Home » Blog » malware

Category: malware

mac malware

Apple devices and Macs get malware!!

I don’t like picking on Macs… Oh, wait. That is a lie. I do like picking on Macs because I am tired of hearing “Apple’s don’t get viruses or malware.” This absolutely not true!

There hasn’t been a serious ransomware outbreak on Mac but that doesn’t mean isn’t coming. There are a few ransomware programs in the wild and there has been increased activity in the mac security sector just like there has been in the PC world. Other malware and scam software are out there and on the rise.  “Our tracking of Mac malware has seen a more than 220 percent increase in malware so far in 2017 over 2016,” said Malwarebytes. The main reason that Mac desktops and laptops seem to not be affected is that they only are about 7% of computer users. They are a much small target so there are less malicious programs out there. That doesn’t mean they don’t exist. They will still steal your data if they can. WIth RaaS (Ransomware as a Service) and cross-platform malware, it is becoming easier for the bad guys to target whatever they want. They don’t even have to be proficient at programming anymore. And with an attitude like “we don’t get malware,” you might be easy pickings.

Beyond that, you are also just as likely to lose your online data as a PC user! Just because you are browsing the internet from your Mac doesn’t mean things like the Yahoo and Equifax data breaches will not affect you. You still need to be vigilant in the cloud and protect your personal information.

Protect you and your Mac

  • Backup your data – Onsite, Offsite and Cloud
  • Keep your software and OS up to date
  • Don’t use unapproved software
  • Use an extra anti-malware solution
  • Be wary of unknown websites and unsolicited email
  • Use strong password and 2fa (Two-factor authentication) wherever you can
  • Use a standard account over an admin account for everyday use
  • If you have a laptop, consider full disk encryption

We offer backup, monitoring, and antimalware solutions if you use Apple products in your business. Let us know how we can help!


How Much Could A Ransomware Attack Cost You?

Have you ever thought about how much your data is worth? Information is possibly the most valuable part of your business – there’s your client database, accounting software and inventory management, and of course, any intellectual property you may own. When the ransomware, WannaCry, tore through the world recently, many businesses were suddenly forced to re-assess the value of their data: was it worth saving, and what would be the deeper cost of the attack?

Most ransomware attacks cost $150-$600 to get your files released, but that’s only IF the cyber-criminals honor the payment and actually give you the decryption key. Meanwhile, new client calls are still coming in and you may find yourself unable to operate with your systems down. Paying the ransom or restoring from an unaffected backup seems like a quick fix, but it doesn’t end there. There’s still the downtime involved to restore all your data – possibly days – and that’s a lot of lost productivity. Plus, if word gets out that your data has been compromised, you may find confidence in your business plummets and your existing clients head elsewhere. That $150 ransom may end up costing well over $150,000!

Prevent Ransomware Attacks on your Business

Keep your systems up to date: WannaCry took advantage of a flaw in older versions of Windows, one that was since patched by Microsoft. But to be protected, businesses had to be up to date with their patches AND be running a supported version of Windows. Delaying patches and updates puts your business at risk – we can help you update automatically.

Lock down employee computers: Very few staff will require full administrator access to your business network. The higher their level of permissions, the more damage a person can do – either accidentally with a whoopsie click, or by inadvertently installing malware. By locking down your employee computers, you have a better chance of containing a malware attack to non-vital systems. Our experts can design an access management plan that gives you best of both worlds: flexibility PLUS security.

Educate your workplace: Most employees believe they’re being cyber-safe but the reality is quite different. Many malicious links and embedded malware have become hard to spot in an instant – which is all it takes to click and regret. We can work with your staff to establish procedures around checking links for authenticity before clicking, awareness around verifying the source of attachments, and the importance of anti-virus scanning. We’ll help get the message through!

Have a solid backup plan: When ransomware hits, a connected backup = infected backup. Unfortunately, synced options such as Dropbox immediately clone the infected files, rendering them useless. The only safe backups will be the ones both physically and electronically disconnected, with systems designed to protect against attacks like this. Our experts can set you up with a backup system that makes recovery a breeze.

Be proactive: The best way to avoid the financial cost of a ransomware attack is to prevent it from happening in the first place. Remember, many businesses were able to watch WannaCry from the sidelines, completely unaffected and seizing opportunities while their competitors were down.

Our managed services can help protect your business against the next cyber-attack.

Call us today!

Windows Updates

Why Your Windows Updates Are More Important Than Ever

Stories about hackers and virus attacks seem to be making the news almost every day, and many of these news stories include tips on how you can avoid becoming a victim. One common theme among these tips is making sure your Windows operating system up to date.

Every day hackers are trying to figure out new ways to break into Microsoft Windows and once they do find a weakness, they try and find a way to spread it. This could be through a malicious email attachment or even something that spreads without your involvement.

Updates Explained

Whenever Microsoft discovers a potential flaw, they push out a small piece of software to all Windows computers running a supported version. If set correctly, your computer will check if there’s any updates or patches and install them automatically. In new versions, this usually happens when you’re shutting down or starting up, and doesn’t impact your experience at all. Unfortunately, some users will manually disable or delay their updates, creating a risky situation.

The update may include security patches, drivers or a simple tweak to address bugs or issues with Windows. Sometimes, they even include new features or applications to improve the stability of your operating system. They’re a good thing!

Not All Versions Get Updates

Some older operating systems are no longer supported, which means unless there are extenuating circumstances, Microsoft won’t issue any new updates. Not a single one – generally, if cyber criminals discover a flaw after support ends, they’re free to exploit it. For example, Windows XP support ended in 2014, and Windows Vista just ended in April this year. The moment an operating system is retired it becomes a playground for cyber-criminals.

It’s not just Microsoft walking away from these old versions either. Third party software like the Google Chrome browser will still work, but they’ve also stopped supporting old versions with crucial updates and patches. It might seem like everything is working fine because your anti-virus isn’t pinging in alarm, but it just becomes a case of risk, upon risk, upon risk.

What to do with older Windows

As much as you’re comfortable with your older version of Windows, each time you boot up you’re exposing your system, important files and entire network. It only takes one weak entry point in the chain to allow malware into all connected devices. That could mean your photo storage, media center or even smart appliances. It’s not worth it – if you’re running Windows XP or Vista (or older), you need to update to a more modern operating system ASAP. Give us a call to upgrade your computer.

We can also monitor your system remotely and apply your Windows updates with our Managed Services packages, ensuring you are always up to date and protected. Give us a call Today!

WannaCry Ransomware Explained: Is Your Business At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning.

Among the most prominent victims were many NHS hospitals in the UK, affecting up to 70,000 individual devices such as essential MRI scanners and blood-storage refrigerators. But by the time it hit the news, it was too late – either your system was protected, or it was infected. Here’s how it all went so wrong.

What is WannaCry?

The WannaCry cyber-attack was a type of malware (the collective name for computer viruses & bad juju) called ‘ransomware’. Just like the name suggests, it’s actually a demand for money. Like all ransomware attacks, WannaCry encrypts your files and holds them hostage until you pay. In this case, the price was set at $300, payable with internet currency Bitcoin, and you had 3 days to pay before it doubled. If you didn’t pay, the ransomware threatened to delete your files permanently. It’s yet unknown how much money the WannaCry hackers have earned with their latest attack, but you can be sure plenty of people have paid the ransom. Even the FBI recommends paying the ransom, especially if the ransomed files are of a sensitive nature or weren’t backed up.

How It Spread So Fast

It seems WannaCry may be a ‘computer worm’ that self-replicates and spreads, rather than a phishing attack that needs to be activated with a click. So far, no common trigger has been identified, as is normally the case with phishing links. WannaCry moved rapidly from system to system, spreading out through the entire network, including all connected backups and storage devices. At the same time, it spread out to infect other networks, who then spread it further, and so on. Given the nature of the internet, it was everywhere within hours.

Why Some Businesses Were Safe

WannaCry could ONLY infect systems that have fallen 2 months behind in their Windows updates. This is because it was created to take advantage of a specific vulnerability in Windows, one which Microsoft patched months ago. Without that patch, the ransomware could waltz right past the firewall, past the anti-virus and directly into the system (the NHS were reportedly running Windows XP – no longer supported). Those running Windows 10 or a fully patched, recent version of Windows were completely unaffected – the virus literally had no way in

It just goes to show the importance of staying up to date. We haven’t seen a second spike in WannaCry attacks yet, but that doesn’t mean there won’t be one. A quick update could protect your business from weeks of downtime and lost revenue, making attacks like this a non-issue.

With our managed services, we can make sure you stay up to date – and protected. Give us a call today at 570-779-4018.

Ransomware and You – Protect Your Business

In case you did not know, there were multiple large scale ransomware attacks Friday afternoon (5/12/17). One of the main reasons the ransomware spread was due to unpatched operating systems. Microsoft had released a critical patch in March that addressed the known vulnerability. The moral of the story is, there are things that you can do to protect yourself.

What you probably didn’t read about was the small business that spent all of Mother’s day weekend trying to recover or maybe they paid the ransom that couldn’t afford to pay. These are the business that are hurt the most. These large companies generally have the resources to recover.

Protect Your Business

  1. Backup! – You need to have an offsite and onsite backup system in place. If you use cloud services, you need to backup that data as well. File syncing services are not immune to ransomware. If you files are data are mission critical to your business, you may want to consider investing in DRaaS (disaster recovery as a service) which can get you back up and running in a short time.
  2. Patch! – Make sure all your systems and devices are up to date. Most malware and ransomware take advantage of known vulnerabilities. If you are using old or outdated software, consider upgrading to a maintained version. For example, Windows XP systems no longer receive updates.
  3. Be 110% sure before you open attachments – Many of the malicious programs spread via email attachments. If you don’t know who it is, don’t open it. Do not follow unsolicited links. If you have any doubt at all, contact the sender to make sure they really sent you a file.
  4. Use a multi-tier defense system – Make sure all your systems are updated and active endpoint protection. PCs, phones, tablets, file servers, etc. Everything that has access to your network should be monitored. Use a mail scanning product to remove spam and malicious email even if you use an online service. These systems offer a second line of defense and cause little to no performance loss. Do not use a consumer class router in your business class network. The same goes for wireless systems. There are many products available at affordable prices that add additional protection and performance to your network.


We offer multi-tier defense, anti-malware, backup services, and system monitoring services. Stop trying to do it all yourself! If you need help maintaining your systems please call us to set up an appointment. (570) 779-4018

Spring Cleaning For Your Computers!

Spring is in the air here in NEPA! April is right around the corner. It is starting to warm up. You can feel the power of the spring sun. I can’t wait until it is in full swing so we can open the windows and breath the fresh air. However, before that happens, you should take care of all your computer issues so that you aren’t stuck inside recovering from computer system problems!


Spring Cleaning For Your Computer Systems!

When was the last time your computers were physically cleaned inside? Dirt and dust can accumulate on fans and filters causing poor circulation and increased the average temperature inside the computer and laptop case. Heat is the enemy of computers. It can cause odd issues like the PC acting peculiar, programs closing unexpectedly, slow performance, and shorten the life of your computer hardware. It is one of the main causes of unexpected computer system failure.

How about the system software and Windows or Mac OS (operating system)? When was the last time you had a thorough checkup? You need to keep your PCs and servers up to date so that security holes can not be exploited. Reviewing your current security system to find out if there are any more steps you need to take is a great idea as well.

Does your network or wireless need any firmware patches, system updates? Or maybe it is time to consider an upgrade due to aging equipment.

Our Spring Cleaning Service

  • Internal Cleaning – Remove dirt and dust from filters, fans, and physical surfaces
  • System Update – Patch the windows or mac OS to the latest version
  • Software Update – Patch all software to the latest version
  • Security – Make sure your security system is up to date and working properly and review possible network security holes
  • Network and Wireless – Update to the last software and firmware and review for possible hardware upgrades
  • Battery Backup – Verify they are working properly and replace if needed
  • Software Backup – Verify your backup software is working, up to date, and review your disaster recovery plan
  • Storage Needs – Review the data and programs that you still use and remove the ones you don’t

Each customer is unique so the cost will depend on your system size and configuration. Please call (570) 779-4018 for a free estimate.

Our pricing information can be found on our service pages.

Take 20% OFF Spring Cleaning until April 7th!

Call (570) 779-4018 to schedule an appointment before they are all taken!

Spring Cleaning! Time to freshen up your computers!
Spring is on the way!! Our soon to be Tech deep in thought.

You can afford security in your business!

I hear it all the time. We are only 5 users. I can’t afford security. Why would someone try to hack into our firm? What we have works just fine.

Hopefully, you have never had to rely on your home or car insurance but there is a reason for it. Think of taking steps protect yourself from cyber criminals as insurance. It is MUCH more expensive to recover from an attack. Beyond the time spent for a professional to help you or paying the ransom, you may be liable for your employees and customers data.

You need security

You need security to protect you, your clients and your business.

The trend of malware being directly targeted at small business continues to grow. 2016 was the year of ransomware and 2017 is shaping up to be worse. Small business has the most to loose. You are the most likely to pay. You are becoming their favorite target.

You can do something about it!

Here is a sample quote for a five user single location office with a local file server. This assumes that there is a basic network, PCs and a server in place.

Some of the items in the list could be optional depending on your current office configuration.

pfSense® Security Appliance $225.00
Wireless Access Port AC $130.00
8 port “smart” switch $70.00
Miscelanous patch cables and parts $50.00
Install and security configuration $500.00
Total $975.00

Opt in for our Gold level service for $50 a month per workstation and $150 a month per server and receive:

  • 24/7 Network Monitoring
  • Daily Backup Monitoring
  • Patch Managment (Your systems, router, and programs always up to date)
  • Year-End Technology Review
  • Monthly Audit and Tune Up
  • Endpoint Software Included (Anti-virus and Anti-malware)
  • Cloud File Backup up to 250 GB
  • 4 hour Guaranteed Response
  • Next Business Day Guaranteed On-site
  • Hourly rate reduced 20%


This configuration would last years and you gain the following:

  • High-speed secure wireless with expandable coverage and a secure guest wireless and captive portal option
  • High-speed VOIP (Voice over IP) friendly router and firewall that is much faster, flexible and expandable than a consumer class option
  • Snort IPS/IDS (Intrusion Protection/Intrusion Detection) that can be custom configured
  • Multi-level malicious website protection and website content control
  • Endpoint Security from Avast and AVG
  • Easy to configure site-to-site and remote VPN configuration so you can access your files from home

This is just an example. Depending on your demands and how secure you want to be, we may need to modify this to fit your requirements.

Give us a call at 570-779-4018 to discuss your options!


Ransomware: It is not just a scare tactic

It is not just a scare tactic, and it is not going away

Ransomware activity continues to rise, and it doesn’t appear to be slowing down for 2017. In 2016 it spiked by 6000%, and it is on track to be a 1 billion dollar a year “business.” IBM study.

Software teams are building ransomware kits to sell on the Dark Web. RaaS (Ransomware as a service!) is a thing. This means there are illegal companies making money from designing kits to build ransomware. So, not only are criminals making money from ransomware, the distributors don’t even have to be good at programming or hacking to do it. There is enough of a demand that a small team of programmers is making money from selling the software to commit the crime. It is also making it extremely hard for old fashion virus scanners to catch the activity because each criminal is adding their own twist.

How it happens

  • Phishing email
  • user clicks on link or attachment
  • ransomware makes contact
  • C&C server generates & retrieves an encryption key
  • ransomware scans infected a machine, looking for files
  • ransom demand
  • connects to other machines and infects them
  • ransomware builds an inventory of encrypted files
  • scan other machines over the network

Business Targeting

It used to be consumers or simplistic shotgunning techniques. Now there is more and more direct targeting. Business targets make sense to the bad guys. Consumers or individuals might just start from scratch, but businesses are more likely to pay a ransom. It is much more lucrative form them to target small business.


Spearphishing is direct targeting your personal account using techniques to fool you into trusting the source. The criminal could use social media sites to gather information. The email may be crafted specifically for you and may even look like it comes from a person you know. One click is all it takes. And it isn’t just email anymore. Messaging, texting, and other apps can lead to infection.



What do you do about it?

Backup! Backup! Backup!

Step number one should be making sure your backup is up to date and ready to be restored. One “newer” option is DRaaS (disaster recovery as a service) but even a simple disk backup is better than nothing. Regardless, you need to spend time analyzing your current setup and determining if you need to take further steps to protect your data. If you have multiple, granular, safe and secure backups and can restore your data, you don’t have to pay the ransom.


Keep your devices and systems on the latest version and patches. This should include firmware. Less exploitable software and devices mean that if you do get infected, it is less likely to spread.

Endpoint Protection!

Yes, you still need endpoint protection. While signature based isn’t what it used to be, companies are making strides and it is still worthwhile. You should look for something with anti-malware, anti-ransomware, and anti-exploit features. And you should protect all your devices: Mobile, desktops, laptops, physical and virtual servers.

Network/Gateway Security 

This should include some type of email protection even if you are using an outside source (Gmail, Office 365, Hosted solution) to host your email. You should also have a firewall with a strong IPS/IDS (intrusion protection system/intrusion detection system). Use VPNs whenever possible. This includes cloud and virtual. Do not make the mistake of assuming that these technologies make your network safer.

Also, please do not use a consumer class gateway/firewall. And if you insist on using one, change the default password!

Establish a Security Policy

This one may sound simple but it is possibly the most important and hardest to implement. You need to train your users. You need to train yourself. You need to have plans in place in case something does happen.

Ransomware: It's is not just a scare tactic
Ransomware: It is not just a scare tactic

Small Business Cyber Security

Small Business Security on your mind?

It is always a good time for a security review. Particularly if you deal with sensitive client data.  Did you know that you could be liable for a data breach? Taking reasonable steps to secure you and your customers data is the right thing to do!

Let us help you make sure all your Tablets, PCs, Servers, and Networks are secure and up to date. Is your network and wireless equipment old? Are you using consumer class equipment? Are you using free anti-malware software? We can help you make an affordable upgrade plan. 

Need next gen security to protect your business?

We are authorized Sophos partners. We can help you move to the next generation of malware and virus protection. Sophos is perfect for small to medium businesses, schools and nonprofit organizations. Don't try to use the consumer level router to protect your vital system. Get secure today!

Need security but can't afford Sophos?

Our alternative solutions offer good security at great prices. Everyone needs to stay secure. Even if you are small business, you can afford to be secure. Ask us about our PFSense solution!