It said it was issuing a special alert to help its members defend against any attacks that may occur, according to a news release.
The so-called “WannaCry” attack leveraged recently released vulnerabilities and exploit techniques to take control of Windows-based computers. The attack software infects vulnerable machines and demands $300 or more in bitcoin. Victims that don’t pay are threatened with deletion of the encryption key, and that renders their data irretrievable.
The release said also that life-safety institutions in the U.K. including hospitals were hit. NENA recommends the following to protect from this attack:
• PSAP IT departments should download, validate, test and install a Microsoft-issued patch to all affected machines as soon as possible.
• Center managers should ensure that on- and off-site backups for all critical systems are being routinely maintained. Existing backups should be verified and test restores performed using systems without an active Internet connection.
• PSAP IT departments should consider permanently disabling the SMB 1.0, SMB 2.0 and CIFS file sharing support of all Windows systems.
• Shift supervisors should remind front-line employees to report any unusual computer behavior and to exercise added care when clicking links and entering credentials.
• In the event of a compromise, do not pay. Contact your local FBI field office, notify National CyberSecurity and Communications Integration Center of any 911 service impacts at 888-282-0870, and take steps to preserve log files and other materials that may have forensic value.