508-909-5961 [email protected]

Ransomware protection for Windows 10

The development of global ransomware attacks like WannaCry is a worrying trend for many computer users, especially for those with outdated Windows PCs. Fortunately, Microsoft is adding some much needed security features in Windows 10 to help keep users safe.

The post Ransomware protection for Windows 10 appeared first on Complete Technology Resources, Inc..

Ransomware protection for Windows 10

The development of global ransomware attacks like WannaCry is a worrying trend for many computer users, especially for those with outdated Windows PCs. Fortunately, Microsoft is adding some much needed security features in Windows 10 to help keep users safe. If you are a Windows user, here’s why you can’t afford to miss this critical update.

Controlled folders
With Microsoft’s new Controlled folders access feature, you can list certain documents and folders as “protected.” Only whitelisted apps can access and edit these folders, while any attempted changes by malicious apps are simply blocked by Windows Defender.

In theory, this should slow down a ransomware’s ability to encrypt critical information. Some reports suggest that other threats like malicious file macros and viruses can be prevented by this feature.

So far, only Windows Insider users have access to controlled folders. But if you’ve already signed up, you can access the feature by going to Windows Defender Security Center and then enabling Controlled folder access. From here, you can choose which folders will be protected and what apps are allowed to access them. To save you time, common Microsoft applications are trusted automatically, but you can remove them from your whitelist whenever you want.

Application Guard
Apart from folder protection, Microsoft also made security enhancements for web browsers. The Windows Defender Application Guard is designed to prevent intrusions, using Microsoft’s Hyper-V virtual machine technology to detect and isolate compromised applications from the rest of your system. So if someone accidentally downloads a virus from their web browser, Application Guard will contain the threat before it infiltrates the rest of your company’s devices, apps, data, and network.

Device Guard
In a similar vein, the Device Guard feature, which is also found in the Windows Defender Security Center, minimizes computer exposure to malware by using advanced threat detection policies to make sure only approved code is running throughout the system. This is meant to add an extra layer of defense in between your firewall and antivirus software.

As mentioned, Windows Insider users can get early access to these security features, but if you want to make sure that these security features are as strong as they can be, we suggest you wait for their public release around September for the Fall Creators update.

Want to stay on top of the latest technologies that can help you beat ransomware, viruses, and other nasty cyberattacks? Contact us today for any security updates and advice.

Published with permission from TechAdvisory.org. Source.

The post Ransomware protection for Windows 10 appeared first on Complete Technology Resources, Inc..

Read More

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry -- a ransomware deemed ‘one of the worst in history’ -- many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small and large organizations.

The post Nyetya ransomware: what you need to know appeared first on Complete Technology Resources, Inc..

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry -- a ransomware deemed ‘one of the worst in history’ -- many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small and large organizations. Here’s everything we know about it so far.

Worse than WannaCry

Nyetya is deemed worse than WannaCry mainly because it spreads laterally, meaning it targets computers within networks and affects even systems that have been patched. Because it also spreads internally, it needs to infect only one device to affect several others within a single network.

Cyber researchers trace its origins to a tax accounting software called MEDoc, which infected 12,500 systems in Ukraine. Since the initial infections in June, it has spread to thousands of networks in 64 countries. And although it hasn’t spread as fast as WannaCry, it might have a wider reach soon because it uses three attack pathways to infect a system. It hasn’t made as much money as WannaCry, which is why cyber researchers are concluding that the attacks are not economically motivated.

Don’t pay the ransom

Cyber security firms and researchers strongly recommend affected businesses to avoid paying the ransom. According to them, paying the ransom would be a waste since the infected user won’t be able to receive a decryption key to unlock their files or systems. This is because the email provider has blocked the email address on the ransomware message.

Although it operates like a ransomware -- locking hard drives and files and demands a $300 ransom in Bitcoin -- it functions more as a wiperware that aims to permanently wipe out data and/or destroy systems. So far, it has affected big-name multinationals in various industries, including Merck, Mondelez International, and AP Moller-Maersk, among others.

Perform backups and update outdated security patches

The only way businesses can be protected is by performing backups and staying on top of patch updates.

It’s safe to say that in case of a Nyetya attack, there’s no chance of getting back your data. In such a scenario, you would have only your backup files -- whether on an external storage or in the cloud -- to fall back on. But backing up is not enough; you should also ensure that your backups are working, which you can do by testing them regularly. Given the nature of Nyetya, you should also make sure that your backups are stored off-site and disconnected from your network.

Like its predecessor, Nyetya exploited vulnerabilities in unpatched Microsoft-run computers. As a business owner, make it a part of your cyber security routine to update your systems with the latest security patches, or risk having your files or systems permanently corrupted.

As a business owner whose operations’ lifeline depends on critical files, your backups are your insurance. If your systems’ network security needs another layer of protection, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

The post Nyetya ransomware: what you need to know appeared first on Complete Technology Resources, Inc..

Read More

What’s new in macOS High Sierra?

macOS High Sierra’s public beta is now available and it happens to be the first full OS upgrade since Snow Leopard. Despite that, the new OS’ most notable enhancements are not about features per se, but rather speed and future proofing Apple’s technology.

The post What’s new in macOS High Sierra? appeared first on Complete Technology Resources, Inc..

What’s new in macOS High Sierra?

macOS High Sierra’s public beta is now available and it happens to be the first full OS upgrade since Snow Leopard. Despite that, the new OS’ most notable enhancements are not about features per se, but rather speed and future proofing Apple’s technology. Having said that, here’s the latest from High Sierra.

Photos

Photos gets the most visual upgrade designed to improve user experience especially for those with numerous pictures to browse through. The toolbar has been revamped and is now customizable, allowing you to re-order sections. Media is now organized by content type, like Bursts, Live Photos, Panoramas and more.

Apple has also brought in a new editing tool with plenty of filters and basic photo-editing features like Curves, a color adjusting tool, and Selective Color, a dropper tool that allows you to choose a certain color and manipulate it according to its hue, saturation, etc. What’s more, if you’re already using other photo-editing software like Photoshop or Pixelmator, you’ll now be able to open images on those programs directly through Photos. No more going back and forth over importing images.

High Sierra’s new editing tools will also be available in the iPhone’s Live Photo feature, allowing you to crop and adjust the color of animated images in the toolbar.

Safari

Safari’s settings now feature a Website pane that allows you to customize the way you interact with different sites. You can make a site always appear in Reader Mode, shut off autoplay, apply content blockers, and more.

But the real excitement comes with Intelligent Tracking Prevention, a new feature that uses machine learning to remove cross-site tracking. This is ideal for sites with annoying tracking tendencies and eliminates things like advertising cookies, so the things you shopped for don’t follow you to every site you visit.

Useful contextual information, however, is saved for pages you actually visit so not all will be lost. This feature is activated by default but you can disable it in Safari’s settings.

New file system

Introduced at the last WWDC, Apple’s new file system, known as Apple File System (APFS), is finally seeing the light of day with High Sierra. Apple claims that APFS is a crucial component in making High Sierra its fastest operating system ever.

What’s so special about APFS? Speed, efficiency, and security. Copying large files now runs almost instantly on Apple File, plus it supports far more files than ever, letting you put nine quintillion of them onto a single volume. It’s also backwards compatible with all of your current formatted drives and features multikey encryption that integrates with all of your Apple devices.

Be warned that installation could take some time. This is because High Sierra is converting your boot drive to support the new file system. While Apple is confident that all your files will be intact, we recommend you conduct a full system backup prior to installation just to be on the safe side.

Other minor upgrades

  • Siri: You can expect a new voice for Siri just in time for the arrival of Apple’s HomePod, the company’s take on smart home assistants.
  • Metal 2: Apple’s graphics API gets VR and external GPUs support.
  • Mail: Messages are compressed differently to ensure they use up to 35 percent less space than before.
  • Spotlight: Finder’s built-in search now features flight tracking (also added to Safari). Just type in a flight number and it will provide relevant information like status, delays, gates, etc.
  • FaceTime: You can now snap a Live Photo-style moving screenshot of your conversation with another person while FaceTiming.
  • Messages: Conversations are now automatically stored in iCloud to improve syncing across Apple devices and free up local storage space.

While macOS High Sierra might not be the most exciting upgrade in Apple history, it’s an imperative one focused on refining an existing product, one that builds a solid foundation for Apple’s future technology. If you’d like to know more about other Apple products and how they can drive value for your business, just give us a call and we’ll be happy to help.

Published with permission from TechAdvisory.org. Source.

The post What’s new in macOS High Sierra? appeared first on Complete Technology Resources, Inc..

Read More

Add minutes to your day with email automation

How many routine emails would you say your sales and marketing teams send every day? If it’s not many, is that because you don’t have the resources for mass outreach campaigns? Either way, email automation is the perfect solution to staying in touch with customers and prospects without wasting company resources.

The post Add minutes to your day with email automation appeared first on Complete Technology Resources, Inc..

Add minutes to your day with email automation

How many routine emails would you say your sales and marketing teams send every day? If it’s not many, is that because you don’t have the resources for mass outreach campaigns? Either way, email automation is the perfect solution to staying in touch with customers and prospects without wasting company resources.

What is email automation?

Usually included in customer relationship management (CRM) software, email automation centers around the idea of combining your business data into emails to customers and prospects. This allows you to draft templates with placeholders for names, addresses, and other variables that the platform will match with individuals from your email list.

Even better however, is personalizing how and when your emails go out to clients. Automatically inserting customer data into an email is great, but it still requires that you draft the content that surrounds it and hit Send. Email automation grants you the ability to create templated emails that are automatically merged with client data and sent when certain conditions are met.

Examples of email automation

To really get an idea of how valuable this solution is, it’s important to see what it looks like in action. Say you own an eCommerce site that sells complementary goods, like golf clubs and golf balls. You could create a campaign wherein anytime someone buys a set of clubs, pre-written emails automatically go out one month later on how high-quality golf balls improve your handicap.

You’re not limited to two-step workflows either. Take a look at this example:

  • Step 1: Send a personalized email with a special offer on golf balls for existing customers.
  • Step 2: Send a follow-up based on how customers interacted with the offer email:
    • If a customer cashed in the offer, send a thank you email.
      • Step 3: Follow it up with a similar offer three months later.
    • If a customer visited the promo page but didn’t convert, send a promo email for another type of product, like golf bags.
      • Step 3: Follow it up with either a thank you email or another promo for golf clothes.
    • If a customer didn’t even open the email, send a survey email asking about their interests.
      • Step 3: Follow it up with email campaigns based on what they selected.

Email automation means there’s no need to micromanage your customer relationships. As long as you define the path to purchase for high-volume products, you can program workflows to nurture customers and prospects automatically.

For as little as a couple hundred bucks a month, your customer outreach campaigns can compete on the same level as your corporate counterparts with little effort from your team. Add in an expert IT provider and you have the ability to blow the competition out of the water. To learn more, contact us today!

Published with permission from TechAdvisory.org. Source.

The post Add minutes to your day with email automation appeared first on Complete Technology Resources, Inc..

Read More