2016 Newsletters

Current Cyber Threats and what you can do about them

AVG_Icon_Small

The term malware translates quite literally to “malicious software.” It’s an all-encompassing term that includes viruses, ransomware, worms, spyware, adware, and generally any software that is used to obtain sensitive information without a user’s consent. Malware disrupts computer systems in a variety of ways, such as by restricting access, encrypting files, corrupting data, stealing personal information, or slowing the system down.*

Malware can enter a system through downloads, email attachments, advertisements, or any type of hole in the security of the system. After an infection occurs, a system shows signs of the attack and is recovered in different ways, depending on the type of infection. For example, ransomware will display a message demanding a sum of money, and spyware will live in your files, possibly without ever being noticed.

Also, be aware of any present threats. A great resource for this is the SOPHOS threat monitoring dashboard that displays what malware is currently active, and Kaspersky’s Threat Post blog provides easy-to-understand explanations about a variety of threats. 

Types of Malware You Need to Know About

Adware – A type of malware that displays advertisements on your computer and collects data about your browsing habits without your consent.

Keylogger – Malicious software that tracks the keystrokes on a computer and transmits the data to another location so it can be used to detect usernames and passwords that are typed on a computer.

Ransomware – Software that locks a computer and retains control until the user pay a certain amount of money.

Rootkit – A type of software designed to open a backdoor into areas of operating system that are not supposed to be available and to mask its presence while doing so. It is used to deploy other types of malware.

Spyware – Software designed to steal user data—such as website logins and passwords or proprietary information and trade secrets—off machines it has infected

Trojan – Malicious software that seems legitimate but contains other software that attacks the system in some way after tricking a user into activating it.

Virus – A type of malware that attaches itself to an application and then spreads to other programs and computers on the same network through an infected host file, causing a variety of damage when the application is run.

Worm – Software that infects a computer and then replicates itself from system to system on its own without the help of a host file.

Malware’s Most Wanted

CryptoLocker – Ransomware that encrypts a victim’s files and demands payment before restoring access. It was identified in September 2013 and quickly infected hundreds of thousands of computers and grossed millions of dollars in ransom.

CryptoWall – Malicious software that made its entrance to the ransomware scene in June 2014, taking over were CryptoLocker left off. According to the FBI’s Internet Crime Complaint Center, CryptoWall has totaled more than $18 million in losses in just over a year since its inception.

TeslaCrypt – Identified in early 2015, TeslaCrypt is a type of ransomware that only infects certain file types, and it is also the first ransomware to explicitly go after game saves, such as those from popular or launching fraudulent social networking accounts.

Zeus – A Trojan that steals banking information and other personal details from infected computers. It was initially detected in 2007 and has since infected millions of devices. The source code was made public, which led to a number of new malware variants.

Rombertik – A type of spyware that captures anything transmitted or typed in plaintext on an infected system. It also has a fail-safe that can destroy the system by overwriting important boot information and the hard drive partition if the malware code is tampered with, making it difficult at best to recover any data.

This list only scratches the surface because new malware threats are being detected almost every day. So, it’s imperative for organizations to be aware of these malware threats and back up their business critical data offsite. Those who don’t risk their livelihood because in the wake of a cyber attack or other data loss event, having their data backed up can be essential to a business’ survival.

*Excerpt: Intronis Cloud Backup and Recovery Blog: blog.intronis.com.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com

Top Technology Considerations for 2016

Online Backup

This year of 2016, please consider the newest technology options for your business. If it has been awhile since you upgraded your equipment or are not using the latest technologies, you could be missing out on increased productivity and profitability for your business that will definitely improve your bottom line.

The following is a partial list of options to choose from:

  • Cloud: If you not using a cloud solution for your business, such as Office 365 for your Office Suite or Ring Central for your office phones, you could be missing out on great technological options that will benefit your company in the long run.
  • Managed Services: Your time as a business professional is usually very limited, since your main focus is doing your business and not dealing with IT. As IT experts, our job is to insure that your network servers, workstations, peripherals (printers, scanners, etc.) and software are operating normally and efficiently with minimal downtime. We make sure everything stays up running as it should.
  • Microsoft Windows 10: If your company is still using computers that have Windows 7 or 8.1 operating systems, companies have until July 29th, 2016 to upgrade for free. Please contact us if you need your operating system(s) upgraded.
  • Virus/Malware Issues: Computer viruses and malware can cause havoc on your computers or even on your network servers. If you are experiencing “blue screens of death”, pop-ups, weird error messages, lock-ups, and any other strange behavior on your computer, please contact us right away because most likely it is infected.
  • On-line BDR (Backup-Disaster-Recovery): If you are not currently using an on-line backup-disaster-recovery system, you could be putting your data at risk. Statistically, it has been proven that tape data backup on has a recovery rate of only 42% whereas on-line data recovery is 99%. Clearly, on-line BDR is the better way to go. If you would like to know more, please contact us for a free consultation.
  • Windows Server 2003: If your company is still running Windows Server 2003, you should make plans to upgrade your server as soon as possible to Windows Server 2012 R2. The reason for doing so is that servers running Windows Server 2003 are vulnerable to hacking and virus/malware attacks.
  • Website Upgrade: If has been a couple of years since you have put up your website, it is mostly like due for an upgrade. HTML 5 has revolutionized the way websites look and feel. Many include blogging that facilitates your customers being more active your site and lingering longer, thereby increasing sales and bottom line profitability.
     

As your company makes it’s plans and budgets for the year, please include the considerations listed above. If you need any help, feel free contact us with any questions that you may have. May 2016 be a very prosperous year for your business!

If you need help in purchasing your new computer or server, please contact us at 1-800-871-9683 for a free consultation. Also, if you are in the market for Cloud Solutions, such as Office 365, please call us for a free consultation. Our email address is: markhuffman@creativebusinesstechnologies.com

Social media & sharing icons powered by UltimatelySocial