WannaCry Ransomware Update

Six Schools Receive 75" and 65" Promethean Touchscreen Donations from Soltech IT Ltd

Pictured Donated 75" Promethean Touchscreen Install at St Peter's Primary School in Bishopsworth.

Pictured Gareth Jones of Soltech IT handing over a 75" Promethean Touchscreen to Fosse Way Schools IT Team

2025 will see Soltech IT continue to donate IT equipment to school's throughout the Southwest as part of our 'Giving Back To Schools' donation campaign. 


We were delighted to be able to donate more than £15,000 of 65" and 75" Promethean ActivPanel Touchscreens to six local schools and MAT's.


Gareth Jones, commented "As a business it's great to be able to give something back to schools, be they a customer or not. Our most recent donations have helped transform the learning environments of pupils which is something we are very proud of."


These most recent donations have not only included a 65" or 75" Promethean ActivPanel Touchscreen, the schools have also received WiFi module upgrades, Android functionality, wall mounting brackets and relevant cables, plus delivery, removal / WEEE disposal of old equipment, installation and training, all as part of Soltech IT's donation.


That's around a £3,000 donation at each school or MAT.


Gabrielle Cox • 31 May 2017

In the aftermath, it is now thought that the recent WannaCry ransomware attack infected 350,000 victims in more than 150 countries, including Spanish telecoms firm Telefonica, French carmaker Renault, German rail firm Deutsche Bahn, logistics firm Fedex, Russia's interior ministry and 61 NHS organisations in the UK. Although there are many rumours still ongoing, it is yet to be confirmed who was behind the attack.

WannaCry is a unique example of an attack which works without any human interaction targeting a broadly available vulnerability with a working exploit. Experts believe the worm was primed to look for machines vulnerable to the bug within a Microsoft technology known as Server Message Block (SMB), with the majority of effected machines running Windows 7. The 'worm' then spread via network shares, looking for further vulnerable machines, allowing it to rapidly multiple across hundreds of computers, within hours of initial detection.

Once the WannaCry attack encrypted a computers file, an alert appeared on screen demanding a payment of £230 (in Bitcoins). It is now thought that 296 payments were sent, totalling £76,555, with no reports of any data then being restored.

Importantly, since the initial WannaCry attack, another attack called Adylkuzz has surfaced which also attacks the same Windows vulnerability as the WannaCry bug.

With the threat of a new or piggyback attack far from over, it is vital that your organisation is well protected. It is far better to put in place preventative measures than react to an attack if it occurred. Have a read of latest blog post on what you can do to protect yourself and contact us if you're concerned or need IT security advice.

Please Share