Following on from my post yesterday about reacting to critical updates

It seems that no more than a day after Microsoft released a Critical Security update, someone’s released a Trojan into the wild that exploits the vulnerability.

Given the “exploit potential”, this one sounds relatively tame. I suspect it’ll only be a matter of time before the exploit code is perfected and turned into a much more potent animal.

Putting a few hours in on Thursday night, has potentially saved us exponentially more hours in data and service recovery, as well as general IT support. It definitely pays to be proactive!