Protect
This refers to making sure an organization has taken the necessary measures and precautions to secure itself before any cybersecurity problems arise. This area focuses on proactive strategies rather than reactive strategies.
As mentioned on different blogs and sites including Ethiocert website (Wannacry Ransomware), WannaCry ransomware and other variant are targeting a vulnerability in SMB protocol, which windows use to share resources between computers. So beside updating and patching system we strongly recommend to disable SMBv1 protocol on your systems to avoid being exploited incase other hosts are infected in the network.
So there are clear instructions on Microsoft blog (https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-server-2012) on how to disable for different versions of windows. We have compiled some of the commands on this site into a script and uploaded here. You can find the specific disabling scripts below
Instruction on how to run the script
Please run the scripts using administrator privilege, otherwise it might not work.
Run both server and client scripts matching your operating system's version on your machine
Do NOT forget to restart your system for the changes to take effect.
How to disable SMB protocols on Windows vista and XP
Turn On or Off File and Printer Sharing in Windows Vista and XP
1. Open Control Panel.
2. Choose Network and Internet (Vista) or Network and Internet Connections (XP) if you're in category view or skip down to Step 3 if you see the Control Panel applet icons.
3. In Windows Vista, choose Network and Sharing Center.
In Windows XP, choose Network Connections and then skip down to Step 5.
4. From the left pane, choose Manage network connections.
5. Right-click the connection that should have printer and file sharing turned on or off, and select Properties.
6. In the Networking (Vista) or General (XP) tab of the connection's properties, check or uncheck the box next to File and Printer Sharing for Microsoft Networks.
7. Click OK to save the changes.
This refers to making sure an organization has taken the necessary measures and precautions to secure itself before any cybersecurity problems arise. This area focuses on proactive strategies rather than reactive strategies.
Incidents cannot be responded to unless they are detected. In fact, detection of security incidents may take weeks or months for many organizations to accomplish.
Responding to a computer security incident has a few steps. The first step is when the team receives a report of an incident from a constituent, such as a user, business partner or security operations center staff member.