Tens of thousands of ransomware attacks are targeting organizations around the world on Friday.
"This attack is a powerful reminder that information technology basics like keeping computers current and patched are a high responsibility for everyone, and it's something every top executive should support", he said.
"The growth rate of infected institutions on Monday has slowed significantly compared to the previous two days", said Chinese Internet security company Qihoo 360.
"All day long they analyse strains of computer viruses to see how they function" and find ways to stop them, said Mr Godier.
"The U.S.is still in a relatively good place - I don't want to jinx it", the department official says. The most important thing we can do right now is to be in touch with them, and to offer reassurance and guidance as appropriate. "They've been able to manage through it".
Businesses and networks across Asia are coping with the first wave of WannaCry during their workweek.
Friday's attack might prompt companies to reassess the balance. Links to the updates can be found in Microsoft's announcement.
Mr Godier said the British researcher worked closely with cyber security company Proofpoint expert Darien Huss over the weekend.
Energy giant PetroChina said payment systems at some petrol stations were hit although it had restored most of the systems. The attack was disrupting computers that run factories, banks, government agencies and transport systems in scores of countries, including Russia, Ukraine, Brazil, Spain, India and Japan, among others. "On China's most prestigious college campuses, students reported being locked out of their final papers". Spanish telecom company Telefónica was also hit with the ransomware. "However, Hitachi and others have mostly only reported loss of email and other secondary functionalities". Power utilities also reported problems.
(AP Photo/Matt Dunham). An exterior view shows the main entrance of St Bartholomew's Hospital, in London, one of the hospitals whose computer systems were affected by a cyberattack, Friday, May 12, 2017.
One such expert, Armand Buonanno, president and owner of CMIT Solutions of The Merrimack Valley in North Andover, called the scope of the WannaCry attack "unprecedented" on Monday.
French automaker Renault and its partner, Nissan, say their plants were hit by the attack, NBC reports.
It also said: "The recent attack is at an unprecedented level and will require a complex global investigation to identify the culprits".
The identity of whoever deployed the software remains unknown.
In a blog post, he said: "An equivalent scenario with conventional weapons would be the USA military having some of its Tomahawk missiles stolen". Security analysts have concluded the malware is spread through an exploit previously discovered by the NSA, which was embarrassingly leaked to the public through a mysterious group called Shadow Brokers.
"This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem", he said.
A security expert in England has been hailed as an "accidental hero" for quashing the spread of the initial version of the ransomware late Friday.
He said most people "are living an online life", and these agencies have a duty to protect their countries' citizens in that realm as well. And those fixes will do nothing for newer systems if they aren't installed. "The cat-and-mouse will likely continue until [someone] makes a larger change to the malware, removing the kill-switch functionality completely". As makers of anti-virus software release updates to block it, hackers deploy new variants to evade detection.
Microsoft has now released an update for Windows Defender to detect Ransom:Win32/WannaCrypt and recommends additional anti-malware software. Note this means that the backup can't be on your computer but should be in the cloud or on an external hard drive.
Keep all the software on your computer up-to-date. "Stay away from file extensions like ".exe", ".vbs" and ".scr".