508-909-5961 [email protected]

Simple ways to defend against Mac ransomwareAlthough most ransomware attacks usually target Windows PCs, this doesn’t mean Mac computers are completely safe. Ransomware attacks for Macs have occurred before, and are becoming more widespread over time. So how can you prevent ransomware from infecting your Mac? We’ve compiled some helpful security tips for you. What is ransomware? Ransomware is a type […]

The post Simple ways to defend against Mac ransomware appeared first on Complete Technology Resources, Inc..

Simple ways to defend against Mac ransomware

Although most ransomware attacks usually target Windows PCs, this doesn’t mean Mac computers are completely safe. Ransomware attacks for Macs have occurred before, and are becoming more widespread over time. So how can you prevent ransomware from infecting your Mac? We’ve compiled some helpful security tips for you.

What is ransomware?

Ransomware is a type of malicious software that holds computer systems hostage via encryption until a ransom is paid. Attackers typically threaten to release the encrypted information to the public or destroy sensitive data if victims don’t pay within a certain deadline. Healthcare and finance organizations, in particular, are more likely to pay the ransom because these organizations tend to be worth a lot of money and have many valuable assets, and can’t afford to lose access to their critical data.

As its name suggests, Mac ransomware is simply ransomware that targets Mac desktops and laptops. And just like other types of ransomware, it is typically distributed via phishing emails.

Types of Mac ransomware

In 2016, the KeRanger ransomware was distributed through the popular BitTorrent app Transmission. KeRanger was signed with an authorized security certificate, allowing it to evade macOS’s built-in security measures and infect more than 7,000 Mac computers.

Meanwhile, the Mac ransomware strain Patcher was discovered in 2017. It disguised itself as a patching app for programs like Microsoft Office. When launched, Patcher would encrypt files in user directories and ask for a Bitcoin ransom. But the ransomware was poorly built, so there was no way to retrieve the decryption key once the ransom was paid.

In 2019, the EvilQuest ransomware encrypted files and forced victims into paying a Bitcoin ransom. Much like Patcher, however, there was no decryption key, leaving those who paid the ransom with nothing.

Ransomware attacks like these can make a resurgence at any time, which is why you need to be prepared in case of an attack.

An ounce of prevention goes a long way

Preventive measures are the best way to keep your Macs safe from ransomware. This involves installing only programs from the official App Store and the latest software patches to defend against the latest threats.

Since phishing emails are the usual delivery method of ransomware, be wary of suspicious links and email attachments. Always be on alert even if the email appears to come from a legitimate company or someone you know.

You must also maintain offline backups and have a disaster recovery plan to keep your business running in the event that ransomware successfully infiltrates your systems.

Responding to ransomware

If your Mac is infected with ransomware, do not pay the ransom fee, as there’s no guarantee that hackers will provide a decryption key and release your data. Instead, use an up-to-date anti-malware program to remove ransomware from your computer. There are also free ransomware decryption tools online that you can use to remove the infection.

If these tools don’t work, contain the spread of the ransomware by disconnecting from the network. Afterwards, run data recovery procedures and immediately seek the help of our cybersecurity experts. We stay abreast of the latest Mac security threats and know just how to keep your business safe.

Published with permission from TechAdvisory.org. Source.

The post Simple ways to defend against Mac ransomware appeared first on Complete Technology Resources, Inc..

Read More

Ignore these outdated disaster recovery mythsDisaster recovery (DR) used to be an expensive solution that relied predominantly on tape backups. Today, cloud computing has dramatically changed the DR landscape, affording even small- and medium-sized businesses cheaper and more reliable DR solutions. Unfortunately, there are still plenty of misconceptions about DR. Here are three myths that no longer apply. Myth 1: […]

The post Ignore these outdated disaster recovery myths appeared first on Complete Technology Resources, Inc..

Ignore these outdated disaster recovery myths

Disaster recovery (DR) used to be an expensive solution that relied predominantly on tape backups. Today, cloud computing has dramatically changed the DR landscape, affording even small- and medium-sized businesses cheaper and more reliable DR solutions. Unfortunately, there are still plenty of misconceptions about DR. Here are three myths that no longer apply.

Myth 1: Tape backups are the best DR solution

Tape backups are physical objects that deteriorate over time. Try listening to a cassette tape from the ’90s. Its sound may be distorted already, or it probably doesn’t work at all. Similarly, your tape backups will start to fail over time. At first, only a few files may be affected, but you will gradually lose all your data.

It is also a common practice to store another set of tape backups outside your premises to secure them in case a natural disaster befalls your office. However, if your storage spaces themselves are unsafe from natural disasters, this could pose a problem.

Unlike tape backups, cloud-based backups are safe from deterioration. They are also stored in multiple secured locations that are protected from natural disasters, so your data backups are as safe as they can be.

What’s more, cloud-based backups save you time in many ways. Data is automatically backed up online, so you don’t need to manually copy information onto your tapes. You also won’t need to manage boxes of tapes, freeing you to focus on more valuable tasks.

Myth 2: The RTOs you want are too expensive

Essential to any DR plan is its recovery time objective (RTO), which is the ideal period when everything must be up and running again to avoid serious losses. Before the cloud, a “swift” recovery time would take days and cost up to six figures.

Cloud and virtualization solutions have made this much faster and affordable than ever before. Most DR providers can back up your critical data in an hour or two. And if you ever need to recover data, most services can do so in less than a day.

Myth 3: Disaster recovery is for big businesses, not SMBs

Due to the astronomical costs previously associated with DR, only big businesses could afford backup and recovery solutions. Thanks to the cloud, however, these have become more affordable for small- and medium-sized businesses (SMBs). From dental offices to small retail operations, SMBs can now take advantage of the best DR solutions in the market. Advances in IT and the cloud have also eliminated the obstacles of complexity, costs, and insufficient IT resources.

We hope that by dispelling these myths, you’d be convinced to implement a disaster recovery plan (DRP) for your business. Thanks to improvements in data storage technologies, it is now more affordable and efficient to implement a DRP, in turn making it easier to ensure BC. If you’d like to learn how our DR solutions can safeguard your business, send us a message and we’ll fill you in.

Published with permission from TechAdvisory.org. Source.

The post Ignore these outdated disaster recovery myths appeared first on Complete Technology Resources, Inc..

Read More

How to protect your business from Mac ransomwareSome of the most high-profile ransomware cases in recent memory include the WannaCry and Petya outbreaks in 2017, which infected hundreds of thousands of Windows PCs around the world. However, ransomware such as EvilQuest target Mac computers specifically. If you have a Mac, follow the security best practices below to avoid getting infected. What is […]

The post How to protect your business from Mac ransomware appeared first on Complete Technology Resources, Inc..

How to protect your business from Mac ransomware

Some of the most high-profile ransomware cases in recent memory include the WannaCry and Petya outbreaks in 2017, which infected hundreds of thousands of Windows PCs around the world. However, ransomware such as EvilQuest target Mac computers specifically. If you have a Mac, follow the security best practices below to avoid getting infected.

What is Mac ransomware?

Ransomware is a type of malicious software that holds computer systems hostage until a ransom is paid in gift cards, or cryptocurrency like Bitcoin or Ethereum. It’s typically distributed using phishing emails, but it can also spread via unsecured networks.

When Macs are infected by ransomware, users won’t be able to access their data since it’s encrypted. Ransomware messages may also threaten to release the information to the public or destroy sensitive data if victims don’t pay within a certain deadline. Healthcare and finance organizations, in particular, are more likely to pay the ransom because these organizations tend to have a lot of valuable assets, including money, and can't afford to lose access to their critical data.

Types of Mac ransomware

In 2016, the KeRanger ransomware was distributed through the popular BitTorrent app Transmission. KeRanger was signed with an authorized security certificate, allowing it to evade macOS's built-in security measures and infect more than 7,000 Mac computers.

Patcher was another strain of Mac ransomware that was discovered in 2017. This type of ransomware disguised itself as a patching app for programs like Microsoft Office. When launched, Patcher would encrypt files in user directories and ask for a ransom paid in Bitcoin. But the ransomware was poorly built, so there was no way to retrieve the decryption key once the ransom was paid.

In 2019, the EvilQuest ransomware encrypted files and tried to trick users into paying a Bitcoin ransom. Much like Patcher, however, there was no feature to decrypt files after paying, leaving those who paid the ransom with nothing.

Ransomware attacks like these can make a resurgence at any time, which is why you need to be prepared in case of an attack.

An ounce of prevention goes a long way

Preventive measures are the best way to keep your Macs safe from ransomware. This involves updating your software regularly to defend against the latest threats and only installing programs from the official App Store.

Since ransomware initially infects computers using phishing emails, make sure to avoid suspicious links and email attachments. Always be on alert even if the email appears to come from a legitimate company or someone you know.

You must also maintain offline backups and have a disaster recovery plan to keep your business running in the off chance that ransomware successfully infiltrates your systems.

Responding to ransomware

If your Mac is infected with ransomware, do not pay the ransom fee, as there's no guarantee that hackers will provide a decryption key and release your data even if you give in to their demands.

Instead, use an up-to-date anti-malware program to remove ransomware from your computer. Cybersecurity experts may also release free ransomware decryptor tools to remove the infection, so keep an eye out for these on the internet. If these programs and tools don’t work, contain the spread of the ransomware by disconnecting from the network and run data recovery procedures, provided you’ve backed up your data in an external hard drive or the cloud.

Mac ransomware attacks may not be common, but they still pose a great threat to your business. If you need more guidance, contact our team of security experts today. We stay abreast of the latest Mac security threats and know just how to keep your business safe.

Published with permission from TechAdvisory.org. Source.

The post How to protect your business from Mac ransomware appeared first on Complete Technology Resources, Inc..

Read More

The pitfalls of business continuity planningIf your managed IT services provider has been using the same business continuity plan (BCP) for years, your organization may be in trouble. BCPs should continuously be updated so you avoid overlooking or underestimating certain issues. Not updating your BCP is just one mistake that can harm your business. Here are a few more you […]

The post The pitfalls of business continuity planning appeared first on Complete Technology Resources, Inc..

The pitfalls of business continuity planning

If your managed IT services provider has been using the same business continuity plan (BCP) for years, your organization may be in trouble. BCPs should continuously be updated so you avoid overlooking or underestimating certain issues. Not updating your BCP is just one mistake that can harm your business. Here are a few more you should avoid.

Over-optimistic testing

The initial testing attempt is usually the most important, because it's when MSPs can pinpoint potential pain points in the recovery plan. However, they usually test the system in full, instead of in phases. This can cause MSPs to overlook specific points, with too many factors overwhelming them all at the same time.

Insufficient remote user licenses

MSPs give remote user licenses to businesses so that employees can access a remote desktop software when they need to, like when a disaster strikes. However, a provider may only have a limited number of licenses. In some cases, more employees will need access to the remote desktop software than a provider’s license can allow.

Lost digital IDs

When a disaster strikes, employees will usually need their digital IDs so they can log in to the MSP’s remote system while the office system is being restored. However, digital IDs are not automatically saved when a desktop is backed up. So when an employee uses their “ready and restored” desktop, they are unable to access the system with their previous digital ID.

Absence of a communications strategy

MSPs often use email to notify and communicate with business owners and their employees when a disaster happens. However, this form of communication may not always be reliable in certain cases, such as during spam intrusions.

Instead, you can use emergency communication applications such as AlertMedia or Everbridge. These programs automate necessary actions such as sending out mass notifications, sharing information, and mobilizing teams to prevent operational disruptions, so your MSP can easily notify you in case of any disaster.

Backups that require labored validation

After a system has been restored, IT technicians and business owners need to check whether the restoration is thorough and complete. This becomes an arduous task when the log reports are not easy to compare. This usually happens when MSPs utilize backup applications that don’t come with their own log modules and have to be acquired separately.

These are just some reasons why business continuity plans fail. While you should trust that your MSPs will secure your systems, it is important for business owners to be involved with any process that pertains to your IT infrastructure. Just because you believe something works doesn’t necessarily mean that it actually does. If you have questions regarding your business continuity plan, get in touch with our experts today.

Published with permission from TechAdvisory.org. Source.

The post The pitfalls of business continuity planning appeared first on Complete Technology Resources, Inc..

Read More