4
Issue January 2017 Insider The IT Ransomware Demands P. 1 Cyber Threats in 2017 P. 2 Small Business Computers P. 3 Increase Producvity P. 4 The owner of a small busi- ness has enough to worry about without adding online security to the mix. But with the proliferation of smart de- vices that come in everything from Fit Bits to smoke alarms, hackers are now able to ac- cess sensitive information. Read on to find out about the Internet of Things(IoT) scanner that can keep your business away from the hack- er's radar. The Dangers of IoT The "Internet of Things" is a relatively new phrase that basically refers to a network of connected devices. The network might include your computer and smartphone, but could also include apps that you have downloaded, your Fitbit, a remotely moni- tored home security system, routers, printers and any other wireless device that needs an internet connection. Although all these devices are but con- venience items, they can also be potentially dangerous con- sidering how much personal and business information is stored on your personal com- puter, which is connected to the same network. How can I protect my IoT devices? Every device that connects to the internet must connect through your network. If you are technologically challenged and have only a laptop in your office and a couple of desktop computers scattered through- out the building, chances are you don't worry too much about the security of your connection. It's easy to install a firewall and antivirus pro- gram that will keep your net- work connection secure. But internet security isn't that simple for the business owner anymore. It's scary to think you can be simply brows- ing the Internet when WHAM! a screen pops up out of nowhere claiming that you have been hijacked and will need to pay a bitcoin to free your computer. Unfortunately, ransomware like this is not uncommon. But now there's a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer information back safely. Read on to find out how Popcorn Time is turning the ransom game on its head -- and how you can pro- tect yourself from it. Ransomware is nothing new. Cybersecurity miscreants have been taking advantage of online users for years by requiring payment to "unlock" a victim's computer. What Pop- corn Time does differently is give users the option to spread the virus to two other vic- tims in the hopes that they will pay the ran- som -- a tactic that promises to double their money at the expense of your sense of mo- rality (and at the expense of your friend- ships as well). The Cost of Popcorn When you inadvertently download this ran- somware, you will be met with a screen that explains that your files have been hijacked/ encrypted, and that to get them back you will need to pay one Bitcoin for a decryption The Bitcoin fee is usually more than $700, a hefty price to pay during any season but particularly difficult for those infected during the holiday season. Spread the "Holiday Cheer" and Hope they Bite What makes Popcorn Time unique is the option victims have to take their cost away by allowing the ransomware to affect two of their friends for a chance to get a free de- cryption code. Of course, it works only if both friends pay the ransom, which leaves you looking (and feeling) like the Grinch. Avoiding Popcorn Time this Season The easiest way to avoid downloading ran- somware is to stay off of sites that might contain questionable files. However, this is nearly impossible for modern users, and many hackers are getting good at making their files look legitimate. Limit your expo- sure to potential ransomware by keeping your software up-to-date and your computer protected with a security program from a reputable company (for example Norton or Symantec). If you need to learn more about how to avoid running into ransomware while you're online, give our professional cyberse- curity consultants a call. We'll keep you away from the popcorn this season. Main Phone: 732-716-4109 Fax: 732-716-4169 Email: [email protected] Website: www.ocitcs.com Choose The Right Computer P. 3 IOT Scanner Reveals P. 1 IOT Scanner (connued) P. 2 Get More Free Tips, Tools and Services At Our Web Site: www.OCITCS.com 732-716-4109

The IT Insider...ransomware like this is not uncommon. But now there's a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The IT Insider...ransomware like this is not uncommon. But now there's a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer

Issue January 2017

Insider The IT

Ransomware Demands P. 1

Cyber Threats in 2017 P. 2

Small Business Computers P. 3

Increase Productivity P. 4

The owner of a small busi-ness has enough to worry about without adding online security to the mix. But with the proliferation of smart de-vices that come in everything from Fit Bits to smoke alarms, hackers are now able to ac-cess sensitive information. Read on to find out about the “Internet of Things” (IoT) scanner that can keep your business away from the hack-er's radar. The Dangers of IoT The "Internet of Things" is a relatively new phrase that basically refers to a network of connected devices. The network might include your computer and smartphone, but could also include apps that you have downloaded, your Fitbit, a remotely moni-tored home security system, routers, printers and any other wireless device that needs an internet connection. Although all these devices are but con-venience items, they can also be potentially dangerous con-sidering how much personal and business information is stored on your personal com-puter, which is connected to the same network. How can I protect my IoT devices? Every device that connects to the internet must connect through your network. If you are technologically challenged and have only a laptop in your office and a couple of desktop computers scattered through-out the building, chances are you don't worry too much about the security of your connection. It's easy to install a firewall and antivirus pro-gram that will keep your net-work connection secure. But internet security isn't that simple for the business owner anymore.

It's scary to think you can be simply brows-ing the Internet when WHAM! a screen pops up out of nowhere claiming that you have been hijacked and will need to pay a bitcoin to free your computer. Unfortunately, ransomware like this is not uncommon. But now there's a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer information back safely. Read on to find out how Popcorn Time is turning the ransom game on its head -- and how you can pro-tect yourself from it.

Ransomware is nothing new. Cybersecurity miscreants have been taking advantage of online users for years by requiring payment to "unlock" a victim's computer. What Pop-corn Time does differently is give users the option to spread the virus to two other vic-tims in the hopes that they will pay the ran-som -- a tactic that promises to double their money at the expense of your sense of mo-rality (and at the expense of your friend-ships as well). The Cost of Popcorn When you inadvertently download this ran-somware, you will be met with a screen that explains that your files have been hijacked/encrypted, and that to get them back you will need to pay one Bitcoin for a decryption

The Bitcoin fee is usually more than $700, a hefty price to pay during any season but particularly difficult for those infected during the holiday season. Spread the "Holiday Cheer" and Hope they Bite What makes Popcorn Time unique is the option victims have to take their cost away by allowing the ransomware to affect two of their friends for a chance to get a free de-cryption code. Of course, it works only if both friends pay the ransom, which leaves you looking (and feeling) like the Grinch. Avoiding Popcorn Time this Season The easiest way to avoid downloading ran-somware is to stay off of sites that might contain questionable files. However, this is nearly impossible for modern users, and many hackers are getting good at making their files look legitimate. Limit your expo-sure to potential ransomware by keeping your software up-to-date and your computer protected with a security program from a reputable company (for example Norton or Symantec). If you need to learn more about how to avoid running into ransomware while you're online, give our professional cyberse-curity consultants a call. We'll keep you away from the popcorn this season.

Main Phone: 732-716-4109

Fax: 732-716-4169

Email: [email protected]

Website: www.ocitcs.com

Choose The Right Computer P. 3

IOT Scanner Reveals P. 1

IOT Scanner (continued) P. 2

Get More Free Tips, Tools and Services At Our Web Site: www.OCITCS.com

732-716-4109

Page 2: The IT Insider...ransomware like this is not uncommon. But now there's a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer

More threats to IoT (Internet of Things)-enabled devices

It is also predicted that 2017 will see attacks made on IoT-powered devices, which will make life harder for those who depend on technology that makes life easi-er. It targets medical devices and Electronic Medical Records, “connected cars”, basic domestic tools, and tech-driven wearables, such as smartwatches and fitness trackers. The danger posed by this intrusion is fully capable of corrupting information stored in your devices.

Advanced cyber espionage

Cyber espionage is by no means a novelty. In 2017, it’s expected to hold sway in cyber-threat prevention measures as it becomes even more complex. It en-compasses all sectors of society, including individuals, private organizations, government institutions, and entire countries. Perpetrators will have the means to bypass networks by attacking firewalls and wreak havoc in their victims’ network. Fret not, for there will be measures in place to detect this threat also in the coming year.

Hackers are one of the most cunning criminals to have ever existed. While the cyber-police and the defenses they put up are no slouches, threats to security sys-tems can still make technology-dependent individuals and businesses quiver. Although damaged networks can be repaired, compromised privacy restored, and stolen data returned, the amount of damage that hack-ers can cause might be irreparable and/or result in a significant dent in your IT infrastructure and budget. The value of a network security system makes itself known when you least expect it, which is why security should be a top priority.

Are your systems protected from these predicted re-

markable feats of hacking? Call us if you want to dis-

cuss security services that are best for you.

The internet security vendor Bull-guard has released a new tool that business owners can use to locate any vulnerabilities that might be found on their network. The program uses on online directory to double-check whether your device uses an "open" or unsecure port to connect to your network. If it determines that your network or any of your devices are connected with an open line, it gives you the location of the detect-ed vulnerability. What can the IoT Scanner Do? While the scanner only points to places of invulnerability and does not attempt to fix anything, it provides the information you need to take that next step. Many times the real dan-ger of a smart device is that it con-nects to your network without your knowledge, allowing hackers an "open door" to wreak havoc. Know-ing where the hackers might enter can keep you vigilant to fix that breach.

Scanners like this are exactly what

we hope to accomplish with our blog.

We want you to provide you with

useful tools that help educate you

about your network and your IT,

while also showcasing what we can

do for you as an outsourced IT con-

sultant. Bullguard’s IoT scanner will

help you get one step closer to en-

terprise-level security, but we’re the

partner you need to cross the finish

line. Get in touch with us to start

making improvements today.

For more info on Network

Security, go to:

http://www.ocitcs.com/services/

network-security/

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends. Knowing what you are up against is the first step to fighting these threats.

Increased threats on cloud technology

Cloud service has numerous benefits to businesses. They make data storage, collaboration, and pro-cessing more efficient; they enable employees to work faster; and they help operations flow smoother. Cloud technology’s popularity is expected to rise well into the next few years, but as demand increases, so does the dangers presented by cyber attackers.

Ransomware will be more complex

Ransomware incapacitates computer systems by locking down files and preventing access for ransom. In its 2016 Threat Predictions report, security soft-ware company McAfee predicts a peak in ransom-ware attacks next year. Although they also predict it to recede by mid-year, damages to vulnerable cloud-dependent infrastructures can be great and costly. Most alarming in the prediction, however, is that in the coming year ransomware attacks will be more complex due to new elements. Ransomworms, which use advanced victimization techniques to mine further data within an already compromised network, are expected to put an even crueler spin to an already formidable malware. Dox-ing, on the other hand, affects avenues such as so-cial media and any place where sensitive, easily identifiable information can be extracted to serve the ultimate purpose of extorting money. Yet another wicked ransomware to watch out for is Backup Dele-tion, which destroys the very mechanism that can otherwise help you recover from a compromised system or files: your backup data.

Are You A "Sitting Duck"?

Get Your Free Report That Outlines The 7 Most Critical IT

Security

Protections Every Business Must Have In Place Now To Protect Themselves

From Cybercrime, Data Breaches And Hacker Attacks

http://www.ocitcs.com/sittingduck/

Page 3: The IT Insider...ransomware like this is not uncommon. But now there's a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer

Operating System

Operating system (OS) decisions often boil down to choosing between Windows or Mac. It might help in your decision-making to know that Win-dows remains the most widely used OS mainly due to its high compatibility with business soft-ware, not to mention, its relatively cheaper price. Macs can perform just as brilliantly as Windows-operated systems can. And although Macs are usually more expensive, they’re well known for their own outstanding features, such as being less prone to crashes.

Other Components

Not to be confused with storage drives, a comput-er’s Random Access Memory (RAM) is only used to run open applications. It is responsible for keep-ing your computer performing at optimum speeds, especially when you’re working with several appli-cations or programs at once. For small business-es, a 1200-2600-MHz RAM should suffice. The higher the MHz of your RAM, the higher its perfor-mance will be. To keep your basic programs run-ning, 6-8 gigabytes of RAM is often satisfactory.

Ready to Buy a New Computer?

Deciding which computer to buy is an important business decision. While there are a handful of factors to consider, what you aim to accomplish in your business’s day-to-day operations should be your main consideration when choosing a comput-er. Businesses that require plenty of remote and mobile work should definitely go for laptops. Those that require regular transfers of large datasets could benefit from the increased storage capacity associated with desktops.

Do you need expert advice in choosing the best

computers for your small business? We’re happy

to guide you in every step of your purchase deci-

sion. Give us a call today.

Buying a computer for a small business seems like a simple task. You work from a budget, go to a store, buy the computer, and assemble the compo-nents. This would be true for small businesses from decades past, but times have dramatically changed. To keep up, small businesses must make smart decisions when it comes to purchasing com-puters. Whether your main consideration is soft-ware compatibility, availability, or even battery life, here are some of the things you need to consider when choosing computers for your small business.

Laptop or desktop?

Laptops are highly portable, efficient, and inexpen-sive. If these are the most important qualities your business requires in a computer, then by all means, choose them. Clearly, desktops aren’t built for mo-bility, but what they lack in portability, they more than make up for in storage, processing capacity, and security. Although laptops make perfect sense for small businesses with great need for portability, they are much more prone to security threats and are not as easy to upgrade and maintain, unlike desktops.

Processor

The Central Processing Unit (CPU), or simply pro-cessor, determines the speed at which you can access your data and perform business-critical tasks. Speed is measured in Gigahertz (GHz), and a processor that runs from 2 to 4 GHz should be plenty for small enterprises. Arguably the most im-portant item on the list of a computer’s specifica-tions, the processor plays a crucial role in your computer’s speed and efficiency.

Storage

As critical hardware components, hard drives indi-cate how much information you can store and use. Storage capacity typically ranges from 128 giga-bytes on “light computers”, all the way up to 2+ terabytes on more critical machines. If your busi-ness doesn’t need to store large files such as vide-os and images and will be used mostly for email and a few applications, 250- or 500-GB storage should do the job. If processor speed is number one on your list of computer requirements, it’s fol-lowed closely by hard drive storage.

As an entrepreneur, you probably work more than 40 hours a week to build your business up. From the intricacy of the marketing campaign to the mundane de-tails of running a business, you've got your hands full making choices that can make or break your company. One important decision you'll have to make is about your SMB’s computer hardware, in particular whether to invest in a desktop system or laptop. Keep reading for valuable tips on how to make the best choice for your business. Portability Modern desktop computers aren't nearly as immobile as they used to be. In many cases the screen is thin and light, and all-in-one desktops are easy to unplug, move and plug in on the road. But there are still places the desktop cannot go. Laptops allow you to go anywhere, even places without electricity. But this ability to take your work anywhere can be counterpro-ductive by creating more stress on employ-ees who think they must work all the time. Memory/Speed Desktop computers often have more memory than laptops, and they’re faster speeds due to better processors. This is now changing as a result of advancing technology, but until the cost of high-powered laptops becomes affordable to the general public, the desktop computer is going to provide businesses with more speed. If your employees’ work is limited to word processing and emailing, laptops should be enough. However, anything more will probably require a desktop ma-chine. Security An SMB’s computer hardware needs to be secure to ensure that private company information doesn't end up in the wrong hands. On a desktop computer, the hard-ware is easier to defend against malware and adware. It’s also more physically secure because the desktop is often kept in one location and not easy to snatch. If you do choose the laptop route, make sure to have strict policies on how to protect machines that leave the office. Price Traditionally, the laptop has been cheaper and available to more people. This is true particularly for smaller notebook-style laptops. But desktop computers are be-coming more affordable as more people have access to them through local chan-nels. With a capable IT service provider, cost probably won’t be a deciding factor between the two options. Quality Although laptop computers provide the convenience of portability, over time they’re prone to problems with the battery and charging cord. They are also easily damaged. By contrast, desktops are gen-erally more sturdy. But when they do expe-rience a problem, it often leads to expen-sive repairs. Final Recommendation The desktop versus laptop debate is an old one, with supporters on both sides touting the advantages of their choice to all who will listen. A growing company really needs a combination of both types of computers. However, a desktop computer will be generally more reliable for the fledgling company owner to start with. Laptops should be added as budget permits to provide that extra portability and conven-ience.

If you have questions regarding the best

choice for your company, give us a call.

We'll be happy to provide you the assis-

tance you need to improve your business.

Choosing the right computer

for your company

Points to ponder: small business computers

Page 4: The IT Insider...ransomware like this is not uncommon. But now there's a new, more devastating virus that asks victims to pick other victims to replace them in order to get their computer

Increase productivity with web monitoring

With YouTube, Reddit, and Instagram just a few clicks away, it’s a miracle you can get anything done during an eight-hour workday. As you’re probably well aware by now, there is a huge possibility for employees to waste precious time on sites not related to your business. This problem arises when a company does nothing to monitor or regulate internet usage. To fix this, consider using inter-net monitoring software.

Time-saving measures At times, the internet can be very addictive. Internet monitoring software saves employees from the temptation of online videos and games by restricting access to time-wasting sites that you deem unnecessary for business. But internet monitoring software doesn’t even have to be as extreme as denying permission to harmless social media websites. Just letting your employees know that you’ll be randomly monitoring their internet activity discour-ages them from taking prolonged visits to their Instagram page.

Avoiding harmful websites

The internet hosts plenty of unsavory links and websites. Employ-

ees who haphazardly click phishing links or access malware-

ridden pornography sites can put your business at risk. Working

with infected machines can slow down the entire system and, in

some cases, completely halt operations. But by using internet

monitoring tools you can restrict access to dangerous websites,

and identify reckless employees to remove their internet privileges,

if necessary.

Controlling bandwidth usage Even while using the internet for the right purposes, bandwidth can be used up quickly. Internet monitoring gives you up-to-the-minute reports on your bandwidth usage. Once you have a clear under-standing of your company’s overall bandwidth usage, you can then control its expenditure. This feature allows you to prioritize band-width for critical business applications and reduce bandwidth for less necessary websites.

Increasing productivity on the internet Internet monitoring software may be a powerful tool, but it should be used responsibly. As a business owner, you need to walk a fine line between over-surveillance and under-surveillance. What you should do is establish a clear internet policy. Then, explicitly define the disciplinary measures to be dispensed on anybody who goes against the requirements of the internet policy. And deal with time-wasting employees on a case-by-case basis. It’s unreasonable to remove everyone’s Facebook privileges because one or two abused theirs.

Employee productivity can be difficult to achieve, especially with

the proliferation of what we would like to call, “procrastination soft-

ware.” But with web monitoring software, you can truly get your

business -- and your employees -- back on track. Looking for more

ways to increase business productivity with technology? Give us a

call. We’ll be happy to make suggestions.

The IT Insider Issue 11 November 2016

Main Phone: 732-716-4109

Fax: 732-716-4169

Email: [email protected]