Last week we made changes to our customer's Firewalls to disable this Zero Day vulnerability and protect our customers. In some cases it was simple, but in certain firewalls blocking one protocol outbound means moving away from the default outbound rules and doing it could be more complex. In either case, it amazes me, but perhaps it shouldn't, that these types of vulnerabilities are still in Windows Operating Systems. Microsoft promised to put in a fix, but as of Feb 14th, they have not yet made the patch available and even if they do, ensuring that all systems are patched typically doesn't happen right away, especially if it requires a reboot and the system is running processes that cannot be immediately interrupted.
Although the vulnerability is serious, exploiting it might be in the low probability area since it requires some social engineering to get someone to click on a link. However, with social media so ubiquitous, exploitation is easier than it has been in the past. I would recommend you read this article http://www.kb.cert.org/vuls/id/867968 from CERT, learn more and take action.
It is important to be extra vigilant to protect your data and your networks. If you need help, let us know.