cyber security | TechSolutions, Inc. Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation. Wed, 02 Mar 2022 13:42:10 +0000 en-US hourly 1 https://www.techsolutionsinc.com/wp-content/uploads/2020/05/favicon.png cyber security | TechSolutions, Inc. 32 32 Tips to protect your smartphone https://www.techsolutionsinc.com/blog/tips-to-protect-your-smartphone/ https://www.techsolutionsinc.com/blog/tips-to-protect-your-smartphone/#respond Sat, 30 Dec 2017 02:00:54 +0000 https://www.techsolutionsinc.com/blog/tips-to-protect-your-smartphone/ Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security. Set a strong password Whether your device requires a 4-set […]

The post Tips to protect your smartphone appeared first on TechSolutions, Inc..

]]>

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security.

Set a strong password

Whether your device requires a 4-set or 6-set numerical PIN, a fingerprint, or a facial scan, set a lock that’s difficult to crack. This is not the strongest security measure by any means, but they provide a necessary initial barrier for intruders.

Major manufacturers like Apple and Samsung are innovating their products’ locking mechanisms and you’re doing yourself a favor by using them. To manage your device’s locks, follow these steps:

  • iOS – Go to Settings > Touch ID & Passcode, enter your passcode, and switch on ‘Require Passcode.’ This is also where you can manage your Touch ID settings and adjust access controls (Recent Notifications, Today View, and more). If you’re using an iPhone X, go to ‘Face ID & Passcode.’
  • Android – Go to the Settings page > Lock Screen and Security to set your passcodes. These feature names may vary per device.

Download applications only from official stores

For iPhone users, download only from the App Store, and for Android phones, Google Play Store. Downloading apps only from these platforms doesn’t guarantee that your phone will be 100% safe from malware, but doing so greatly reduces the likelihood of you downloading malicious programs disguised as legitimate apps.

Even Apple, which used to be the gold standard for software security, is no longer immune to system vulnerabilities. Despite having a strict policy on downloads (iPhone users can download only from the App Store), those with ‘jailbreak apps’ are exposed to a multitude of malicious entities. As a further precaution, download only apps that have high ratings and steer clear of downloads from unknown links.

Check your apps’ permissions

When you download certain apps, you’ll be asked to grant permission for it to access your data (files, contacts, photos, etc.). What most users don’t know is that some of these permissions also gain access to hardware controls such as those found in the device’s camera and microphone. And if a malicious app happens to slip through the cracks, these permissions can serve as a gateway for hackers.

Android and Apple have already improved their respective OS’s mechanisms to control what apps can access, but you can take it up a notch. Follow these steps to manage what apps can access on your phone:

  • iOS – Go to Settings > Privacy to see your apps’ access level. For example, if you tap on Microphone, you’ll see all the apps that have access to your iPhone’s Microphone. If you wish to deny access to it, you can do so by turning privacy off.
  • Android – Go to Settings > Apps, select an app, then tap ‘Permissions.’ From here, you can control every individual app’s access to your devices’ files.

Update apps and security software

We cannot stress this enough: As soon as they become available, download and update your OS and apps’ software.

In exceptional cases where certain versions of an OS are known to have bugs, not patching your device doesn’t make it any less exposed to risk. And here’s why: Most older OS versions have had to be patched because of a software vulnerability, and delaying its update to the latest version doesn’t make it safer. In fact, it’s far riskier to remain unpatched and wait for the next update.

These basic yet critical tips will help keep all your gadgets safe and your business data unharmed by cyber criminals. Boost your devices and your business’s defenses with dependable cyber security from our team — call us today!

Published with permission from TechAdvisory.org. Source.

The post Tips to protect your smartphone appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/tips-to-protect-your-smartphone/feed/ 0
Phishers use encrypted sites to scam https://www.techsolutionsinc.com/blog/phishers-use-encrypted-sites-to-scam/ https://www.techsolutionsinc.com/blog/phishers-use-encrypted-sites-to-scam/#respond Sat, 23 Dec 2017 02:00:15 +0000 https://www.techsolutionsinc.com/blog/phishers-use-encrypted-sites-to-scam/ Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption […]

The post Phishers use encrypted sites to scam appeared first on TechSolutions, Inc..

]]>

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security.

How hackers use encryption to carry out phishing scams

According to recent research, 24% of phishing scams in 2017 use web encryption — an astounding increase from last year’s 3%. This means more HTTPS sites may not be truly safe.

Phishing scammers rely on their victims to do what they ask, which is why it’s so effective. And with this new trick, unsuspecting users are more likely to be deceived. What makes this encryption-aided scam even more effective — and dangerous — is that it makes hackers’ phishing email or text that much more authentic-looking.

For example, if you receive an email that purports to be from Amazon and includes a link to an encrypted site, there’s now a slightly higher chance you’d believe this email is the real deal. Clearly, if you’ve never purchased anything from Amazon, you’d know that this is a fake. But then again, there are millions of Amazon customers who could be misled into thinking that that email is legitimate.

Does encryption mean a safer internet?

With organizations like the Internet Security Research Group and Google promoting encryption, the world wide web should be a safer place, but that’s not necessarily the case. In fact, encrypting more legitimate websites could simply result in an increased number of encrypted phishing sites.

It may also be useful to know that not all phishing sites use encryption. Many phishing scams are still carried out using websites that may or may not be encrypted.

What you can do to ensure safety

This isn’t meant to cause panic, and despite this new phishing tactic, encryption is still an essential security tool that every business must implement.

Websites with HTTPS are still much safer than unencrypted ones. This is why it’s more important than ever to be vigilant when visiting suspicious sites and clicking on links. If you receive an email from PayPal asking you to verify your bank account details or password to a seemingly secure link, be wary. Some phishing scams are easy to detect, but some are not.

Practice extreme caution when responding to requests for sensitive data. Consider the source of the message, think before clicking, and don’t hesitate to seek the advice of an expert in case you have doubts. Phishers succeed only if you do what they ask you to do.

Phishing and other cyber scams are constantly getting upgrades, and no single solution can prevent hackers from attacking you. But your business could be much safer with the right cyber security protections in place. If this is exactly what you need, get in touch with our cyber security technicians.

Published with permission from TechAdvisory.org. Source.

The post Phishers use encrypted sites to scam appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/phishers-use-encrypted-sites-to-scam/feed/ 0
What you need to know about malware https://www.techsolutionsinc.com/blog/what-you-need-to-know-about-malware/ https://www.techsolutionsinc.com/blog/what-you-need-to-know-about-malware/#respond Sat, 29 Jul 2017 00:00:20 +0000 https://www.techsolutionsinc.com/blog/what-you-need-to-know-about-malware/ You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded. Viruses Once created to annoy […]

The post What you need to know about malware appeared first on TechSolutions, Inc..

]]>

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded.

Viruses

Once created to annoy users by making small changes to their computers, like altering wallpapers, this type of malware has evolved into a malicious tool used to breach confidential data. Most of the time, viruses work by attaching themselves to .exe files in order to infect computers once the file has been opened. This can result in various issues with your computer’s operating system, at their worst, rendering your computer unusable.

To avoid these unfortunate circumstances, you should scan executable files before running them. There are plenty of antivirus software options, but we recommend choosing one that scans in real-time rather than manually.

Spyware

Unlike viruses, spyware doesn’t harm your computer, but instead, targets you. Spyware attaches itself to executable files and once opened or downloaded, will install itself, often times completely unnoticed. Once running on your computer, it can track everything you type, including passwords and other confidential information. Hackers can then use this information to access your files, emails, bank accounts, or anything else you do on your computer.

But don’t panic just yet, you can protect yourself by installing anti-spyware software, sometimes included in all-purpose “anti-malware” software. Note that most reputable antivirus software also come bundled with anti-spyware solutions.

Adware

Are you redirected to a particular page every time you start your browser? Do you get pop ups when surfing the internet? If either situation sounds familiar, you’re likely dealing with adware. Also known as Potential Unwanted Programs (PUP), adware isn’t designed to steal your data, but to get you to click on fraudulent ads. Whether you click on the ad or not, adware can significantly slow down your computer since they take up valuable bandwidth. Worse still, they’re often attached with other types of malware.

Some adware programs come packaged with legitimate software and trick you into accepting their terms of use, which make them especially difficult to remove. To eradicate adware, you’ll need a solution with specialized adware removal protocols.

Scareware

This type of malware works like adware except that it doesn’t make money by tricking you into clicking on ads, but by scaring you into buying a software you don’t need. An example is a pop up ad that tells you your computer is infected with a virus and you need to buy a certain software to eliminate it. If you fall for one of these tactics and click on the ad, you’ll be redirected to a website where you can buy the fake antivirus software.

Scareware acts more like a diversion from the other malware that often comes with it. A good antivirus solution will help scan for scareware too, but you should patch your operating systems regularly just to be safe.

Ransomware

Ransomware has become increasingly common and hostile. It encrypts your computer files and holds them hostage until you’ve paid a fee for the decryption code. Because ransomware comes with sophisticated encryption, there aren’t many options unless you have backups of your data.

There are some tools that can protect against ransomware but we recommend that you backup your data and practice safe web browsing habits.

Worms

Similar to viruses, worms replicate themselves to widen the scope of their damage. However, worms don’t require human intervention to replicate themselves as they use security flaws to transmit from one computer to the next, making them far more dangerous than your typical virus. They often spread via email, sending emails to everyone in an infected user’s contact list, which was exactly the case with the ILOVEYOU worm that cost businesses approximately $5.5 billion worth of damage.

The easiest ways to protect your network from worms is to use a firewall to block external access to your computer network, and to be careful when clicking on unknown links in your email or unknown messages on social media.

Trojans

Usually downloaded from rogue websites, Trojans create digital backdoors that allow hackers to take control of your computer without your knowledge. They can steal your personal information, your files, or cause your computer to stop working. Sometimes hackers will use your computer as a proxy to conceal their identity or to send out spam.

To avoid trojan attacks, you should never open emails or download attachments from unknown senders. If you’re skeptical, use your antivirus software to scan every file first.

In order to keep malware at bay, you need to invest in security solutions with real-time protection and apply security best practices within your office. If you have any questions or concerns, or simply need advice on how to strengthen your business’s security, just give us a call and we’ll be happy to help.

Published with permission from TechAdvisory.org. Source.

The post What you need to know about malware appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/what-you-need-to-know-about-malware/feed/ 0
Why Nyetya is more threatening than WannaCry https://www.techsolutionsinc.com/blog/why-nyetya-is-more-threatening-than-wannacry/ https://www.techsolutionsinc.com/blog/why-nyetya-is-more-threatening-than-wannacry/#respond Fri, 14 Jul 2017 00:00:04 +0000 https://www.techsolutionsinc.com/blog/why-nyetya-is-more-threatening-than-wannacry/ The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers […]

The post Why Nyetya is more threatening than WannaCry appeared first on TechSolutions, Inc..

]]>

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers believe it to be stealthier and more sophisticated than WannaCry.

Worse than WannaCry

Nyetya is deemed worse than WannaCry mainly because it spreads laterally, meaning it targets computers within networks and affects even systems that have been patched. Because it also spreads internally, it needs to infect only one device to affect several others within a single network.

Cyber researchers trace its origins to a tax accounting software called MEDoc, which infected 12,500 systems in Ukraine. Since the initial infections in June, it has spread to thousands of networks in 64 countries. And although it hasn’t spread as fast as WannaCry, it might have a wider reach soon because it uses three attack pathways to infect a system. It hasn’t made as much money as WannaCry, which is why cyber researchers are concluding that the attacks are not economically motivated.

Don’t pay the ransom

Cyber security firms and researchers strongly recommend affected businesses to avoid paying the ransom. According to them, paying the ransom would be a waste since the infected user won’t be able to receive a decryption key to unlock their files or systems. This is because the email provider has blocked the email address on the ransomware message.

Although it operates like a ransomware — locking hard drives and files and demands a $300 ransom in Bitcoin — it functions more as a wiperware that aims to permanently wipe out data and/or destroy systems. So far, it has affected big-name multinationals in various industries, including Merck, Mondelez International, and AP Moller-Maersk, among others.

Perform backups and update outdated security patches

The only way businesses can be protected is by performing backups and staying on top of patch updates.

It’s safe to say that in case of a Nyetya attack, there’s no chance of getting back your data. In such a scenario, you would have only your backup files — whether on an external storage or in the cloud — to fall back on. But backing up is not enough; you should also ensure that your backups are working, which you can do by testing them regularly. Given the nature of Nyetya, you should also make sure that your backups are stored off-site and disconnected from your network.

Like its predecessor, Nyetya exploited vulnerabilities in unpatched Microsoft-run computers. As a business owner, make it a part of your cyber security routine to update your systems with the latest security patches, or risk having your files or systems permanently corrupted.

As a business owner whose operations’ lifeline depends on critical files, your backups are your insurance. If your systems’ network security needs another layer of protection, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

The post Why Nyetya is more threatening than WannaCry appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/why-nyetya-is-more-threatening-than-wannacry/feed/ 0
Ransomware demands more victims for freedom https://www.techsolutionsinc.com/blog/ransomware-demands-more-victims-for-freedom/ https://www.techsolutionsinc.com/blog/ransomware-demands-more-victims-for-freedom/#respond Thu, 29 Dec 2016 02:00:28 +0000 https://www.techsolutionsinc.com/blog/ransomware-demands-more-victims-for-freedom/ Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For more information on how Popcorn […]

The post Ransomware demands more victims for freedom appeared first on TechSolutions, Inc..

]]>

2016december28_security_aPopcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For more information on how Popcorn Time works and what you can do to keep it off your system, keep reading.

Ransomware is nothing new. Cybersecurity miscreants have been taking advantage of online users for years by requiring payment to “unlock” a victim’s computer. What Popcorn Time does differently is give users the option to spread the virus to two other victims in the hopes that they will pay the ransom — a tactic that promises to double their money at the expense of your sense of morality (and at the expense of your friendships as well).

The Cost of Popcorn

When you inadvertently download this ransomware, you will be met with a screen that explains that your files have been hijacked/encrypted, and that to get them back you will need to pay one Bitcoin for a decryption key that they keep stored remotely. The Bitcoin fee is usually more than $700, a hefty price to pay during any season but particularly difficult for those infected during the holiday season.

Spread the “Holiday Cheer” and Hope they Bite

What makes Popcorn Time unique is the option victims have to take their cost away by allowing the ransomware to affect two of their friends for a chance to get a free decryption code. Of course, it works only if both friends pay the ransom, which leaves you looking (and feeling) like the Grinch.

Avoiding Popcorn Time this Season

The easiest way to avoid downloading ransomware is to stay off of sites that might contain questionable files. However, this is nearly impossible for modern users, and many hackers are getting good at making their files look legitimate. Limit your exposure to potential ransomware by keeping your software up-to-date and your computer protected with a security program from a reputable company (for example Norton or Symantec). If you need to learn more about how to avoid running into ransomware while you’re online, give our professional cybersecurity consultants a call. We’ll keep you away from the popcorn this season.

Published with permission from TechAdvisory.org. Source.

The post Ransomware demands more victims for freedom appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/ransomware-demands-more-victims-for-freedom/feed/ 0
IT security predictions for 2016 https://www.techsolutionsinc.com/blog/it-security-predictions-for-2016/ https://www.techsolutionsinc.com/blog/it-security-predictions-for-2016/#respond Tue, 29 Dec 2015 02:30:18 +0000 https://www.techsolutionsinc.com/blog/it-security-predictions-for-2016/ Online security has probably never been such a hotly debated subject as it was in 2015. From recent numerous high-profile attacks on Sony and others, to this year’s leaking of data stolen from the extramarital-affair-facilitating website Ashley Madison website, have pushed cyber security firmly into the spotlight. So what can we expect from 2016? Experts […]

The post IT security predictions for 2016 appeared first on TechSolutions, Inc..

]]>

Security_Dec24_AOnline security has probably never been such a hotly debated subject as it was in 2015. From recent numerous high-profile attacks on Sony and others, to this year’s leaking of data stolen from the extramarital-affair-facilitating website Ashley Madison website, have pushed cyber security firmly into the spotlight. So what can we expect from 2016? Experts predict that this year will only see cyber crime increasing yet further. Here’s what you need to know.

If you think that only big corporations and prominent organizations are targeted by cyber criminals, you are making a deadly mistake. It might be tempting to sweep cyber crime under the carpet and assume that you are flying below the average hacker’s radar, but that simply isn’t true. In fact, it’s the polar opposite, since smaller enterprises are actually far more likely to be at risk than larger ones, owing to their typically less sturdy security postures.

So where does that leave you as a small or medium-sized business owner or manager? Does it mean you need to be taking your cyber security even more seriously? You can bet your bottom dollar it does, as industry experts predict that 2016 is only going to become more of a minefield when it comes to online crime.

The headline trend that IT security professionals pinpointed this year was that no longer were criminals hacking into websites purely to bolster their bank accounts. 2015 has seen the emergence of another strain of hackers, launching cyber attacks as part of a moral crusade. These people are not purely after money although in some cases this may also be a contributing factor – instead, their claimed motivation is revenge, or righting what they perceive as wrong. It is this diversification in the hacking community that has led security watchers to predict that, as we enter 2016, we are likely to see some different behavior from hackers.

Among the unpleasant predictions being made, a number of experts agree that hacks of a destructive nature will be on the rise. The fact that hackers are using attacks for retribution rather than simple monetary gain means that a wider cross-section of organizations may well find themselves being preyed upon, all the way from government agencies – traditionally ignored by hackers – to online retailers and other commercial websites.

Remember when Snapchat got hacked back in October 2014, and the hackers threatened to make public as many as 200,000 photos? Well, the bad news is that apps are going to continue to be targeted. In particular, those mobile apps that request access to your list of contacts, emails and messages can, in the wrong hands, be used to create the kind of portal that enables a cyber criminal to steal data or gain access to a company’s entire network. All this means that in 2016, hackers could be taking advantage of apps to do more than just steal your social media photos – they might have in mind the takedown of your entire company.

As a local business owner, social engineering – a means of tricking an individual into disclosing revealing or personal information about themselves or their company – is something you definitely need to be concerned about. You might pride yourself on being too savvy to fall for a cyber criminal’s tricks, but what about your employees? Can you be sure that each and every one of them exhibits the same amount of self control, cynicism, and wariness that you do? Not only that but, as we enter a new era of online threats, the criminals that use social engineering are growing in confidence and creativity. Dodgy emails from a bizarrely named sender containing a link to an unheard-of website are yesterday’s news. Modern social engineering is highly evolved and extremely cunning, and has the potential to convince even the most streetwise internet user.

How confident are you that your entire team of employees would be completely infallible in the face of a stealth attack from a seemingly innocent source? Could you trust them to restrain from divulging not only their personal details but also information pertaining to your company? Multiply the number of employees in your company by the number of phone apps they potentially use, and add to that the fact that any one of them could at any time be targeted by a social engineering scam, and the end result is a less-than-perfect security posture.

The sad fact is that there are people who want to do you harm – regardless of whether you hold confidential information about celebrity salaries, or are privy to a database full of cheating spouses. People, no matter how well meaning or vigilant, are the weakest link in any security chain, which means that ensuring your business’s safety necessitates educating your staff and ensuring that your network is impenetrable.

Professional training and a vulnerability assessment are two great places to start, so why not get in touch with us? We’ll make sure your business is as hack-proof as it can be.

Published with permission from TechAdvisory.org. Source.

The post IT security predictions for 2016 appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/it-security-predictions-for-2016/feed/ 0