ransomware | TechSolutions, Inc. Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation. Thu, 27 Apr 2023 03:41:21 +0000 en-US hourly 1 https://www.techsolutionsinc.com/wp-content/uploads/2020/05/favicon.png ransomware | TechSolutions, Inc. 32 32 Top IT security terms everyone should know https://www.techsolutionsinc.com/blog/top-it-security-terms-everyone-should-know/ https://www.techsolutionsinc.com/blog/top-it-security-terms-everyone-should-know/#respond Thu, 13 May 2021 00:00:07 +0000 https://www.techsolutionsinc.com/blog/top-it-security-terms-everyone-should-know/ It’s every business user’s responsibility to protect their computers and data from cyberattacks. The good news is that you don’t need to be an IT security expert to keep them safe. You can start increasing your knowledge by learning some of these basic cybersecurity terms. Malware For a long time, the phrase “computer virus” was […]

The post Top IT security terms everyone should know appeared first on TechSolutions, Inc..

]]>

It’s every business user’s responsibility to protect their computers and data from cyberattacks. The good news is that you don’t need to be an IT security expert to keep them safe. You can start increasing your knowledge by learning some of these basic cybersecurity terms.

Malware

For a long time, the phrase “computer virus” was misused to refer to every type of attack that intended to harm or hurt computers and networks. The more appropriate term for these harmful programs and files would be “malicious software” or “malware.” Whereas a virus is a specific type of malware that is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as malware.

Ransomware

Don’t let all other cyberthreats ending in -ware confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is “ransomware,” which is malware that encrypts valuable data until a ransom is paid.

Intrusion prevention system (IPS)

There are several ways to safeguard your network from malware, but an IPS is quickly becoming one of the nonnegotiables. An IPS sits inside your company’s firewall and looks for suspicious and malicious activity that can be halted before it can exploit or take advantage of a known vulnerability.

Social engineering

Not all types of malware rely solely on fancy computer programming. Experts agree that the majority of attacks require some form of “social engineering” to succeed. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or protected information. For cybercriminals, complicated software is totally unnecessary if they can just convince potential victims that they’re a security professional who needs the victims’ password to secure their account.

Phishing

Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of defrauding people using an app or a website that impersonates a trustworthy or often well-known business in an attempt to obtain confidential information. Just because you received an email that says it’s from the IRS doesn’t mean that it is. Don’t take such emails at face value — always verify the source, especially if the emails are requesting your sensitive data.

Antivirus

Antivirus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well-known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to fix the gap in security. However, if cyberattackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.

Patch

When software developers discover a security vulnerability in their programming, they usually release a small file to update and “patch” this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest malware.

Redundant data

When antivirus software, patches, and intrusion prevention fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.

Our cybersecurity professionals are always available to impart more in-depth knowledge of the many different kinds of cyberthreats. Get in touch with us today and find out how we can help you with your IT security woes.

Published with permission from TechAdvisory.org. Source.

The post Top IT security terms everyone should know appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/top-it-security-terms-everyone-should-know/feed/ 0
How to install Windows 10 on your laptop https://www.techsolutionsinc.com/blog/how-to-install-windows-10-on-your-laptop/ https://www.techsolutionsinc.com/blog/how-to-install-windows-10-on-your-laptop/#respond Thu, 18 Mar 2021 00:00:31 +0000 https://www.techsolutionsinc.com/blog/how-to-install-windows-10-on-your-laptop/ Unboxing a new Windows 10 laptop is exciting, but before you start using it, there are a few things you need to do. You can ask a technician for help in setting up your new device, but here are a few things you can do on your own. 1. Set up how your device checks […]

The post How to install Windows 10 on your laptop appeared first on TechSolutions, Inc..

]]>

Unboxing a new Windows 10 laptop is exciting, but before you start using it, there are a few things you need to do. You can ask a technician for help in setting up your new device, but here are a few things you can do on your own.

1. Set up how your device checks for updates

Your new laptop should check for updates automatically, but you can also do this manually. Just click the gear icon above the Start button to go to Settings, choose Update & Security > Windows Update, and then click Check for updates. You can also type “updates” into the search box and click Check for updates.

2. Choose a restore point

If something goes wrong with your laptop, you can save a lot of time if you have a restore point, which is a backup of your entire operating system. To set up a restore point, type “restore” into the search bar and click Create a restore point. You’ll be taken to the System Protection tab of the System Properties window.

From there, you can choose what you want to be included in the backup. Click the Configure button to apply your choices. Enable “Turn on system protection” if it’s not already on. You can choose how much disk space to reserve, usually no more than 2% or 3%.

3. Pick a power plan

If you want to prolong your laptop’s battery life, you can choose from Windows 10’s Power Saver, High Performance, and Balanced power plans. Type power plan in the search button and choose either “Edit power plan” or “Choose a power plan.” Choosing the Edit power plan option allows you to set when the laptop display will be automatically turned off and when to put it to sleep. When you pick “Choose a power plan,” it will take you to a page where you can create and customize your plan.

The default recommended plan is Balanced, but if you want to create your own, click on the “Create a power plan” option on the left part of the screen. You can choose from three options depending on how you plan to use your laptop: Balanced, Power Saver, and High Performance. After selecting your preferred plan, click on the Next button to set the display and sleep settings for your laptop. Once done, click on the Create button and you’re good to go.

4. App installation tolerance level

To restrict which apps can be installed on your laptop, go to Settings > Apps > Apps & features and choose whether to permit installations from only the Windows Store, any app installations (with a warning), or unrestricted app installations.

5. Remove bloatware

Vendors package new laptops with bundled apps and software, which are mostly unnecessary and unwanted programs called bloatware.

Windows 10 offers an easy way to see which apps are installed on your new laptop and a quick way to uninstall those you don’t need. Head to Settings > Apps > Apps & features and peruse the list. If you don’t want an app and are 100% certain that your computer doesn’t need it, click the Uninstall button.

6. Anti-ransomware

Ransomware is a form of malicious software (malware) that locks all your data until you pay a ransom to hackers.

To minimize the risk of ransomware attacks, type “Windows Security” into the search bar at the bottom of your screen, click it, and go to “Virus & threat protection”. Here, you’ll be able to enable a new option called “Controlled folder access,” which protects you against ransomware attacks. By default, the Desktop, Documents, Music, Pictures, and Videos folders are protected, but you can add other folders too.

There are myriad ways Windows 10 can be configured for optimization and security. This article barely scratches the surface of Window 10’s security and efficiency settings. Call us today for a quick chat with one of our Microsoft experts about taking your operating system to the next level.

Published with permission from TechAdvisory.org. Source.

The post How to install Windows 10 on your laptop appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/how-to-install-windows-10-on-your-laptop/feed/ 0
Here are some ransomware decryptor sites you should keep handy https://www.techsolutionsinc.com/blog/here-are-some-ransomware-decryptor-sites-you-should-keep-handy/ https://www.techsolutionsinc.com/blog/here-are-some-ransomware-decryptor-sites-you-should-keep-handy/#respond Tue, 16 Mar 2021 00:00:33 +0000 https://www.techsolutionsinc.com/blog/here-are-some-ransomware-decryptor-sites-you-should-keep-handy/ Ransomware is on the rise, but falling victim to one is not the end of the world. You can try some of these ransomware decryptors and maybe one of them will work. These are especially useful against automated “zombie” ransomware types. The state of ransomware in 2021 so far Businesses need to deal with ransomware […]

The post Here are some ransomware decryptor sites you should keep handy appeared first on TechSolutions, Inc..

]]>

Ransomware is on the rise, but falling victim to one is not the end of the world. You can try some of these ransomware decryptors and maybe one of them will work. These are especially useful against automated “zombie” ransomware types.

The state of ransomware in 2021 so far

Businesses need to deal with ransomware both from outside and within. On one hand, there are more cybercriminals trying to infiltrate your network. On the other hand, careless and unknowing staff can easily let ransomware enter your network. For instance, employees may be tricked into providing their access credentials in phishing sites, or they may click links to websites that upload ransomware downloaders onto their machines.

The statistics are sobering. Ransomware cost businesses more than $75 billion per year. Over the past two years, ransomware attacks have increased by over 97%. And compared to the first two months of 2017, ransomware campaigns that were initiated from phishing emails increased by 109% in the same span of time this year.
According to studies, there will be a ransomware attack targeting a business every 11 seconds in 2021. That is up from every 14 seconds in 2019, and every 40 seconds in 2016. And the trend is that the rate will continue to increase over the years.

Zombie ransomware is easy to defeat

Not every type of infection is targeted to individual organizations. Some infections may result from self-propagating ransomware strains, while others may come from cyberattackers who are hoping targets become so scared that they pay up before doing any research on how dated the strain is and how to remove it.

No matter what the circumstances of your infection are, always check the following lists to see whether free decryption tools have been released to save you a world of hurt:

Prevention

But even when you can get your data back for free, getting hit with ransomware is no walk in the park. There are essentially three basic approaches to prevent ransomware:

  • First, train your employees about what they should and shouldn’t open when browsing the web and checking email.
  • Second, back up your data as often as possible to quarantined storage. As long as access to your backed-up data is extremely limited and not directly connected to your network, you should be able to restore everything in case of an infection.
  • Finally, regularly update all your software solutions (operating systems, productivity software, and antivirus). Most big-name vendors are quick to patch vulnerabilities, and you’ll prevent a large portion of infections just by staying up to date.

Whether it’s dealing with an infection or preventing one, the best option is to always seek professional advice from seasoned IT technicians. It’s possible that you could decrypt your data with the tools listed above, but most ransomware strains destroy your data after a set time limit, and you may not be able to beat the clock. And even if you do, you probably won’t have the expertise to discern where your security was penetrated.

Don’t waste time fighting a never-ending stream of cyberattacks — hand it over to us and be done with it. Call us today to find out more.

Published with permission from TechAdvisory.org. Source.

The post Here are some ransomware decryptor sites you should keep handy appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/here-are-some-ransomware-decryptor-sites-you-should-keep-handy/feed/ 0
Fighting ransomware with virtualization https://www.techsolutionsinc.com/blog/fighting-ransomware-with-virtualization/ https://www.techsolutionsinc.com/blog/fighting-ransomware-with-virtualization/#respond Sat, 03 Feb 2018 02:00:42 +0000 https://www.techsolutionsinc.com/blog/fighting-ransomware-with-virtualization/ Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with virtual disaster recovery solutions. Virtual […]

The post Fighting ransomware with virtualization appeared first on TechSolutions, Inc..

]]>

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with virtual disaster recovery solutions.

Virtual DR
Virtual DR solutions allow you to create point-in-time copies, or “snapshots,” of operating systems, data, and virtual machines as they appear at a given point in time. These snapshots can then be loaded onto any workstation with everything still intact. In the event of a ransomware attack, administrators can essentially roll back the system to a point before the malware hit.

What’s great about point-in-time copy features is that they are automated. Just schedule the snapshots, and your virtual DR software will do the rest. And although virtual DR solutions vary, most of them have the capacity to store thousands of point-in-time copies, giving you plenty of restore points to choose from.

Why virtual DR trumps traditional DR
Traditional DR methods don’t have these features. Even though most computer operating systems have a system restore functionality, modern ransomware strains are designed to disable them. On the other hand, virtual DR software isolates point-in-time copies and restore functionality from virtual machines, which means they can’t be affected if one virtual machine was compromised with ransomware.

Another reason why traditional DR is not a great option is because there is a lot of manual labor involved. You have to copy all your data into a backup drive, reinstall applications, and reconfigure hardware. By the time you’ve recovered from the ransomware attack, the financial and reputational damage caused by downtime will have taken its toll on your business.

When recovering your system, you want as little hassle as possible. With virtual DR, you can load a clean, ransomware-free snapshot onto your system in less than 30 minutes.

However, implementing virtual DR can be complex, especially if you don’t have much IT expertise. But if you partner with us, this won’t be a problem! Call us today to get robust solutions that guarantee business continuity.

Published with permission from TechAdvisory.org. Source.

The post Fighting ransomware with virtualization appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/fighting-ransomware-with-virtualization/feed/ 0
Who are the ShadowBrokers? https://www.techsolutionsinc.com/blog/who-are-the-shadowbrokers/ https://www.techsolutionsinc.com/blog/who-are-the-shadowbrokers/#respond Fri, 06 Oct 2017 12:00:57 +0000 https://www.techsolutionsinc.com/blog/who-are-the-shadowbrokers/ The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It’s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use. Who are the ShadowBrokers? […]

The post Who are the ShadowBrokers? appeared first on TechSolutions, Inc..

]]>

The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It’s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use.

Who are the ShadowBrokers?

There are several theories about who the members of this hacker group are — from National Security Agency (NSA) employees to Russian operatives — but all these theories are based on unreliable information. All we know for sure is that the ShadowBrokers are using social media to sell a seemingly endless trove of cybersecurity secrets.

What are they selling?

The ShadowBrokers’ first auction was in August of 2016, promising in broken English that the highest bidder would receive security vulnerabilities on par with government cyber weapons. Over the year that followed, the ShadowBrokers used auctions, crowdfunding, and direct sales to release vulnerabilities that all seemed to come from the NSA.

In April of 2017, the fifth release went public and was characterized by one security expert as “the most damaging thing I’ve seen in the last several years.” It included the ETERNALBLUE Windows vulnerability that allowed WannaCry to infect over 300,000 computers in a single day.

The September 2017 release

In a recent announcement, the ShadowBrokers announced a subscription service that will include access to bi-monthly security exploit releases. The first package included an NSA exploit named UNITEDRAKE, which allows hackers to remotely monitor or control a computer running any of the following versions of Microsoft’s operating system:

  • Windows XP
  • Windows Vista
  • Windows Server 2003/2008/2012
  • Windows 7 (if no updates have been installed)
  • Windows 8

The UNITEDRAKE exploit can secretly record audio from your microphone, video from your webcam and anything that is typed while you are logged in. It can also remove itself from the target computer leaving no signs of a breach.

How to protect yourself from ShadowBrokers releases

To date, all the known NSA security exploits and ShadowBrokers releases have targeted older and outdated versions of software. The best thing you can do to protect your computers is keep your operating systems and software applications patched with the most recent vendor updates.

Advanced network monitoring can detect suspicious activity, but that requires a significant amount of time and IT expertise. Small- and medium-sized businesses usually don’t have the resources to handle 24×7 network supervision, but our team can help.

If you need help securing your business and its information from cyber threats, give us a call today.

Published with permission from TechAdvisory.org. Source.

The post Who are the ShadowBrokers? appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/who-are-the-shadowbrokers/feed/ 0
Ransomware is coming to your Android https://www.techsolutionsinc.com/blog/ransomware-is-coming-to-your-android/ https://www.techsolutionsinc.com/blog/ransomware-is-coming-to-your-android/#respond Fri, 08 Sep 2017 00:00:42 +0000 https://www.techsolutionsinc.com/blog/ransomware-is-coming-to-your-android/ Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more. How does ransomware make it onto your Android device? Like its desktop equivalent, mobile ransomware […]

The post Ransomware is coming to your Android appeared first on TechSolutions, Inc..

]]>

Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more.

How does ransomware make it onto your Android device?

Like its desktop equivalent, mobile ransomware needs to be installed on your device before it can do damage. For Android devices, this means mobile apps that hide their true intent. There are two ways to install programs on your mobile device: downloading them from app stores like Google Play and Amazon Appstore, or downloading them directly from websites and email links.

Surprisingly, both come with risks. Unverified sources often advertise free apps that hide malware, and the best of these can occasionally avoid detection and be allowed into monitored app stores.

What does mobile ransomware look like?

Similar to ransomware on personal computers, mobile ransomware holds data stored on your device hostage and demands ransom. For example, in the case of a ransomware that came with the “OK” app, a popular Russian social network platform that was infected earlier this year, a user is prompted to change device settings. There is no option to close the prompt and tapping Accept locks everything down and leaves you with nothing but a ransom note.

How to protect yourself from mobile ransomware

First and foremost, avoid downloading apps directly from websites or third-party app stores. Additionally, make sure you turn on Google’s security system — Verify Apps — which scans all the apps about to be installed on your device for potential threats. You can do so by opening your Android’s settings, choosing Security, tapping on Verify Apps, and activating ‘Scan device for security threats’.

Second, install antivirus software on your device and keep it up to date.

Third, back up important files from your device to either a USB disk, a computer, or any cloud-based services. This way, you won’t lose your valuable data if you are forced to factory-reset your device.

Last, if ransomware made its way into your device, don’t pay. According to IT security company ESET, mobile ransomware very rarely includes programming to reverse the damage it has done.

Losing any type of data is an enormous inconvenience, but businesses need to be especially careful about careless employees. Data loss could result in lawsuits or regulatory fines, so it’s important that you know how to safeguard your Android against ransomware.

For more in-depth advice on how to protect yourself and your business from this threat, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

The post Ransomware is coming to your Android appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/ransomware-is-coming-to-your-android/feed/ 0
What you need to know about malware https://www.techsolutionsinc.com/blog/what-you-need-to-know-about-malware/ https://www.techsolutionsinc.com/blog/what-you-need-to-know-about-malware/#respond Sat, 29 Jul 2017 00:00:20 +0000 https://www.techsolutionsinc.com/blog/what-you-need-to-know-about-malware/ You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded. Viruses Once created to annoy […]

The post What you need to know about malware appeared first on TechSolutions, Inc..

]]>

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded.

Viruses

Once created to annoy users by making small changes to their computers, like altering wallpapers, this type of malware has evolved into a malicious tool used to breach confidential data. Most of the time, viruses work by attaching themselves to .exe files in order to infect computers once the file has been opened. This can result in various issues with your computer’s operating system, at their worst, rendering your computer unusable.

To avoid these unfortunate circumstances, you should scan executable files before running them. There are plenty of antivirus software options, but we recommend choosing one that scans in real-time rather than manually.

Spyware

Unlike viruses, spyware doesn’t harm your computer, but instead, targets you. Spyware attaches itself to executable files and once opened or downloaded, will install itself, often times completely unnoticed. Once running on your computer, it can track everything you type, including passwords and other confidential information. Hackers can then use this information to access your files, emails, bank accounts, or anything else you do on your computer.

But don’t panic just yet, you can protect yourself by installing anti-spyware software, sometimes included in all-purpose “anti-malware” software. Note that most reputable antivirus software also come bundled with anti-spyware solutions.

Adware

Are you redirected to a particular page every time you start your browser? Do you get pop ups when surfing the internet? If either situation sounds familiar, you’re likely dealing with adware. Also known as Potential Unwanted Programs (PUP), adware isn’t designed to steal your data, but to get you to click on fraudulent ads. Whether you click on the ad or not, adware can significantly slow down your computer since they take up valuable bandwidth. Worse still, they’re often attached with other types of malware.

Some adware programs come packaged with legitimate software and trick you into accepting their terms of use, which make them especially difficult to remove. To eradicate adware, you’ll need a solution with specialized adware removal protocols.

Scareware

This type of malware works like adware except that it doesn’t make money by tricking you into clicking on ads, but by scaring you into buying a software you don’t need. An example is a pop up ad that tells you your computer is infected with a virus and you need to buy a certain software to eliminate it. If you fall for one of these tactics and click on the ad, you’ll be redirected to a website where you can buy the fake antivirus software.

Scareware acts more like a diversion from the other malware that often comes with it. A good antivirus solution will help scan for scareware too, but you should patch your operating systems regularly just to be safe.

Ransomware

Ransomware has become increasingly common and hostile. It encrypts your computer files and holds them hostage until you’ve paid a fee for the decryption code. Because ransomware comes with sophisticated encryption, there aren’t many options unless you have backups of your data.

There are some tools that can protect against ransomware but we recommend that you backup your data and practice safe web browsing habits.

Worms

Similar to viruses, worms replicate themselves to widen the scope of their damage. However, worms don’t require human intervention to replicate themselves as they use security flaws to transmit from one computer to the next, making them far more dangerous than your typical virus. They often spread via email, sending emails to everyone in an infected user’s contact list, which was exactly the case with the ILOVEYOU worm that cost businesses approximately $5.5 billion worth of damage.

The easiest ways to protect your network from worms is to use a firewall to block external access to your computer network, and to be careful when clicking on unknown links in your email or unknown messages on social media.

Trojans

Usually downloaded from rogue websites, Trojans create digital backdoors that allow hackers to take control of your computer without your knowledge. They can steal your personal information, your files, or cause your computer to stop working. Sometimes hackers will use your computer as a proxy to conceal their identity or to send out spam.

To avoid trojan attacks, you should never open emails or download attachments from unknown senders. If you’re skeptical, use your antivirus software to scan every file first.

In order to keep malware at bay, you need to invest in security solutions with real-time protection and apply security best practices within your office. If you have any questions or concerns, or simply need advice on how to strengthen your business’s security, just give us a call and we’ll be happy to help.

Published with permission from TechAdvisory.org. Source.

The post What you need to know about malware appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/what-you-need-to-know-about-malware/feed/ 0
Why Nyetya is more threatening than WannaCry https://www.techsolutionsinc.com/blog/why-nyetya-is-more-threatening-than-wannacry/ https://www.techsolutionsinc.com/blog/why-nyetya-is-more-threatening-than-wannacry/#respond Fri, 14 Jul 2017 00:00:04 +0000 https://www.techsolutionsinc.com/blog/why-nyetya-is-more-threatening-than-wannacry/ The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers […]

The post Why Nyetya is more threatening than WannaCry appeared first on TechSolutions, Inc..

]]>

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers believe it to be stealthier and more sophisticated than WannaCry.

Worse than WannaCry

Nyetya is deemed worse than WannaCry mainly because it spreads laterally, meaning it targets computers within networks and affects even systems that have been patched. Because it also spreads internally, it needs to infect only one device to affect several others within a single network.

Cyber researchers trace its origins to a tax accounting software called MEDoc, which infected 12,500 systems in Ukraine. Since the initial infections in June, it has spread to thousands of networks in 64 countries. And although it hasn’t spread as fast as WannaCry, it might have a wider reach soon because it uses three attack pathways to infect a system. It hasn’t made as much money as WannaCry, which is why cyber researchers are concluding that the attacks are not economically motivated.

Don’t pay the ransom

Cyber security firms and researchers strongly recommend affected businesses to avoid paying the ransom. According to them, paying the ransom would be a waste since the infected user won’t be able to receive a decryption key to unlock their files or systems. This is because the email provider has blocked the email address on the ransomware message.

Although it operates like a ransomware — locking hard drives and files and demands a $300 ransom in Bitcoin — it functions more as a wiperware that aims to permanently wipe out data and/or destroy systems. So far, it has affected big-name multinationals in various industries, including Merck, Mondelez International, and AP Moller-Maersk, among others.

Perform backups and update outdated security patches

The only way businesses can be protected is by performing backups and staying on top of patch updates.

It’s safe to say that in case of a Nyetya attack, there’s no chance of getting back your data. In such a scenario, you would have only your backup files — whether on an external storage or in the cloud — to fall back on. But backing up is not enough; you should also ensure that your backups are working, which you can do by testing them regularly. Given the nature of Nyetya, you should also make sure that your backups are stored off-site and disconnected from your network.

Like its predecessor, Nyetya exploited vulnerabilities in unpatched Microsoft-run computers. As a business owner, make it a part of your cyber security routine to update your systems with the latest security patches, or risk having your files or systems permanently corrupted.

As a business owner whose operations’ lifeline depends on critical files, your backups are your insurance. If your systems’ network security needs another layer of protection, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

The post Why Nyetya is more threatening than WannaCry appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/why-nyetya-is-more-threatening-than-wannacry/feed/ 0
WannaCry: A historic cyberattack https://www.techsolutionsinc.com/blog/wannacry-a-historic-cyberattack/ https://www.techsolutionsinc.com/blog/wannacry-a-historic-cyberattack/#respond Fri, 26 May 2017 00:00:17 +0000 https://www.techsolutionsinc.com/blog/wannacry-a-historic-cyberattack/ No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats. Ransomware review […]

The post WannaCry: A historic cyberattack appeared first on TechSolutions, Inc..

]]>

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.

Ransomware review

Ransomware is a specific type of malware program that either encrypts or steals valuable data and threatens to erase it or release it publicly unless a ransom is paid. We’ve been writing about this terrifying threat for years, but the true genesis of ransomware dates all the way back to 1989.

This form of digital extortion has enjoyed peaks and troughs in popularity since then, but never has it been as dangerous as it is now. In 2015, the FBI reported a huge spike in the popularity of ransomware, and healthcare providers became common targets because of the private and time-sensitive nature of their hosted data.

The trend got even worse, and by the end of 2016 ransomware had become a $1 billion-a-year industry.

The WannaCry ransomware

Although the vast majority of ransomware programs rely on convincing users to click compromised links in emails, the WannaCry version seems to have spread via more technical security gaps. It’s still too early to be sure, but the security experts at Malwarebytes Labs believe that the reports of WannaCry being transmitted through phishing emails is simply a matter of confusion. Thousands of other ransomware versions are spread through spam email every day and distinguishing them can be difficult.

By combining a Windows vulnerability recently leaked from the National Security Agency’s cyber arsenal and some simple programming to hunt down servers that interact with public networks, WannaCry spread itself further than any malware campaign has in the last 15 years.

Despite infecting more than 200,000 computers in at least 150 countries, the cyberattackers have only made a fraction of what you would expect. Victims must pay the ransom in Bitcoins, a totally untraceable currency traded online. Inherent to the Bitcoin platform is a public ledger, meaning anyone can see that WannaCry’s coffers have collected a measly 1% of its victims payments.

How to protect yourself for what comes next

Part of the reason this ransomware failed to scare users into paying up is because it was so poorly made. Within a day of its release, the self-propagating portion of its programming was brought to a halt by an individual unsure of why it included a 42-character URL that led to an unregistered domain. Once he registered the web address for himself, WannaCry stopped spreading.

Unfortunately, that doesn’t help the thousands that were already infected. And it definitely doesn’t give you an excuse to ignore what cybersecurity experts are saying, “This is only the beginning.” WannaCry was so poorly written, it’s amazing it made it as far as it did. And considering it would’ve made hundreds of millions of dollars if it was created by more capable programmers, your organization needs to prepare for the next global cyberattack.

Every single day it should be your goal to complete the following:

  • Thorough reviews of reports from basic perimeter security solutions. Antivirus software, hardware firewalls, and intrusion prevention systems log hundreds of amateur attempts on your network security every day; critical vulnerabilities can be gleaned from these documents.
  • Check for updates and security patches for every single piece of software in your office, from accounting apps to operating systems. Computers with the latest updates from Microsoft were totally safe from WannaCry, which should be motivation to never again click “Remind me later.”
  • Social engineering and phishing may not have been factors this time around, but training employees to recognize suspicious links is a surefire strategy for avoiding the thousands of other malware strains that threaten your business.

Revisiting these strategies every single day may seem a bit much, but we’ve been in the industry long enough to know that it takes only one mistake to bring your operations to a halt. For daily monitoring and support, plus industry-leading cybersecurity advice, call us today.

Published with permission from TechAdvisory.org. Source.

The post WannaCry: A historic cyberattack appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/wannacry-a-historic-cyberattack/feed/ 0
The Importance of Managed Services https://www.techsolutionsinc.com/blog/the-importance-of-managed-services/ https://www.techsolutionsinc.com/blog/the-importance-of-managed-services/#respond Fri, 13 Jan 2017 02:00:15 +0000 https://www.techsolutionsinc.com/blog/the-importance-of-managed-services/ Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as […]

The post The Importance of Managed Services appeared first on TechSolutions, Inc..

]]>

2017january12_security_aCyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as much as you’d like to believe your business is safe, the worst could happen at any time. Because antivirus software alone can only do so much to protect your business, managed services has become the solution. To make our case, here are several statistics that prove you need managed services from a technology provider.

The numbers

Small businesses are not at risk of being attacked, but worse, they’ve already fallen victim to cyber threats. According to Small Business Trends, 55 percent of survey respondents say their companies have experienced cyber attack sometime between 2015 and 2016. Not only that, 50 percent reported they have experienced data breaches with customer and employee information during that time, too. The aftermath of these incidents? These companies spent an average of $879,582 to fix the damages done to their IT assets and recover their data. To make matters worse, disruption to their daily operations cost an average of $955,429.

The attacks

So what types of attack did these businesses experience? The order from most to least common are as follows: Web-based attacks, phishing, general malware, SQL injection, stolen devices, denial of services, advanced malware, malicious insider, cross-site scripting, ransomware and others.

Why managed services?

Managed services is the most effective prevention and protection from these malicious threats. They include a full range of proactive IT support that focuses on advanced security such as around the clock monitoring, data encryption and backup, real-time threat prevention and elimination, network and firewall protection and more.

Not only that, but because managed services are designed to identify weak spots in your IT infrastructure and fix them, you’ll enjoy other benefits including faster network performance, business continuity and disaster recovery as well as minimal downtime. One of the best things about managed services is the fact that you get a dedicated team of IT professionals ready to assist with any technology problems you might have. This is much more effective and budget-friendly than having an in-house personnel handling all your IT issues.

Being proactive when it comes to cyber security is the only way to protect what you’ve worked hard to built. If you’d like to know more about how managed services can benefit your business, just give us a call, we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

The post The Importance of Managed Services appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/the-importance-of-managed-services/feed/ 0