OK I have used an APP on my IPAD to check the strength of the signal around the house. I has also done a search of open ports. The app is legit and is from trend micro.
One of the things that it is recommending is that to stop ransomware attacking your NAS is to close ports 135 and 445. Now I have done this on Windows 10 but the open ports still show up on the wifi signal scan.
I am now confused because you cant access the ports within the NAS to close these.
I have downloaded ClamAV as a precaution.
AM I looking at this from the wrong perspective? ie I need to closes the offending ports on the actual router not the NAS?
I have a SKY Hub in the UK but I cant find anywhere on this to block ports other than close UPNP which would stop anyone from accessing the cloud drive I understood.
Is this a redherring with Trend Micro or is it a genuine concern that needs to be looked at with regards to the NAS?
My thinking is that if there is an exploit and it gets onto the NAS you are up **** creek without a paddle as all of your backup will be held to ransome unless you pay the fee or an AV fix comes out.
On another note anyone think that ClamAv is of any use?
Here is a link to t3eh Tend Micro page:
http://www.drcleaner.com/useful-guidance-wannacrypt-attacks/
NOTE That to get to this page you have to go via
http://www.trendmicro.co.uk/?utm_source=bing&utm_medium=cpc&utm_campaign=UK%20-%20Core%20Brand%20-%20BMM%20(WG)&utm_term=%2Btrend%20%2Bmicro&utm_content=Brand%20-%20trend%20micro
and click on the home free tool section. (but you could also do commercial if you wanted to)
Regards and tanks in advance.