The much publicised cyber-attack that has affected organisations as far-reaching as the UK’s National Health Service, Renault and Nissan has not been able to infiltrate Sure’s defences, despite 10 attempts by ransomware or similar malicious code to do so in the last 30 days.
Both Sure’s internal networks and its external communications networks have remained safe and protected throughout the weeks during which WannaCry has been loose in the environment.
Between Sure’s own rigorous security protocols and the Total Threat Protection provided by Sure’s email security partner, Mimecast Offshore, the company’s networks have remained secure and at a very low risk of infiltration by threats such as WannaCry ransomware attack.
“We constantly apply the latest patches and updates to our systems, which means we are well prepared to defend against known security threats,” said Cyrille Joffre, Chief Information & Technology Officer at Sure.
“In addition to knowing that the required patch had already been applied to our networks, we also use Mimecast Offshore to monitor and quarantine any suspicious emails or attachments. Mimecast’s Total Threat Protection has worked well and has directly stopped 10 attempts by ransomware or similar malicious code to infiltrate our email system in the last 30 days.
“As a matter of procedure when we know threats as destructive as WannaCry are in the wider environment, we will continue to monitor our infrastructure and security protocols to make sure there are no vulnerabilities and to ensure there is no abnormal activity on our networks.”
As well as defending its own infrastructure, Sure advises business clients on security matters. Any organisation seeking advice should contact their account manager or email business@sure.com.