Home » Blog » malware

Tag: malware

mac malware

Apple devices and Macs get malware!!

I don’t like picking on Macs… Oh, wait. That is a lie. I do like picking on Macs because I am tired of hearing “Apple’s don’t get viruses or malware.” This absolutely not true!

There hasn’t been a serious ransomware outbreak on Mac but that doesn’t mean isn’t coming. There are a few ransomware programs in the wild and there has been increased activity in the mac security sector just like there has been in the PC world. Other malware and scam software are out there and on the rise.  “Our tracking of Mac malware has seen a more than 220 percent increase in malware so far in 2017 over 2016,” said Malwarebytes. The main reason that Mac desktops and laptops seem to not be affected is that they only are about 7% of computer users. They are a much small target so there are less malicious programs out there. That doesn’t mean they don’t exist. They will still steal your data if they can. WIth RaaS (Ransomware as a Service) and cross-platform malware, it is becoming easier for the bad guys to target whatever they want. They don’t even have to be proficient at programming anymore. And with an attitude like “we don’t get malware,” you might be easy pickings.

Beyond that, you are also just as likely to lose your online data as a PC user! Just because you are browsing the internet from your Mac doesn’t mean things like the Yahoo and Equifax data breaches will not affect you. You still need to be vigilant in the cloud and protect your personal information.

Protect you and your Mac

  • Backup your data – Onsite, Offsite and Cloud
  • Keep your software and OS up to date
  • Don’t use unapproved software
  • Use an extra anti-malware solution
  • Be wary of unknown websites and unsolicited email
  • Use strong password and 2fa (Two-factor authentication) wherever you can
  • Use a standard account over an admin account for everyday use
  • If you have a laptop, consider full disk encryption

We offer backup, monitoring, and antimalware solutions if you use Apple products in your business. Let us know how we can help!

6 Brilliant Ways Managed Services Can Work For You

Wouldn’t it be great to know you could access the internet from every room in the house – including the outdoor entertaining areas? How about printing wirelessly from wherever you happen to be? Many homes are embracing the flexibility of having multiple devices and users, but with each new addition come increased headaches when trying to make it all work together. They know what experience they want, but actually assembling a complex network can be like trying to juggle a live, angry octopus!

Most people don’t realize just how complex their tech setup has become. Ask around and you’ll discover homes commonly have 4 mobile devices, 2 tablets, a desktop or laptop, a printer…plus a smart TV, media streamer, and a games console …ALL of which need access to the same secure internet connection, backup systems, and protection from digital threats. Yikes!

While businesses immediately default to calling in the tech experts to make sure their system works exactly the way they need it to, residential users haven’t had that option – until now. Our managed IT services can assess your unique needs and create the perfect solution for you –everything working the way you want and within budget.

Using managed residential services has the added benefit of providing one, predictable bill for every part of your technology services, including:

Advice and setup: Our experts love to talk tech and can help you make product decisions, plan and create your ideal network environment – building in all the parental controls and security your unique situation needs. They’ll even help educate your family on best practices, cyber safety, and common threats.

Remote support: Save time and energy if something goes wrong, our experts can securely log in to remotely diagnose and repair many issues – just let us know and we’ll take care of it.

Backup: You’ll never have to worry about losing all your personal files, photos, video and music if your device is broken or stolen. Our experts will make sure everything that’s important to you is backed up regularly.

Maintenance: While your devices are pretty durable, they still need regular maintenance and cleaning. This extends the life of your device greatly and has the added benefit of making it run like new again.

Security: Every device under your managed IT plan will be automatically monitored for security issues and updated regularly. Our tech experts will ensure your network is secure, protecting you and your family on autopilot.

Cloud: We’ll make sure you have access to all your files, no matter which device you’re on, giving you true digital flexibility and (a safeguard against forgetting homework!).

With new connected devices finding their way into homes each year, it’s more important than ever to ensure your network can grow easily, with security at all levels. Remember, it only takes one unprotected device to let the malware in, even something as innocent as a remote-activated lightbulb! Our managed IT services will free you from worrying about security and maintenance, while at the same time giving you the performance and flexibility your family needs.

Find out how Managed IT Services can help you by calling us today!

Ransomware

How Much Could A Ransomware Attack Cost You?

Have you ever thought about how much your data is worth? Information is possibly the most valuable part of your business – there’s your client database, accounting software and inventory management, and of course, any intellectual property you may own. When the ransomware, WannaCry, tore through the world recently, many businesses were suddenly forced to re-assess the value of their data: was it worth saving, and what would be the deeper cost of the attack?

Most ransomware attacks cost $150-$600 to get your files released, but that’s only IF the cyber-criminals honor the payment and actually give you the decryption key. Meanwhile, new client calls are still coming in and you may find yourself unable to operate with your systems down. Paying the ransom or restoring from an unaffected backup seems like a quick fix, but it doesn’t end there. There’s still the downtime involved to restore all your data – possibly days – and that’s a lot of lost productivity. Plus, if word gets out that your data has been compromised, you may find confidence in your business plummets and your existing clients head elsewhere. That $150 ransom may end up costing well over $150,000!

Prevent Ransomware Attacks on your Business

Keep your systems up to date: WannaCry took advantage of a flaw in older versions of Windows, one that was since patched by Microsoft. But to be protected, businesses had to be up to date with their patches AND be running a supported version of Windows. Delaying patches and updates puts your business at risk – we can help you update automatically.

Lock down employee computers: Very few staff will require full administrator access to your business network. The higher their level of permissions, the more damage a person can do – either accidentally with a whoopsie click, or by inadvertently installing malware. By locking down your employee computers, you have a better chance of containing a malware attack to non-vital systems. Our experts can design an access management plan that gives you best of both worlds: flexibility PLUS security.

Educate your workplace: Most employees believe they’re being cyber-safe but the reality is quite different. Many malicious links and embedded malware have become hard to spot in an instant – which is all it takes to click and regret. We can work with your staff to establish procedures around checking links for authenticity before clicking, awareness around verifying the source of attachments, and the importance of anti-virus scanning. We’ll help get the message through!

Have a solid backup plan: When ransomware hits, a connected backup = infected backup. Unfortunately, synced options such as Dropbox immediately clone the infected files, rendering them useless. The only safe backups will be the ones both physically and electronically disconnected, with systems designed to protect against attacks like this. Our experts can set you up with a backup system that makes recovery a breeze.

Be proactive: The best way to avoid the financial cost of a ransomware attack is to prevent it from happening in the first place. Remember, many businesses were able to watch WannaCry from the sidelines, completely unaffected and seizing opportunities while their competitors were down.

Our managed services can help protect your business against the next cyber-attack.

Call us today!

Windows Updates

Why Your Windows Updates Are More Important Than Ever

Stories about hackers and virus attacks seem to be making the news almost every day, and many of these news stories include tips on how you can avoid becoming a victim. One common theme among these tips is making sure your Windows operating system up to date.

Every day hackers are trying to figure out new ways to break into Microsoft Windows and once they do find a weakness, they try and find a way to spread it. This could be through a malicious email attachment or even something that spreads without your involvement.

Updates Explained

Whenever Microsoft discovers a potential flaw, they push out a small piece of software to all Windows computers running a supported version. If set correctly, your computer will check if there’s any updates or patches and install them automatically. In new versions, this usually happens when you’re shutting down or starting up, and doesn’t impact your experience at all. Unfortunately, some users will manually disable or delay their updates, creating a risky situation.

The update may include security patches, drivers or a simple tweak to address bugs or issues with Windows. Sometimes, they even include new features or applications to improve the stability of your operating system. They’re a good thing!

Not All Versions Get Updates

Some older operating systems are no longer supported, which means unless there are extenuating circumstances, Microsoft won’t issue any new updates. Not a single one – generally, if cyber criminals discover a flaw after support ends, they’re free to exploit it. For example, Windows XP support ended in 2014, and Windows Vista just ended in April this year. The moment an operating system is retired it becomes a playground for cyber-criminals.

It’s not just Microsoft walking away from these old versions either. Third party software like the Google Chrome browser will still work, but they’ve also stopped supporting old versions with crucial updates and patches. It might seem like everything is working fine because your anti-virus isn’t pinging in alarm, but it just becomes a case of risk, upon risk, upon risk.

What to do with older Windows

As much as you’re comfortable with your older version of Windows, each time you boot up you’re exposing your system, important files and entire network. It only takes one weak entry point in the chain to allow malware into all connected devices. That could mean your photo storage, media center or even smart appliances. It’s not worth it – if you’re running Windows XP or Vista (or older), you need to update to a more modern operating system ASAP. Give us a call to upgrade your computer.

We can also monitor your system remotely and apply your Windows updates with our Managed Services packages, ensuring you are always up to date and protected. Give us a call Today!

WannaCry Ransomware Explained: Is Your Business At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning.

Among the most prominent victims were many NHS hospitals in the UK, affecting up to 70,000 individual devices such as essential MRI scanners and blood-storage refrigerators. But by the time it hit the news, it was too late – either your system was protected, or it was infected. Here’s how it all went so wrong.

What is WannaCry?

The WannaCry cyber-attack was a type of malware (the collective name for computer viruses & bad juju) called ‘ransomware’. Just like the name suggests, it’s actually a demand for money. Like all ransomware attacks, WannaCry encrypts your files and holds them hostage until you pay. In this case, the price was set at $300, payable with internet currency Bitcoin, and you had 3 days to pay before it doubled. If you didn’t pay, the ransomware threatened to delete your files permanently. It’s yet unknown how much money the WannaCry hackers have earned with their latest attack, but you can be sure plenty of people have paid the ransom. Even the FBI recommends paying the ransom, especially if the ransomed files are of a sensitive nature or weren’t backed up.

How It Spread So Fast

It seems WannaCry may be a ‘computer worm’ that self-replicates and spreads, rather than a phishing attack that needs to be activated with a click. So far, no common trigger has been identified, as is normally the case with phishing links. WannaCry moved rapidly from system to system, spreading out through the entire network, including all connected backups and storage devices. At the same time, it spread out to infect other networks, who then spread it further, and so on. Given the nature of the internet, it was everywhere within hours.

Why Some Businesses Were Safe

WannaCry could ONLY infect systems that have fallen 2 months behind in their Windows updates. This is because it was created to take advantage of a specific vulnerability in Windows, one which Microsoft patched months ago. Without that patch, the ransomware could waltz right past the firewall, past the anti-virus and directly into the system (the NHS were reportedly running Windows XP – no longer supported). Those running Windows 10 or a fully patched, recent version of Windows were completely unaffected – the virus literally had no way in

It just goes to show the importance of staying up to date. We haven’t seen a second spike in WannaCry attacks yet, but that doesn’t mean there won’t be one. A quick update could protect your business from weeks of downtime and lost revenue, making attacks like this a non-issue.

With our managed services, we can make sure you stay up to date – and protected. Give us a call today at 570-779-4018.

AntiSpam Filtering

4 Important Reasons to Use Anti-Spam Filtering in your Business

Remember when spam was obvious, and unless you desperately needed a special blue pill, it was easy to identify and ignore? Those were the days! The impact on your business would have been minimal, as spam was more an annoyance than anything else. Unfortunately, spam has matured into an aggressive threat, marked by sophisticated attacks and rapidly evolving techniques. It’s not just random electronic junk mail anymore and it’s putting a costly strain on your business resources.

How Spam Impacts Your Business

Spam now contains malware, with hackers sending cleverly disguised emails to your business. Once clicked by an employee, it infects your computer system (virus) or steals your private data (phishing). The malware can then spread across the entire computer network and beyond, including to your clients and vendors. The very fact that your employees must pause and examine every single link and attachment adds hours of lost productivity. Occasionally, spam is so convincing that only an expert would be able to visually identify it. Employees are also more likely to miss an important email, either not seeing it arrive at the same time as a spam attack or becoming overwhelmed with the sheer number of emails.

How Anti-Spam Can Save Your Business

  1. Block threats: The spam filter’s purpose is to block the spam from ever reaching your employees’ screens. The threat is automatically identified and either held securely or immediately deleted. This is the best way to avoid activating spam malware, as it’s so easy to click through links in an email that seems authentic and important. The effects of that one spam click may be instantaneous or may lie hidden for months. Removing the email before it becomes a risk is a much better option.
  2. Filter legitimate emails: Real mail needs to be able to stand out and avoid the trash. Anti-spam filtering has sophisticated recognition abilities which block spam only and allow real mail to land safely in mailboxes.
  3. Meet data regulations: Many businesses are subject to strict privacy and data storage regulations, some more so than others. To continue operation, they have to meet conditions including always using spam filtering to reduce the risk of data breach.
  4. Protect your business reputation: You can see how uncomfortable CEOs are when they hold press conferences to admit a breach. They must acknowledge that they failed to protect client data, or that users may be infected with a virus. Not only do they then face financial loss, their business reputation takes a nosedive. Anti-spam filtering can ensure these types of scenarios don’t happen to you.

Filtering has come a long way in recent years, with complex algorithms identifying and catching spam before it becomes a risk to your business. Real emails can now pass safely through without the classic catch cry of ‘check the spam folder’, and businesses can work with greater productivity and safety than ever before. You need email, but you definitely don’t need spam or the chaos it brings to your business.

We can block spam and keep your legitimate emails flowing. Call us at 570-779-4018 today!

You can afford security in your business!

I hear it all the time. We are only 5 users. I can’t afford security. Why would someone try to hack into our firm? What we have works just fine.

Hopefully, you have never had to rely on your home or car insurance but there is a reason for it. Think of taking steps protect yourself from cyber criminals as insurance. It is MUCH more expensive to recover from an attack. Beyond the time spent for a professional to help you or paying the ransom, you may be liable for your employees and customers data.

You need security

You need security to protect you, your clients and your business.

The trend of malware being directly targeted at small business continues to grow. 2016 was the year of ransomware and 2017 is shaping up to be worse. Small business has the most to loose. You are the most likely to pay. You are becoming their favorite target.

You can do something about it!

Here is a sample quote for a five user single location office with a local file server. This assumes that there is a basic network, PCs and a server in place.

Some of the items in the list could be optional depending on your current office configuration.

pfSense® Security Appliance $225.00
Wireless Access Port AC $130.00
8 port “smart” switch $70.00
Miscelanous patch cables and parts $50.00
Install and security configuration $500.00
Total $975.00

Opt in for our Gold level service for $50 a month per workstation and $150 a month per server and receive:

  • 24/7 Network Monitoring
  • Daily Backup Monitoring
  • Patch Managment (Your systems, router, and programs always up to date)
  • Year-End Technology Review
  • Monthly Audit and Tune Up
  • Endpoint Software Included (Anti-virus and Anti-malware)
  • Cloud File Backup up to 250 GB
  • 4 hour Guaranteed Response
  • Next Business Day Guaranteed On-site
  • Hourly rate reduced 20%

 

This configuration would last years and you gain the following:

  • High-speed secure wireless with expandable coverage and a secure guest wireless and captive portal option
  • High-speed VOIP (Voice over IP) friendly router and firewall that is much faster, flexible and expandable than a consumer class option
  • Snort IPS/IDS (Intrusion Protection/Intrusion Detection) that can be custom configured
  • Multi-level malicious website protection and website content control
  • Endpoint Security from Avast and AVG
  • Easy to configure site-to-site and remote VPN configuration so you can access your files from home

This is just an example. Depending on your demands and how secure you want to be, we may need to modify this to fit your requirements.

Give us a call at 570-779-4018 to discuss your options!

 

Ransomware: It is not just a scare tactic

It is not just a scare tactic, and it is not going away

Ransomware activity continues to rise, and it doesn’t appear to be slowing down for 2017. In 2016 it spiked by 6000%, and it is on track to be a 1 billion dollar a year “business.” IBM study.

Software teams are building ransomware kits to sell on the Dark Web. RaaS (Ransomware as a service!) is a thing. This means there are illegal companies making money from designing kits to build ransomware. So, not only are criminals making money from ransomware, the distributors don’t even have to be good at programming or hacking to do it. There is enough of a demand that a small team of programmers is making money from selling the software to commit the crime. It is also making it extremely hard for old fashion virus scanners to catch the activity because each criminal is adding their own twist.

How it happens

  • Phishing email
  • user clicks on link or attachment
  • ransomware makes contact
  • C&C server generates & retrieves an encryption key
  • ransomware scans infected a machine, looking for files
  • ransom demand
  • connects to other machines and infects them
  • ransomware builds an inventory of encrypted files
  • scan other machines over the network

Business Targeting

It used to be consumers or simplistic shotgunning techniques. Now there is more and more direct targeting. Business targets make sense to the bad guys. Consumers or individuals might just start from scratch, but businesses are more likely to pay a ransom. It is much more lucrative form them to target small business.

Spearphishing

Spearphishing is direct targeting your personal account using techniques to fool you into trusting the source. The criminal could use social media sites to gather information. The email may be crafted specifically for you and may even look like it comes from a person you know. One click is all it takes. And it isn’t just email anymore. Messaging, texting, and other apps can lead to infection.

 

 

What do you do about it?

Backup! Backup! Backup!

Step number one should be making sure your backup is up to date and ready to be restored. One “newer” option is DRaaS (disaster recovery as a service) but even a simple disk backup is better than nothing. Regardless, you need to spend time analyzing your current setup and determining if you need to take further steps to protect your data. If you have multiple, granular, safe and secure backups and can restore your data, you don’t have to pay the ransom.

Updates!

Keep your devices and systems on the latest version and patches. This should include firmware. Less exploitable software and devices mean that if you do get infected, it is less likely to spread.

Endpoint Protection!

Yes, you still need endpoint protection. While signature based isn’t what it used to be, companies are making strides and it is still worthwhile. You should look for something with anti-malware, anti-ransomware, and anti-exploit features. And you should protect all your devices: Mobile, desktops, laptops, physical and virtual servers.

Network/Gateway Security 

This should include some type of email protection even if you are using an outside source (Gmail, Office 365, Hosted solution) to host your email. You should also have a firewall with a strong IPS/IDS (intrusion protection system/intrusion detection system). Use VPNs whenever possible. This includes cloud and virtual. Do not make the mistake of assuming that these technologies make your network safer.

Also, please do not use a consumer class gateway/firewall. And if you insist on using one, change the default password!

Establish a Security Policy

This one may sound simple but it is possibly the most important and hardest to implement. You need to train your users. You need to train yourself. You need to have plans in place in case something does happen.

Ransomware: It's is not just a scare tactic
Ransomware: It is not just a scare tactic

Small Business Cyber Security

Small Business Security on your mind?

It is always a good time for a security review. Particularly if you deal with sensitive client data.  Did you know that you could be liable for a data breach? Taking reasonable steps to secure you and your customers data is the right thing to do!

Let us help you make sure all your Tablets, PCs, Servers, and Networks are secure and up to date. Is your network and wireless equipment old? Are you using consumer class equipment? Are you using free anti-malware software? We can help you make an affordable upgrade plan. 

Need next gen security to protect your business?

We are authorized Sophos partners. We can help you move to the next generation of malware and virus protection. Sophos is perfect for small to medium businesses, schools and nonprofit organizations. Don't try to use the consumer level router to protect your vital system. Get secure today!

Need security but can't afford Sophos?

Our alternative solutions offer good security at great prices. Everyone needs to stay secure. Even if you are small business, you can afford to be secure. Ask us about our PFSense solution!

Removing Viruses and Malware

Best offense is a strong defense

Stop using free antivirus software! You need to have a strong defensive system in place. If one of these bugs creeps into your system, it can cause all types of havoc. If you are a residential user, your personal data (documents, photos, etc.) is at risk. Even if you store most of your data in cloud applications, it is not safe.

Malware removal

Malware removalMalware removal can be a tricky thing. Sure you may be able to fix it yourself but how long will it take you? And at what cost to your sanity? We have years of experience removing all type of bugs from all different systems.  Let us take on the headache for you.

The definition of malware is very broad. It includes scareware, adware, trojans, spyware, viruses, ransomware. Some of these things are mostly harmless and just slow down your computer with ads and popups. Others are downright nasty and no matter what you try, they keep coming back. Some of the newer strains of malware lock down your important files (pictures, documents, databases, and more) and the only way to recover them is if you have a backup or pay the ransom.

Even well set up protection can still let some bugs in the system.  If you have some malware and need it gone, we can get rid of it for you and attempt to recover any lost data if possible.