be installed, as does encryption software – and these need to be maintained on an annual, or sometimes even a monthly basis, costing extra each time. In the vast majority of cases, using a system as a service (SaaS) removes this additional cost – it is already included in the price.

-        Monitoring is Taken Care of

Systems hosted by AWS are continually monitored by Amazon itself to keep an eye out for any potentially suspicious or dangerous data. In addition to this, Amazon provides tools that allow subscribers to have visibility of their own environments. Parameters can be put in place so that should any abnormal data transference occur, users will be alerted immediately. This deters any unauthorised access to the system.

-        Speed of Action

One of the most significant benefits of having your system hosted in the cloud is that any updates will be available immediately. They will not rely on you having to reload or update a physical device in order to access it – it will simply be available when you next open the application. This is particularly useful in the case of the threat of malware – any potential weak points can be addressed, with a solution available to be implemented much faster than might be possible on-premise.


If you would like any further information on any of our cloud-hosted systems or solutions, please don’t hesitate to get in contact with us. We’re happy to talk through any questions you might have.


Other News