So tomorrow is April 1st and the sky will be falling shortly. We all know that the 4 forms of the Conficker worm are out there, ready to do something tomorrow that will probably be a pain in the butt at best and seriously disruptive at worst.
Hopefully, for most of us in Ed Tech, this will be a non-issue. Any Windows computers patched after October 2008 should have the necessary tools to detect Conficker, most of us run more AV than the average home user and many sit behind a firewall with some sort of gateway anti-malware. A reasonable Mac and Linux presence in education doesn't hurt anything either, since these machines won't have a problem with the worm.
We do have a couple of vulnerabilities that many businesses don't, however. Too often, when it comes down to keeping aging computers and network equipment running, we overlook regular maintenance and patching, particularly on those computers that sit relatively hidden in classrooms or tucked into nooks by resourceful teachers.
Secondly, students and teachers bring laptops and portable drives back and forth from home (generally far less secure environments) very frequently and Conficker has been transmitted via USB drives. While some schools and universities have significant security in place around personal laptops, funding can certainly be an issue in getting comprehensive measures in place.
That being said, Microsoft has published quite a bit of help on Conficker. While I'm fairly confident that most of our systems will be OK, since the first sign of a Conficker infection may simply be an inability to access anti-malware updates, I figured I'd download the latest Malicious Software Removal Tools (that can handle Conficker) and have them sitting on my Mac just in case. Here are links to both the 64-bit and 32-bit removal tools:
Good luck and enjoy your April Fool's day. Feel free to talk back below with any problems you encounter.