The leaked hacking tools publicized a vulnerability in Windows, Microsoft's ubiquitous computer operating system.
"The numbers are still going up", Mr Wainwright said. "So they no longer get the security updates they should be". The WannaCry ransomware software itself - which encrypts the victim's data and demands a bitcoin ransom to unlock it again - was fairly ordinary.
The spread of the virus slowed over the weekend but the respite might only be brief, experts have warned.
Earlier in the day, central transmission utility Power Grid said it has put sufficient firewalls to deal with the global cyber attack Ramsomware and consumers need not fear sudden outages on that account. So even people with older computers should go update them. This stopped the attack spreading as a worm and acted like a kill switch, thereby instructing the malware to not proceed with the encryption of files, making it inactive. Once it infects one computer within a network, it can spread to all the computers in that network "within seconds", said Israel Levy, the CEO of the cybersecurity firm Bufferzone. In my opinion, the best way to protect your photo or video archive is creating multiple backups and if possible and using cloud backup services for unused photos and system recovery. It's a good idea to back up files to a drive that remains entirely disconnected from your network.
The U.S. Department of Homeland Security, in a statement late Friday, encouraged people to update their operating systems.
Microsoft had already released a fix for the Eternal Blue vulnerability in March, but the extent of the WannaCrypt attack has highlighted how many organisations have failed to apply the fix, or are running copies of Windows that are so old that there wasn't a fix for them. Updating software will take care of some vulnerability.
However, security researchers say firms that fail to keep their software up-to-date are also responsible for the ransomware outbreak. "I hope that if another attack occurs, the damage will be a lot less".
"Ransomware developers and attackers tend to borrow, copy and steal techniques and software from each other", he said.
But individuals with PCs running Windows should still take a few precautions.
Businesses and large organizations are mostly at risk of this attack because of a flaw in a Windows protocol that many businesses use to share files.
MalwareTech, who wants to remain anonymous, was hailed as an "accidental hero" after registering a domain name to track the spread of the virus, which actually ended up halting it. System administrators should ensure that employees don't have unnecessary access to parts of the network that aren't critical to their work. Equally, if you open a document and it asks to run macros, just say no.
Authorities have been encouraging affected companies to contact law enforcement and not pay the ransom.
What's more, the ransomware is quite versatile and easy to modify, which makes any countermeasures that companies can come up next to useless.
However, the creators behind "WannaCry" have quickly evolved around this domain-based kill switch and altered their code to remove the somewhat freakish error and restart their ransomware campaign.
"If there is a silver lining to it, you're not out a million dollars", he said.