This is an archived article that was published on sltrib.com in 2017, and information in the article may be outdated. It is provided only for personal research purposes and may not be reprinted.

State law enforcement officers have received no reports of the WannaCry ransomware affecting Utah institutions or individuals, but they are advising residents and businesses to take steps to inoculate their computers.

State Bureau of Investigation Sgt. Jeff Plant also offered advice Monday about what to do in case you are the victim of ransomware.

The WannaCry or Wcrypt attack has struck computers running older versions of Microsoft Windows around the world and affected universities, hospitals and businesses. Ransomware attackers typically ask those affected to pay to unlock data frozen in an attack. 

Utahns have reported 11 attacks to authorities so far this year, though others could have gone unreported, Plank said. Last year, 22 attacks were reported.

To "get in front of the ransomware problem," he recommended that individuals and businesses:

• Back up data considered important, then remove any drives used for that backup.

• Don't click on unsolicited emails or links in them and don't open any attachments. 

• Keep computers updated, including authorizing automatic updates.

• Install an antivirus program.

"These are four things that will take care of the majority of the ransomware attacks," Plank said.

For those whose computers are infected, he recommended:

• Remove the computers from the internet and unplug any external drives to prevent spreading of the malware.

• Contact law enforcement and report the problem on the ic3.gov website.

• Restore the computers from backups. Law enforcement officials recommend not paying the ransom, though they say some Utahns have done so and that it's not illegal under state law.

Tom Harvey