508-909-5961 [email protected]

Cyber weapons for sale by dangerous hackers

“Script kiddies” are a type of computer hacker that copies malware programs from more experienced creators and put their own name on it. WannaCry was programmed by script kiddies, and the group they stole the malware from is selling a new set of vulnerabilities.

The post Cyber weapons for sale by dangerous hackers appeared first on Complete Technology Resources, Inc..

Cyber weapons for sale by dangerous hackers

“Script kiddies” are a type of computer hacker that copies malware programs from more experienced creators and put their own name on it. WannaCry was programmed by script kiddies, and the group they stole the malware from is selling a new set of vulnerabilities.

Who are the ShadowBrokers?

There are several theories about who the members of this hacker group are -- from National Security Agency (NSA) employees to Russian operatives -- but all these theories are based on unreliable information. All we know for sure is that the ShadowBrokers are using social media to sell a seemingly endless trove of cybersecurity secrets.

What are they selling?

The ShadowBrokers’ first auction was in August of 2016, promising in broken English that the highest bidder would receive security vulnerabilities on par with government cyber weapons. Over the year that followed, the ShadowBrokers used auctions, crowdfunding, and direct sales to release vulnerabilities that all seemed to come from the NSA.

In April of 2017, the fifth release went public and was characterized by one security expert as “the most damaging thing I've seen in the last several years.” It included the ETERNALBLUE Windows vulnerability that allowed WannaCry to infect over 300,000 computers in a single day.

The September 2017 release

In a recent announcement, the ShadowBrokers announced a subscription service that will include access to bi-monthly security exploit releases. The first package included an NSA exploit named UNITEDRAKE, which allows hackers to remotely monitor or control a computer running any of the following versions of Microsoft’s operating system:

  • Windows XP
  • Windows Vista
  • Windows Server 2003/2008/2012
  • Windows 7 (if no updates have been installed)
  • Windows 8

The UNITEDRAKE exploit can secretly record audio from your microphone, video from your webcam and anything that is typed while you are logged in. It can also remove itself from the target computer leaving no signs of a breach.

How to protect yourself from ShadowBrokers releases

To date, all the known NSA security exploits and ShadowBrokers releases have targeted older and outdated versions of software. The best thing you can do to protect your computers is keep your operating systems and software applications patched with the most recent vendor updates.

Advanced network monitoring can detect suspicious activity, but that requires a significant amount of time and IT expertise. Small- and medium-sized businesses usually don’t have the resources to handle 24x7 network supervision, but our team can help.

If you need help securing your business and its information from cyber threats, give us a call today.

Published with permission from TechAdvisory.org. Source.

The post Cyber weapons for sale by dangerous hackers appeared first on Complete Technology Resources, Inc..

Read More

Office 365 web app launcher improvements

Do you sometimes wish you could get to your Office 365 applications faster? Microsoft has tweaked the Office 365 web app launcher so you not only get to your apps faster, but you also get to view your most relevant programs, files, contacts, and activities more conveniently.

The post Office 365 web app launcher improvements appeared first on Complete Technology Resources, Inc..

Office 365 web app launcher improvements

Do you sometimes wish you could get to your Office 365 applications faster? Microsoft has tweaked the Office 365 web app launcher so you not only get to your apps faster, but you also get to view your most relevant programs, files, contacts, and activities more conveniently. Here’s how it can make you more productive.

Key changes to the Office 365 main page

The newly added “Recommended” section displays activities -- comments, edits, and @ mentions -- on recently opened files. This gives users an overview of changes to recent documents.

Underneath the “Recommended” section is the “Recent” document column, which shows the most recent activities, while “Places” displays the SharePoint sites you frequently visit and the OneDrive folders you’ve recently accessed.

Being able to see the edits, shares, and comments on your documents makes collaboration more transparent among users within an organization, and these new upgrades make that possible.

What’s more, you can now search among online documents, web apps, SharePoint sites, and contacts within Office.com without having to open individual apps. For example, when searching for a document whose file name you don’t know, you can type in the name of the author and the results will show you the author’s profile and other relevant files and activities.

Web app launcher enhancements

One of the biggest improvements to Office.com, however, is how apps are displayed in the app launcher.

The main window of the new web app launcher has been redesigned to highlight the most frequently used apps. It will still show all the apps within your Office 365 subscription, but you can pin your most used apps or display all items in the main bar, which makes opening and switching between apps a lot easier.

You can also return to the main page with a single click of the Office 365 button from the App Launcher -- no need to minimize or close each app.

Office 365 Gallery

Users aren't always aware of every application included in their subscription, which is what the Office 365 Gallery is for. Its main function is to provide users with personalized suggestions of applications -- and their descriptions -- which may be useful to their active tasks. These suggestions include links to mobile and desktop-based versions of the applications they recommend, and resources for learning more about them. To access the Gallery, click “Explore your applications” from the Office.com main page.

Each of the changes in the new and improved Office 365 are aimed at simplifying and personalizing business users’ experiences, and we recommend exploring the tools available to you. Call us to know more about Office 365’s productivity-enhancing applications and features.

Published with permission from TechAdvisory.org. Source.

The post Office 365 web app launcher improvements appeared first on Complete Technology Resources, Inc..

Read More

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: Don’t walk in the footsteps of Equifax.

The post Equifax’s Leak: lessons learned appeared first on Complete Technology Resources, Inc..

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: Don’t walk in the footsteps of Equifax.

What happened to Equifax?

Equifax, the huge American credit agency announced in September 2017 that its database was hacked, resulting in a leak of tons of consumers' private data, including personally identifiable information of around 143 million US citizens. It included names, social security numbers, addresses, birthdates, and credit card and driver’s license numbers.

Equifax responded by setting up a new site, www.equifaxsecurity2017.com, to help its customers determine whether they had been affected and to provide more information about the incident.

Soon after, Equifax’s official Twitter account tweeted a link that directed customers to www.securityequifax2017.com, which is actually a fake site.

Fortunately for Equifax’s customers, the fake phishing site was set up by a software engineer who wanted to use it for educational purposes and to expose flaws in Equifax’s incident response practice. So, no further harm was done to the already-damaged customers, and Equifax is left with even more embarrassment.

So what did Equifax do wrong?

One of the huge mistakes Equifax made in responding to its data breach was setting up a new website to give updated information to its consumers outside of its main domain, equifax.com.

Why? You first need to know that since the invention of phishing scams, phishers have been creating fake versions of big companies’ websites. That’s why so many major corporations buy domains that are the common misspellings of their real domains.

You should also know that phishers can’t create a web page on the company’s main domain, so if Equifax’s new site was hosted there, it’d be easy for customers to tell whether the new page was legitimate and not be fooled by a fake domain name.

What’s obvious from this embarrassing misstep is that Equifax had never planned for a data leak. And this is an unforgivable oversight by a company that handles the information of over 800 million consumers and more than 88 million businesses worldwide.

Don’t repeat Equifax’s mistake

Whether your business is a small startup or as big as Equifax, it needs to prepare for a data breach. Besides having a comprehensive network defense plan, you also need to have the right incident response plan in place.

So what you should do after you’ve discovered the leak is, first of all, be upfront with your customers and notify them as soon as possible.

You also need to establish a message that includes the following information:

  • How the leak occurred
  • How the leak could affect your customers
  • How you will prevent future attacks
  • What your company will do to support affected customers

You should also create a web page to keep your customers up to date. But remember, the new web page should be under your company’s primary domain name.

As we’ve seen from Equifax, an incident response plan that's robust is a must. Feel free to talk to our experts about how you can come up with an acute one -- so you won’t have to repeat Equifax’s apologetic statement, since it doesn’t help the company redeemged reputation at all.

Published with permission from TechAdvisory.org. Source.

The post Equifax’s Leak: lessons learned appeared first on Complete Technology Resources, Inc..

Read More

IoT security challenges for healthcare

From mobile apps that assist with taking medicine on time to smart appliances that monitor vitals, the Internet of Things (IoT) is becoming ubiquitous in healthcare. However, IoT’s expansion brings new risks, vulnerabilities, and security challenges for healthcare practitioners and their patients.

The post IoT security challenges for healthcare appeared first on Complete Technology Resources, Inc..

IoT security challenges for healthcare

From mobile apps that assist with taking medicine on time to smart appliances that monitor vitals, the Internet of Things (IoT) is becoming ubiquitous in healthcare. However, IoT’s expansion brings new risks, vulnerabilities, and security challenges for healthcare practitioners and their patients.

IoT security risks
Devices that contain a treasure trove of patient data are attractive targets for cybercriminals. Healthcare apps, for instance, contain plenty of sensitive information, including social security numbers, prescriptions, and medical histories. Should hackers ever get a hold of this information, they’ll be able to create fake IDs to buy drugs or medical equipment to resell.

In certain cases, an attacker could have direct control over IoT equipment, causing potentially lethal results.

In 2011, Johnson & Johnson warned patients about unsecured insulin pumps that allowed hackers to make unauthorized insulin injections. Even more terrifying, the FDA recently discovered almost half a million pacemakers were vulnerable to attacks and can be controlled (or shut down) remotely.

Vulnerable medical devices are also gateways to a secured network. Hackers can use compromised IoT devices to sneak ransomware and other types of malware onto a network, causing service disruptions and preventing practitioners from providing responsive treatment.

There are, however, a few things you can do to defend against these attacks.

Use multi-factor authentication
Multi-factor authentication forces users to provide more information than just their username and password (e.g., SMS code, fingerprint, or retinal scan). By enabling this on your networks and devices, hackers will have a more difficult time accessing mission-critical data.

Encrypt your data
Another way to protect your business and your patients from a massive data breach is with encryption. Encoding electronic health records while they’re being transmitted or left in storage prevents hackers from reading and stealing sensitive information.

If possible, everything that is transmitted across your network should be encrypted automatically to secure the communication between IoT devices.

Install intrusion prevention systems
Since most IoT attacks are delivered via the internet, intrusion prevention systems are crucial to identify and block anomalies attempting to gain access to your network. This means hackers who try to remotely access or shut down your IoT equipment will be stopped before they damage your systems.

Security updates
Last but not least, IoT manufacturers occasionally release security patches for their gadgets. Get in the habit of downloading these updates as soon they’re rolled out to ensure your device is safe from the latest threats.

When it comes to security, healthcare institutions have their work cut out for them. But whether you’re dealing with hardware security, data privacy, or compliance, it’s a good idea to partner with a managed services provider that specializes in helping the medical industry.

Call us today to see what we can do to protect you and your patients.

Published with permission from TechAdvisory.org. Source.

The post IoT security challenges for healthcare appeared first on Complete Technology Resources, Inc..

Read More