Ransomware part I

Ransomware part I The daily reports of cybercrime are important reminders about the need to protect your business from malicious behavior that could threaten the success of your business. There are so many different things that can attack your computer, steal your data, and wreck your day. One of the most troublesome has been the development of ransomware. (FYI. Ransomware isn’t actually all that new– some version has been around for decades)  Ransomware is a type of computer virus that takes your data hostage and like any kidnapping scheme, demands money for the release of your data. Why is ransomware so nasty? Because it steals the most important thing your business possesses. Data. Worse, once infected there isn’t generally a way out. No one can “disinfect” your machine. You aren’t going to be able to call in IT support to solve the problem. Basically, you have three options. Pay the ransom. This payment is usually via credit card or bitcoin (a digital currency). Some ransomware viruses even provide help lines if you’re having trouble. Of course there are no guarantees your will get access to your data–these are thieves you’re dealing with. Don’t pay and lose your data – This has its obvious downsides, unless… You have a safe, clean backup. In that case, you are stuck with the nuisance of restoring your data with the backup, but you aren’t out any money. However, this comes with a caveat: your backups have to be clean. The problem with ransomware viruses is that just making backups may not be sufficient to protect your data, as the backups can be infected also. In the next blog, we will address your need to add an additional layer of protection to handle ransomware attacks.

Is your Office 365 environment secure?

Microsoft’s Office 365 is one of the most powerful business productivity tools today. This cloud-hosted suite lets users work anywhere and collaborate easily. Although it’s undoubtedly useful, Office 365 may present a few security challenges that businesses must address. Vulnerabilities in SharePoint Businesses typically use SharePoint Online and on-premises SharePoint sites to store sensitive data like personally identifiable data. Failing to secure SharePoint content against unauthorized users is one way to expose data and your business to malicious actors. And for companies that have to comply with regulatory authorities, there are serious consequences to data privacy non-compliance. To prevent this, limit administrator-level privileges and enable encryption. Set the necessary security restrictions per user for every application. Unprotected communication channels Launching phishing attacks and installing malware are two of the most common ways to hack into a system, but there are other paths of attack. Office 365 features like Skype for Business and Yammer, both of which connect to external networks, may serve as a medium for ransomware and other types of attacks. Train your staff to identify potentially malicious files and URLs. Offer guidelines on how to handle and route sensitive files and communication to safe locations. Security risks in dormant applications Organizations using Office 365 won’t use all applications in it. You may use one or several programs like Word, Excel, and SharePoint but rarely use One Drive. Businesses and users that have not been utilizing specific programs should note that some dormant applications may be prone to attacks. This is why it’s crucial to identify the apps that aren’t being used, and have an administrator tweak user settings to restrict availability on such apps. File synchronization Like Google and other cloud services providers, Office 365 allows users to sync on-premises files to the cloud such as in One Drive. This useful feature is not without security risks, however. If a file stored in an on-premises One Drive is encrypted with malware, One Drive will view the file as “changed” and trigger a sync to the OneDrive cloud, with the infection going undetected. Office 365 Cloud App Security, a subset of Microsoft Cloud App Security, is designed to enhance protections for Office 365 apps and provide great visibility into user activity to improve incident response efforts. Make sure your organization’s security administrators set it up on your systems so you can detect and mitigate dangers as soon as possible. Cybercriminals will continue to sharpen their hacking techniques, and your organization must keep up to protect your systems, apps, and devices. Call our team of IT experts now if you want to strengthen your business IT security. Published with permission from TechAdvisory.org. Source.

Human cloud: the workforce of the future

Companies are increasingly tapping into a virtual, on-demand workforce that’s proving to be a third-generation ecosystem for key talent. The human cloud offers a competitive advantage for startups and small- and medium-sized businesses (SMBs) by letting them outsource specialized skills and expertise globally. Learn what the human cloud is and how it enhances remote team collaboration. Foundr Magazine’s Editor-in-Chief and Publisher Nathan Chan started a ‘passion project’ that led him to interview some of the most influential entrepreneurs around the world, which he shared through his monthly digital publication. For Mr. Chan, the launch of this successful project would not have been possible if it wasn’t for human cloud service Elance, a freelancing platform that allowed him to leverage overseas talent and build a solid team of graphic designers, audio/video editors, and writers. All tasks and projects for each issue of his magazine are run via the platform, which also conveniently processes payments for his contractors. Just like Mr. Chan, many business owners are shifting their labor sources from local to global. According to an online survey by social project manager Wrike, close to 44% of business owners predict a rapid shift to distributed teams within their companies. They believe technology makes their virtual teams just as efficient as if their members were collaborating in one office. Remote collaboration via the human cloud is indeed a game-changer that benefits companies, such as startups, that are inclined to spend fewer resources to build their business infrastructure. What is the “human cloud?” The human cloud is a working platform where staff performs white-collar tasks from any location and on any device. Collaboration, file sharing, or discussions on projects are done in a flexible and productive manner, rewarding team members solely for their output. Although having a virtual workforce comes with a few challenges, overcoming them can yield great benefits for SMBs. Benefits of hiring on the human cloud Low cost – The human cloud helps save time and money spent on traditional employment processes. Hiring is fast and easy; you pay for the skills you need on a transactional basis, as opposed to paying a high monthly wage on physically hired talent who may have too much idle time. No overhead – Hiring on the human cloud requires no overhead for office space, thereby enabling firms to stay lean and profit-focused. By becoming “virtual,” teams can work independently from their homes or anywhere. Get skills on-demand – Employers can contract for micro-tasks, such as copying text from business cards, to larger tasks like selling products for a fee, to even more complex projects such as software design and programming. Global talent pool – Today, even startups can be ‘multinational’, i.e., they are no longer limited by geography in finding key talent with specialized skills. A good idea can come from just about anywhere and can be performed and delivered from anywhere. Easy collaboration – Using an online platform gives SMBs the ability to manage projects through virtual workrooms. Wrike’s survey revealed that collaboration software is extremely important and even mission-critical for remote teams to work efficiently. As more startups and SMBs become familiar (and comfortable) with the advantages of the human cloud, the future of work means that location is not the most important factor in determining who will contribute to your business’s success. A worldwide network of online contractors is now ready to serve you with the qualifications, skill sets, and shared enthusiasm you seek to turn ideas into valuable products or services. For more information on how to leverage cloud technologies or collaboration software, please get in touch with any of our cloud specialists. Published with permission from TechAdvisory.org. Source.

7 Types of video content to engage customers

Fast internet connections and smart mobile technologies continue to offer SMBs more opportunities for reaching customers and clients. One of the most recent innovations is live video streaming, an inexpensive and convenient way to increase your business value and diversify your services portfolio. It’s a huge and open-ended service, so why don’t we narrow down six of the best video types for reaching out to your target audience. Business introduction/Behind-the-scenes If your company lacks an online presence, one of the best things you can do is give customers direct access to your staff and your product. Take your viewers on an office tour and show them how a product is made, or even broadcast your business’s launch event. Make sure to invite as many viewers as you can, but remember most live broadcasts can be saved and viewed later. You’ll likely want to keep the video available after it’s finished. News and trending topics Current and live events are great not only because they’re fresh but they also give your audience something to share. Facebook Live and Instagram stories allow people and businesses to share recent information, trending news, and other relevant stories. For example, a live coverage of your cooking show would allow you to engage your viewers by inviting them to participate in a live Q & A activity. These features could instantly reach millions of viewers in a span of a few seconds. Ask me anything (AMA) Depending on your product or service, you may be getting a lot of conceptual questions about innovative ways to use it, what direction the company is heading, and so forth. There’s no better way to address these questions than to do so in a personal and unscripted AMA segment. If there’s a good turnout, make sure to keep questions and answers moving in relevant and interesting directions. There’s nothing wrong with updating everyone on what you had for breakfast, but addressing service bugs or product feature requests is going to be a lot more beneficial for wider audiences. How-tos Whether it’s a soon-to-be-released product or a simple rehash of an existing one that’s getting lots of support requests, there’s no better way to guide customers than thorough how-to videos. Not only do these show existing clients the best way to use your product or service, it also allows potential customers to see both your product and your customer service philosophy in action. Saving these videos can be invaluable as you continue to get questions on the product or service outlined in these videos — it’s an easy way to build a video reference library for sales and support. Webinars Webinars are events held on the internet and are attended by an online audience. They allow for online participation thanks to audio and video feeds. In addition to video images, presentation slides can be broadcast and run in sync with the rest of the presentation. You can also make use of the screen capture functionality to show your viewers an application or website. Webinars also offer various interactive opportunities such as chat, polls, surveys, and tests, Live broadcast announcements Whether on Twitter or Facebook, post live broadcast updates about an upcoming product or service to make your announcement far more interesting and personal than a press release or faceless status update. Text-based announcements and pre-recorded videos severely limit how you address the “fine print” questions from customers. Think of live broadcasts as a chance to hold your own personal press briefing and address questions after your scripted announcement. Social media reports that Facebook users spend three times longer watching live broadcasts than pre-recorded video. Combine that with Facebook’s announcement that live videos are more likely to be promoted to the top of news feeds and you’d be crazy not to utilize live broadcasts. There are a handful of different services to use for live video broadcasting and deciding which one is the best for you can depend on a lot of different variables. Promotional videos Use social media to promise a special promotion to anyone who tunes in to a live broadcast. Your promotional videos should portray your business in a positive light and make people want to buy from you. Many companies use influencers nowadays to attract more people. This is a quick way to gain the attention of potential customers, especially those who are hearing about your product or service for the first time. A familiar face is almost always a quick way to earn someone’s trust. Remember that promotional videos should be straight to the point and should last no longer than 10 to 15 minutes at most. Call us with any of your questions and we’ll be happy to assist you in adding value to your business with today’s best live video services. Published with permission from TechAdvisory.org. Source.

Tweaking your Windows 10 installation

Once you’ve unboxed that laptop you just bought, there are important things that need to be done. After installing Windows 10, you must unlock its full potential by customizing some critical settings. You can ask a technician for help with this, but here are a few things you can do on your own. #1 Check for updates  Your new laptop should check for updates automatically, but you can also check manually. Just click the gear icon above the Start button to go to the Settings, choose Update & Security > Windows Update, and then click Check for updates. (Or, just type “updates” into the search box, and click Check for updates.) #2 System restore If something goes wrong with your laptop, you can save a lot of time if you have a “restore point,” which is like a backup of your entire operating system. To set up a restore point, search for “restore” from the taskbar and click Create a restore point. You’ll be taken to the System Protection tab of the System Properties window. From there you can choose what you want to be included in the backup and then click the Configure button. Select the radio dial to “Turn on system protection” if it’s not already on. And then you can choose how much disk space to reserve, usually no more than 2 or 3 percent. #3 Power plan If you want to prolong your laptop’s battery life, one of the best things you can do is switch the Power Saver, High Performance, and Balanced power plans based on your needs. To choose a plan, right-click the battery icon in the lower-right corner of your screen and click Power settings. Next, click Additional power settings to select a power plan. #4 App installation tolerance level To restrict which apps can be installed on your laptop, you can disallow anything that isn’t in the Windows Store. Go to Settings > Apps > Apps & features, and you can choose whether to permit installations from only the Windows Store, any app installations (with a warning), or unrestricted app installations.  #5 Remove bloatware Vendors package new laptops with lots of trial apps, which are mostly unnecessary and unwanted software called bloatware. Windows 10 offers an easy way to see which apps are installed on your new laptop and a quick way to uninstall those you don’t want. Head to Settings > Apps > Apps & features and peruse the list. If you don’t want an app and are 100% certain your computer doesn’t need it, click the Uninstall button. #6 Anti-ransomware Ransomware is a form of malicious software (or malware) that makes all your data inaccessible until you pay a fee to hackers. To combat it, type “Windows Defender Security Center” into the search bar at the bottom of your screen, click it and go to “Virus & threat protection”. Here, you’ll be able to enable a new option called “Controlled folder access,” which protects you against ransomware attacks. By default, the Desktop, Documents, Music, Pictures, and Videos folders are protected, but you can add others too. Do you know what settings to change and update to optimize your laptop? This article barely scratches the surface of Window 10’s security and efficiency settings. Call us today for a quick chat with one of our Microsoft experts about taking your operating system to the next level. Published with permission from TechAdvisory.org. Source.

How to improve your online presence

The 21st century has ushered in a lot of technological advances and has given businesses new ways to reach customers. Using numerous platforms and tools, buyers can now interact with different companies and their products. To make a positive impression online, be sure to do these. Be seen on search results In his book on online reputation management, Tyler Collins, a digital marketing expert for Fortune 500 companies, mentions the importance of a company’s search results that appear after pressing enter. These results make up a company’s reputation online.  If you want people to notice you, your organization should appear on the first 10 spots of the first page of the search results. That page should also have a variety of related content about your business like positive reviews, press releases, and customer testimonials that contribute to your credibility.  Paint a clear picture of your brand For entrepreneurs, it is best to establish a good online reputation before launching a business. Create a memorable brand, company name, and slogan to help your organization land on the top 10 search results. Thoroughly research potential brand names to ensure that the one you choose has no negative connotation.  Get only the best Employ the best people. Hire trustworthy key executives. Customers are not only interested in your products, but they also want to know the people behind them. Make sure that those leading the organization have a clean online reputation.  To do this, create short biographies for each executive to help boost your company’s search results. Aim for positive media coverage whenever possible. Everything from blog posts to press releases and memorable quotes will enhance the company’s image.  Don’t be shy to ask for help  When the going gets rough, turn to specialists to maintain your company’s image. Remember that first impressions last, so investing in expert advice is vital in creating and maintaining your virtual image.  We hope you find these four online reputation tips useful. If you need more information on creating a credible online image or want to learn how technology can create a strong online image, give us a call. Our experts are ready to assist you.  Published with permission from TechAdvisory.org. Source.

A primer on watering hole attacks

Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these criminals steal data — through watering hole attacks. What are watering hole attacks? Watering hole attacks are used to distribute malware onto victims’ computers in a similar way phishing activities are conducted. Cybercriminals infect popular websites with malware, and anyone who has had the misfortune to visit have their computers automatically loaded with malware. The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. In extreme cases, the hacker will actively take control of the infected computer. But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software. With such highly skilled hackers these days, virtually any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013. You can protect yourself by following these tips: Update your software Watering hole attacks often exploit holes and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date. Watch your network closely Regularly conduct security checks using your network security tools to try and detect watering hole attacks. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads. Hide your online activities Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature. Also, block social media sites from your office network, as these are often used as share points of links to infected sites. At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe. Published with permission from TechAdvisory.org. Source.

The essential guide to Android backups

Your Android phone is your life. It contains business documents, calendar reminders, and contacts you can’t afford to lose, but one unforeseen case of the butterfingers can wipe them out instantly. It’s wise to back up your data. Check out this guide to learn how to go about it. Take advantage of cloud services The best way to ensure your data is safe is to back it up in the cloud. When you power up your Android device for the first time, make sure to sign up for a Google account. This will give you access to 15 GB of free Google Drive storage, with optional additional space for a monthly fee. Any Google Docs or Sheets file you create on your phone will automatically be saved to your Drive, so if you ever lose your phone, you can retrieve your files by simply signing in to your Google account from a different device. If you’re not a fan of Google services, you can always opt for other cloud storage services like Dropbox or Office 365. Backup your device settings Another great thing about Android devices is you can back up their settings and preferences via Google Drive. These include screen lock passcodes, display preferences, language options, and approved Wi-Fi networks. To confirm all these settings are saved to your Google account, go to the Backup section in system settings and enable “Back up to Google Drive.” This way, if you ever switch to a new phone or tablet, you can quickly restore all your device settings and preferences by signing in to your Google account. Save your app data If you have apps that contain important information, you can sync the data of those apps to your Drive. Simply go to the Backup section, look for App data, then enable the Automatic restore function. Keep your contacts Most contacts are saved on SIM cards or on the phone itself. To back them up, check if there’s a cloud syncing option in your Contacts app. If your phone doesn’t have it, install third-party services like Contact Backup, which can be found on the Google Play Store. What if you don’t save your data in the cloud? Although we highly recommend cloud services for data retrieval, your phone’s SD card does retain some information after it’s been deleted. You can restore deleted files by connecting your SD card to a desktop computer and using specialized recovery software. But this can be a complicated process unless you team up with Android experts like us. For more services regarding data backup and mobile device management, call us today. We offer a wide array of solutions for Android phones. Published with permission from TechAdvisory.org. Source.

3 Common storage virtualization issues

Your data storage virtualization plan can go awry when done hastily, causing your business to miss out on the benefits of virtualization altogether. To guide you, we highlighted three of the most common storage virtualization problems you may encounter. Poorly structured storage from the get go Within a virtualized data storage framework, information is grouped into tiers based on how quickly it needs to be accessible when requested. Most networks will have to organize data into three different tiers to avoid breaking the bank. For example, you probably don’t need to access archived data as fast as the images on your eCommerce website. Without a virtualization expert on hand, organizing these data could quickly go off the rails. Consult with your managed IT services provider (MSP) to plan where various data types will be stored and what’s the most effective way to set up your data storage framework. Inadequately maintained virtualized storage You need to regularly update your virtualized data storage plan so that it always meets your company’s evolving needs and it performs optimally.  Whoever is in charge of your virtualization solution needs to have intimate knowledge of how data is being accessed. If you’re using virtual machines to access your database, they need to be precisely arranged to make sure you don’t have 10 workstations trying to access information from the same gateway. Incorrect application placement Placing all of your data-intensive applications on virtual storage networks might cause too much bandwidth usage and network traffic.  Your MSP needs to understand and closely monitor how those applications work so they can recommend how to best distribute them across virtual machines and physical machines to solve connectivity issues. Deploying any type of virtualized IT within your business is no small feat. So if you want to set up a virtualization solution without any issues, contact us today.   Published with permission from TechAdvisory.org. Source.

Mac malware removal tips

Malicious software can affect any computer, and Macs are no exception. In fact, it’s important to take action right away when you notice your Mac freezing up, slowing down, and redirecting you to random websites. Below are a few malware removal tips to keep your systems safe and sound. Minimize the threat Containment is the top priority when your Mac is hit with malware. The first thing you should do is to disconnect your device from the internet to prevent malware from spreading and making it vulnerable to hackers. Then, reboot your computer in safe mode (hold the Shift key when the Apple logo appears) so you can run only mission-critical programs while you resolve the issue. Since most files aren’t active in safe mode, malicious programs are easier to remove. You should also open Activity Monitor, which can be found in the Utilities folder, to disable any non-essential apps. Even if you are in safe mode, assume that your activities are being monitored by cybercriminals. Log out of any applications and don’t type any passwords in case a hidden keylogger or spyware program is running in the background to steal sensitive information. Scan and remove Once you’ve contained the threat, update your anti-malware program and run a full system scan. This ensures your security software has the latest malware definitions to identify and remove the most recent threats. But if there are suspicious applications your anti-malware program failed to detect, you can always uninstall them manually like how you would with other software. Contact an IT expert if you’re unsure whether a program is safe to remove. Malware may also add unwanted toolbars, display persistent ads, and redirect you to a dangerous homepage. In such cases, you’ll need to clean your browser. For Safari, click Safari from the menu bar, go to Preferences, and remove unwanted plug-ins and extensions. On Chrome, click Chrome from the menu bar and select Preferences > Advanced > Restore settings to their original defaults. Consider a factory reset If none of the methods above worked, the only way to clear the malware infection is to factory reset your operating system. To do this, hold down Command+R to enter Recovery Mode, wipe the hard drive with Disk Utility, and reinstall macOS. Keep in mind that this will wipe apps and files stored on your device, so back up everything beforehand. Fortify your defenses Your computer won’t stay malware-free for long unless you’re proactively protecting it. Make sure to update your applications and security software regularly to defend against the latest malware strains and cyberattacks. You should also implement preventive measures like advanced threat prevention systems and firewalls, which stop malware in its tracks. Backups are another important solution for dealing with malware. An easy way to start using this technology is to enable Apple’s built-in backup solution, Time Machine, and store everything in an external drive. The feature can make hourly, daily, and weekly backups, letting you restore your computer to the point before it was infected with malware. If any of this sounds too technical for you, don’t worry. Our cybersecurity specialists can help you remove malware without any complications. We’ll even throw in proactive security monitoring services to ensure your Mac steers clear of cyberthreats. Call us now. Published with permission from TechAdvisory.org. Source.