508-909-5961 [email protected]

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.

The post Know these types of malware to stay protected appeared first on Complete Technology Resources, Inc..

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc. Here’s how different types of malware work and how you can avoid falling victim.

Viruses

Once created to annoy users by making small changes to their computers, like altering wallpapers, this type of malware has evolved into a malicious tool used to breach confidential data. Most of the time, viruses work by attaching themselves to .exe files in order to infect computers once the file has been opened. This can result in various issues with your computer’s operating system, at their worst, rendering your computer unusable.

To avoid these unfortunate circumstances, you should scan executable files before running them. There are plenty of antivirus software options, but we recommend choosing one that scans in real-time rather than manually.

Spyware

Unlike viruses, spyware doesn’t harm your computer, but instead, targets you. Spyware attaches itself to executable files and once opened or downloaded, will install itself, often times completely unnoticed. Once running on your computer, it can track everything you type, including passwords and other confidential information. Hackers can then use this information to access your files, emails, bank accounts, or anything else you do on your computer.

But don’t panic just yet, you can protect yourself by installing anti-spyware software, sometimes included in all-purpose “anti-malware” software. Note that most reputable antivirus software also come bundled with anti-spyware solutions.

Adware

Are you redirected to a particular page every time you start your browser? Do you get pop ups when surfing the internet? If either situation sounds familiar, you’re likely dealing with adware. Also known as Potential Unwanted Programs (PUP), adware isn’t designed to steal your data, but to get you to click on fraudulent ads. Whether you click on the ad or not, adware can significantly slow down your computer since they take up valuable bandwidth. Worse still, they’re often attached with other types of malware.

Some adware programs come packaged with legitimate software and trick you into accepting their terms of use, which make them especially difficult to remove. To eradicate adware, you’ll need a solution with specialized adware removal protocols.

Scareware

This type of malware works like adware except that it doesn’t make money by tricking you into clicking on ads, but by scaring you into buying a software you don’t need. An example is a pop up ad that tells you your computer is infected with a virus and you need to buy a certain software to eliminate it. If you fall for one of these tactics and click on the ad, you’ll be redirected to a website where you can buy the fake antivirus software.

Scareware acts more like a diversion from the other malware that often comes with it. A good antivirus solution will help scan for scareware too, but you should patch your operating systems regularly just to be safe.

Ransomware

Ransomware has become increasingly common and hostile. It encrypts your computer files and holds them hostage until you’ve paid a fee for the decryption code. Because ransomware comes with sophisticated encryption, there aren’t many options unless you have backups of your data.

There are some tools that can protect against ransomware but we recommend that you backup your data and practice safe web browsing habits.

Worms

Similar to viruses, worms replicate themselves to widen the scope of their damage. However, worms don’t require human intervention to replicate themselves as they use security flaws to transmit from one computer to the next, making them far more dangerous than your typical virus. They often spread via email, sending emails to everyone in an infected user’s contact list, which was exactly the case with the ILOVEYOU worm that cost businesses approximately $5.5 billion worth of damage.

The easiest ways to protect your network from worms is to use a firewall to block external access to your computer network, and to be careful when clicking on unknown links in your email or unknown messages on social media.

Trojans

Usually downloaded from rogue websites, Trojans create digital backdoors that allow hackers to take control of your computer without your knowledge. They can steal your personal information, your files, or cause your computer to stop working. Sometimes hackers will use your computer as a proxy to conceal their identity or to send out spam.

To avoid trojan attacks, you should never open emails or download attachments from unknown senders. If you’re skeptical, use your antivirus software to scan every file first.

In order to keep malware at bay, you need to invest in security solutions with real-time protection and apply security best practices within your office. If you have any questions or concerns, or simply need advice on how to strengthen your business’s security, just give us a call and we’ll be happy to help.

Published with permission from TechAdvisory.org. Source.

The post Know these types of malware to stay protected appeared first on Complete Technology Resources, Inc..

Read More

Tips and tricks for avoiding IoT threats

Internet of Things (IoT) devices have become more popular with businesses in recent years. This is largely because they can keep track of large amounts of information, analyze data patterns, and streamline business processes. But as you introduce more internet-connected devices into the office space, you may be exposing your business to attacks.

The post Tips and tricks for avoiding IoT threats appeared first on Complete Technology Resources, Inc..

Tips and tricks for avoiding IoT threats

Internet of Things (IoT) devices have become more popular with businesses in recent years. This is largely because they can keep track of large amounts of information, analyze data patterns, and streamline business processes. But as you introduce more internet-connected devices into the office space, you may be exposing your business to attacks.

Set passwords
Many often forget they can set passwords for IoT devices. When this happens, they tend to leave their gadgets with default passwords, essentially leaving the door open for hackers. Make sure to set new and strong passwords -- preferably with a combination of upper and lower case letters, numbers, and symbols -- for each device connected to your network. Then, use a password manager to securely keep track of all your passwords.

Disable Universal Plug and Play (UPnP)
UPnP is designed to help IoT gadgets discover other network devices. However, hackers can also exploit this feature to find and connect to your IoT devices. To prevent them from getting to your network, it’s best to disable this feature completely.

Create a separate network
When you’re dealing with IoT devices, it’s wise to quarantine them in a separate network unconnected to your main office network. By doing this, user gadgets will still have access to the internet but won’t be able to access mission-critical files.

You should also consider investing in device access management tools. These allow you to control which devices can access what data, and prevent unauthorized access.

Update your firmware
If you want to keep your devices secure against the latest attacks, then you need to keep your IoT software up to date. Security researchers are always releasing security patches for the most recent vulnerabilities, so make it a habit to regularly check for and install IoT firmware updates. If you have several gadgets to secure, use patch management software to automate patch distribution and set a schedule to check for updates monthly.

Unplug it
Disconnecting your IoT devices from the internet (or turning them off completely) whenever you don’t need them significantly reduces how vulnerable you are to an attack. Think about it, if there’s nothing to target, hackers won’t be able to make their move. Turning your IoT devices on and off again may not seem like the most convenient strategy, but it does deny unauthorized access to your router.

Unfortunately, as IoT devices become more commonplace in homes and offices, more hackers will develop more cunning ways to exploit them. Getting into the above mentioned security habits can protect you from a wide variety of IoT attacks, but if you really need to beef up your security, then contact us today. We have robust security solutions that keep your hardware safe.

Published with permission from TechAdvisory.org. Source.

The post Tips and tricks for avoiding IoT threats appeared first on Complete Technology Resources, Inc..

Read More

Ransomware protection for Windows 10

The development of global ransomware attacks like WannaCry is a worrying trend for many computer users, especially for those with outdated Windows PCs. Fortunately, Microsoft is adding some much needed security features in Windows 10 to help keep users safe.

The post Ransomware protection for Windows 10 appeared first on Complete Technology Resources, Inc..

Ransomware protection for Windows 10

The development of global ransomware attacks like WannaCry is a worrying trend for many computer users, especially for those with outdated Windows PCs. Fortunately, Microsoft is adding some much needed security features in Windows 10 to help keep users safe. If you are a Windows user, here’s why you can’t afford to miss this critical update.

Controlled folders
With Microsoft’s new Controlled folders access feature, you can list certain documents and folders as “protected.” Only whitelisted apps can access and edit these folders, while any attempted changes by malicious apps are simply blocked by Windows Defender.

In theory, this should slow down a ransomware’s ability to encrypt critical information. Some reports suggest that other threats like malicious file macros and viruses can be prevented by this feature.

So far, only Windows Insider users have access to controlled folders. But if you’ve already signed up, you can access the feature by going to Windows Defender Security Center and then enabling Controlled folder access. From here, you can choose which folders will be protected and what apps are allowed to access them. To save you time, common Microsoft applications are trusted automatically, but you can remove them from your whitelist whenever you want.

Application Guard
Apart from folder protection, Microsoft also made security enhancements for web browsers. The Windows Defender Application Guard is designed to prevent intrusions, using Microsoft’s Hyper-V virtual machine technology to detect and isolate compromised applications from the rest of your system. So if someone accidentally downloads a virus from their web browser, Application Guard will contain the threat before it infiltrates the rest of your company’s devices, apps, data, and network.

Device Guard
In a similar vein, the Device Guard feature, which is also found in the Windows Defender Security Center, minimizes computer exposure to malware by using advanced threat detection policies to make sure only approved code is running throughout the system. This is meant to add an extra layer of defense in between your firewall and antivirus software.

As mentioned, Windows Insider users can get early access to these security features, but if you want to make sure that these security features are as strong as they can be, we suggest you wait for their public release around September for the Fall Creators update.

Want to stay on top of the latest technologies that can help you beat ransomware, viruses, and other nasty cyberattacks? Contact us today for any security updates and advice.

Published with permission from TechAdvisory.org. Source.

The post Ransomware protection for Windows 10 appeared first on Complete Technology Resources, Inc..

Read More

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry -- a ransomware deemed ‘one of the worst in history’ -- many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small and large organizations.

The post Nyetya ransomware: what you need to know appeared first on Complete Technology Resources, Inc..

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry -- a ransomware deemed ‘one of the worst in history’ -- many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small and large organizations. Here’s everything we know about it so far.

Worse than WannaCry

Nyetya is deemed worse than WannaCry mainly because it spreads laterally, meaning it targets computers within networks and affects even systems that have been patched. Because it also spreads internally, it needs to infect only one device to affect several others within a single network.

Cyber researchers trace its origins to a tax accounting software called MEDoc, which infected 12,500 systems in Ukraine. Since the initial infections in June, it has spread to thousands of networks in 64 countries. And although it hasn’t spread as fast as WannaCry, it might have a wider reach soon because it uses three attack pathways to infect a system. It hasn’t made as much money as WannaCry, which is why cyber researchers are concluding that the attacks are not economically motivated.

Don’t pay the ransom

Cyber security firms and researchers strongly recommend affected businesses to avoid paying the ransom. According to them, paying the ransom would be a waste since the infected user won’t be able to receive a decryption key to unlock their files or systems. This is because the email provider has blocked the email address on the ransomware message.

Although it operates like a ransomware -- locking hard drives and files and demands a $300 ransom in Bitcoin -- it functions more as a wiperware that aims to permanently wipe out data and/or destroy systems. So far, it has affected big-name multinationals in various industries, including Merck, Mondelez International, and AP Moller-Maersk, among others.

Perform backups and update outdated security patches

The only way businesses can be protected is by performing backups and staying on top of patch updates.

It’s safe to say that in case of a Nyetya attack, there’s no chance of getting back your data. In such a scenario, you would have only your backup files -- whether on an external storage or in the cloud -- to fall back on. But backing up is not enough; you should also ensure that your backups are working, which you can do by testing them regularly. Given the nature of Nyetya, you should also make sure that your backups are stored off-site and disconnected from your network.

Like its predecessor, Nyetya exploited vulnerabilities in unpatched Microsoft-run computers. As a business owner, make it a part of your cyber security routine to update your systems with the latest security patches, or risk having your files or systems permanently corrupted.

As a business owner whose operations’ lifeline depends on critical files, your backups are your insurance. If your systems’ network security needs another layer of protection, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

The post Nyetya ransomware: what you need to know appeared first on Complete Technology Resources, Inc..

Read More