If your computers running on Microsoft Windows, you need to take these stepsright away.

Ransomware does not typically work this quickly.

What users need to do

Simply put: verify your Microsoft Windows server is up to date.

But those who did not apply the software update wereand still areleft exposed to the hack.

Those running on Windows 10 are fine, as their software is not vulnerable to this particular cyberattack.

Devices that are potentially susceptible are Windows 7 and Windows Server 2008, and earlier operating systems.

Microsoft recommends users upgrade toWindows 10and load the security updateMS17-010.

With the1.243.297.0update,Windows Defender Antivirusdetects the malware as Ransom:Win32/WannaCrypt.

The company also recommendsDevice Guardfor businesses andOffice 365 Advanced Threat Protectionfor blocking emails carrying malware.

They suggest trying to independently verify web addresses.

What happens if you dont take protective measures?

But thats easier said than done, when its your own files that have been hijacked.

Wasnt the ransomware stopped?

The discovery was made by a U.K.-based cybersecurity researcher who only identifies themselves asMalwareTech.

Since Friday,two new variationsof the malware have been detected.

As such, it maintains imperative for people to protect their computers.

How common is ransomware?

More common than youd think.NPRreports that40 percent of spam emailslast year contained ransomware attachments.

And the ransomware-related extortion industry is growing.

In 2015, ransomware victims reported $24 million in total annual costs (e.g.

ransom, tech support, security software),Reutersreported last year.

In just the first three months of 2016, the reported expenses were already at $209 million.

General, good-sense advice:remotely back up your fileson a regular basis.

This way youll never have to give in to a ransomware request if and when your rig is compromised.

And, of course, always stay up-to-date with your computers software.