If you are not already aware there has been a very serious virus threat detected, but fortunately there is something we can do about it. (http://www.bbc.co.uk/news/technology-27668260). This comes in the form of a Bot-Net. I won’t bore you with the details of how this particularly nasty piece of malicious viral software works, but essentially it will lie dormant until a preset date, then it wakes up and becomes active, which will be in about 2 weeks. (http://thenextweb.com/uk/2014/06/02/uks-national-crime-agency-two-weeks-protect-gozeus-cryptolocker-malware/)
When this virus activates it will encrypt all of your personal files and force you to pay the virus owners money to unlock them and / or access your personal / corporate bank accounts if you use online banking and then fraudulently transfer your money out of your bank accounts into their own.
We implore you to take steps to prevent a potential disaster to your company. Any Windows based computers should be protected immediately, if they aren’t already. Please make sure that all Desktops / Laptops and Servers have up-to-date Anti-Virus software as well as Anti-Malware software. We currently recommend Avast Anti-Virus protection as well as Spybot S&D for malware. Once you have updated and scanned your machines we also recommend you use a specially designed scanner to scan for this specific virus. On the website (http://www.getsafeonline.org/nca/) is a compiled list of BESPOKE scanners. We recommend the Symantec scanner found here (http://www.symantec.com/connect/blogs/international-takedown-wounds-gameover-zeus-cybercrime-network). Symantec are a well known and trusted Anti-Virus company. This link will explain more about the scanner, but effectively you download the file and open it and follow the instructions and it will scan your computer for the virus in question. If found it will act appropriately. If you do not get on with this scanner we can help you with it or try one of the other ones from the list.
If you need any help at all with any of this please get in contact with us.