What is Ransomware?
Ransomware is a kind of virus that prevents you from using your infected computer, phone, or other device. In most cases, it will encrypt your system preventing you from being able to access your files or other aspects of your machine. What sets ransomware apart from other viruses is the fact that it is designed to hold your data hostage and tries to force you to pay a fee to get it back.
Do Not Pay the Ransom!!!
Apart from encouraging criminal behavior, it is common for the attacker to choose not to unlock a machine, even after the ransom is paid.
Rule #1: Never Trust a Hacker.
In modern computing, nearly every security breach begins with a violation of your trust. While not trusting hackers seems like it should be a no brainer, it is important to understand that there are many common lies that a hacker will use to convince you to install malware or to scare you into not telling anyone who might be able to help restore your PC.
The most common cons include:
- Impersonating legitimate businesses to get you to trust them. Microsoft, internet service providers, web hosting companies, email providers, social media platforms, and banks are all common guises used to make you believe that you are dealing with trustworthy correspondence. They use this trust to make you more careless about the software they install, the links you click, and/or the personal information you provide.
- Once installed, ransomware will often claim that you have done something illegal with your PC, and that you are being fined by a police force or government agency. Legitimate law enforcement agencies NEVER use ransomware to issue fines.
- Another frequent scam hackers use are websites, emails, or phone calls that will claim that you have already been hacked. These are usually not true. They are designed to get you to interact with them in ways that will convince you to install fake programs or pay for fake virus removal, but it is often the counterfeit services they are selling which will contain the actual malware.
What can I do to protect myself from Ransomware attacks?
1. Never assume an email is safe:
Do you trust your bank? Facebook account services? How about your friends? The unfortunate truth is that when it comes to email, the answer to all of these questions should always be “no”. There are countless ways a hacker can fake an email to make it look like it came from someone else, and in many cases, when a hacker gains access to someone’s personal email account, they will use that account to issue spam to everyone on their friend’s list to piggyback on that person’s trusted status.
This does not mean that every email is dangerous, but that you should always exercise due caution with every email that you open.
2. Double-check the content of the message.
There are usually errors or discrepancies that you can spot such as a claim from a bank or a friend that they have received something from you. When in doubt, you can check your recently sent items to verify their claim.
Another tell-tale sign is that fake emails from businesses will often begin with things like “Dear Valued Customer” instead of your actual name.
3. Never open links or file attachments in email
In general, clicking on links in email should be avoided. It is safer to visit any site mentioned in email directly. If you do not know a company’s URL off-hand, use a search engine such as Google or Bing. NEVER follow a link in an email asking your to reset a password that you did not specifically request to have reset, since these are often tricks designed to steal your credentials.
Messages can also contain dangerous file types such as zip, exe, php, html, docx, etc. If you do not recognize a file extension, HERE is a pretty good resource for seeing if it is safe or not. If you ever need to receive a potentially dangerous file type, always confirm with the person that they are the ones sending it.
4. Never click on ads offering free software
These scams generally fall into one of 3 categories.
- Pop-ups claiming that you have been hacked, or that your computer is unprotected. These will try to give or sell you fake antivirus software designed to infect your machine with malware.
- Free games, apps, software upgrades, driver scanners, and other various programs are often bundled with malware that could include anything from malware.
- Cracked/Pirated programs are often bundled with malware. These can be especially malicious because the installation instructions included with them will often instruct you to turn off your anti-virus software while it downloads or installs giving it free reign over your machine.
5. Use a reputable Antivirus security suite
It is always a good idea to have both anti-malware software and a software firewall to help you identify threats or suspicious behavior. Malware authors frequently send out new variants, to try to avoid detection, so this is why it is important to have both layers of protection. Most malware relies upon remote instructions to carry out their misdeeds. If you run across a ransomware variant that is so new that it gets past anti-malware software, it may still be caught by a firewall when it attempts to connect with its Command and Control server to receive instructions for encrypting your files.
6. Backup important data
While many older ransomware viruses can be unlocked using the right anti-virus programs, newer ones usually can not. This is why it’s important to have a good backup plan which can vastly minimize your risk of lose. When it comes to backup and recovery, there are many options to choose from and not all of them are made equal. Some backups may only collect certain kinds of files, or files located in certain places. Some backups may be very complete, but take a very long time to restore if things go wrong. So, it is usually best to refer to your IT provider for advice on the best course of action for your organization.
Google, once again, is excited about social media. But not in the ways you might think; this isn’t about another in a failed string of chat apps, or the knockout success that never was in Google Plus. Instead, it’s an entirely new way of recognizing human faces, and one made possible by — you guessed it — creeping on your social media profiles.
In a recently approved patent, Google detailed a system of “Facial Recognition with Social Network Aiding.” It’s exactly what it sounds like, an attempt to parse social connections as a way to better identify your mug.
We don’t shill.
Reverse Image Search works by attempting to match visual cues in photos with other, similar photos. It works mostly as intended, with some results being dead-on, and others complete misses. But as long as the photo is well-lit, and is of a high enough resolution, Google usually nails it.
Its a system that works, but could use improvement. Sometimes the results are only semi-relevant, and for those who don’t have as much data to pull from, it often overlooks matches entirely. Grab your friend Katie from middle school’s Facebook photo, for example. Chances are it only returns the Facebook account using the photo.
But the new system envisions a world where artificial intelligence would identify faces using not only visual cues, but various forms of data from personal communications, social networks, collaborative apps, and even your calendar.
It’s like this
Users enter a “visual query” in the form of a photo, screenshot or scanned image. The system would then analyze the image and look — using advanced image recognition — for others that are both visually similar, and a potential match using the data sources mentioned above.
Rather than just matching based on visual cues — Google‘s current system — the software would take additional steps to build further confidence in the person’s identity. Pulling from a number of data sources, including your hometown, age, occupation, and various others, Google would strive to be absolutely sure it returns images relevant to your query, based partially on the data it pulled from your social accounts and other collaborative apps.
Let’s attempt to wrap our head around this with a real example. Inputting an image of Amanda, from accounting, for example, should lead to relevant results with the new software due to a number of connections between you, the searcher, and her, the subject of your search. You’re connected by your employer, you’re friends on Facebook, and she routinely retweets you on Twitter. To Google, these all build confidence that Amanda’s image is indeed the one you’re looking for.
Or maybe you’d search for a childhood friend, Jeff. The same reasoning follows: you’re connected by your hometown, your high school, and an approximate age range.
Where the patent falls short is in detailing exactly how Google would use the technology. We can be fairly sure that Reverse Image Search and Google Photos would benefit. The latter, due to some wording that describes automatically sharing a group photo and tagging everyone in it.
But it’s other, less obvious use cases that could be worrisome. If Google were to bring back Glass, for example. Or if it were to reverse course and continue to provide artificial intelligence to the military. If you’re looking for a tinfoil hat example, that exists too; Google could begin feeding this data to law enforcement, like Amazon.
Rekognition, Amazon‘s feature-rich AI, provides real-time facial recognition to a handful of police departments in Orlando, Florida, and Washington County, Oregon. It’s not difficult to envision a competing product from Google.
The patent does note that in certain scenarios — scenarios Google fails to define — a person would have to opt-in to have their identify appear in these results. For now, it appears that we’re in the clear. But since this is only a patent, and not working software — to the best of our knowledge — things could change quickly.
It’s something to keep an eye on, but we certainly wouldn’t lose any sleep over it. At least not yet.
There are a few common problems in the IT world that you just see over-and-over again to the point that many users are quite familiar with them. Some of them are intuitive like a password lock out or a bad update where you experience a problem, your IT guys tells you what it was, and it pretty much makes sense. And then there are caching errors…
What is a Cache and Why Does My Computer Use Them?
A cache is a small section of memory or disk space reserved to in some way allow a program to run faster. If you think of your filing cabinet as your computer, it’s full of all sorts of documents that you may almost never look at, and then there are those documents like birth certificates and social security cards that you need much more often; so, you put them in a special folder at the front so you can find it quickly every time. If you do this, then you’ve created a kind of cache.
Another way caches work is to store data that’s already been processed so that you don’t have to reprocess it every time you need it. This is like keeping a copy of your completed taxes. If you have all your w2s, receipts, etc. you COULD redo your taxes from the original data if you ever had to provide a copy of them for any reason, but it is far more convenient to just hang onto that finished document. This is another kind of cache.
How do Caching Errors Happen?
So far, caching sound like some organizational no-brainer, and mostly it is, but why do they cause problems? That boils down to things changing how you don’t expect them to. If you think about the first scenario, imagine that you started taking lots of documents from everywhere else and putting them in your cache. This would eventually make your cache take just as long to look through as if everything was normally sorted; so, the thing designed to speed you up may actually slow you down. Like this, sometimes a program may start to consume large sums of memory and greatly slow down after prolonged usage because it just keeps hanging on to more and more.
The second case where you are holding processed data is especially great for speeding things up, but what happens when the information you derived your cache from changes? Maybe you filed your taxes, then realized you have an extra tax form you forgot to include. Now all those processed tax forms are no longer relevant and your taxes must be reprocessed. When this kind of caching error happens, you need to “clear your cache” which is like telling the computer to go double check the original documents and reprocess everything.
With the average American spending 10+ hours a day plugged in, eye health is becoming an increasing concern in our nation. Recent studies show that between 50% and 90% of people who work at a computer screen exhibit at least some negative symptoms as a result.
TVs, Computers, Cell Phones, Tablets, and other screened devices have all become such integral parts of our professional and personal daily lives that many of us would not even consider living without them at this point… but the negative impact they can have on one’s well-being should not be ignored.
Understanding CSV – Computer Vision Syndrome
Computer Vision Syndrome isn’t one specific problem. Instead, it includes a whole range of eye problems including eye soreness, headaches, blurred vision, dry eyes, and neck and shoulder pain. Likewise, there is no one cause for these symptoms. While many people assume the issue is just THAT they are using their devices too much, experts have determined that many of these symptoms can be negated through better habits and understanding of where these issues are coming from. If you suffer from from the above issues, try following these helpful steps:
- Adjust your lighting: The high contrast between a bright screen and a darker room can create extra strain on your eyes. A well lit room allows your pupils to dilate to the appropriate level for your monitor’s light output, or if your device offers the option, make sure to enable low-light mode and/or blue light filtering whenever you are in a more poorly lite enviornment. This can save your battery life and your eyes.
- The 20-20-20 rule: When you are working (or playing) in front of a screen for extended periods of time, take regular breaks for your eyes. It’s not hard once you get into the habit. Every 20 minutes you spend looking at a screen, stop to look at something else that’s at least 20 feet away for at least 20 seconds. On a related note, this is not a bad time to get up and walk around, and just let all your other muscles limber up a bit as well.
- Purchase computer glasses They are like reading glasses specifically for computer screens.
- Reposition your monitor: Monitors should be positioned 20″-30″ away whereas TVs should typically be 8-12 feet away depending on the size of your screen. Also make sure that your eyes are on level with your screen. The neck strain and headaches associated with CSV often comes from poor posture resulting in prolonged periods of looking either up or down with your whole head.
- Break up and reduce your total screen time: If your job requires you to look at a computer for eight hours a day, don’t start playing computer games the minute you get home. Spend more time outdoors, and focus on more distant, real-world subjects.
Addressing the eye health and ergonomic needs of your employees is important to the productivity of your workforce. Let one of our consultants evaluate your work-space, and help your employees develop a healthy relationship with their technological needs.
Many people think of cyber security as a specialized skill set handled by that one smart guy you hire to handle it, but as the world progresses, we find that you can’t just rely on someone else to be your sole gatekeeper for your entire computer system. As cyber-security experts have gotten better and better at making secure systems, criminals have gotten equally better at targeting the weakest link in these systems. And in today’s world, that link is typically the end-user.
The Risk of Not Knowing Cybersecurity Best Practices
When you check your email, it is up to you to decide if and email is fraudulent before clicking on any links. When you are on the web, and you are asked to enter a credit card or other personal information, it is up to you to know if the website you are connected to is both secure and legitimate. When you download an app, you have to decide if the permissions that app is requesting are actually things the app needs or if there is an underlying trojan trying to get the privileges it needs to bypass the security features built into your device. When you get a phone call warning you of a problem, you need to decide if the person you are talking to is actually your service provider, or someone trying to get you to divulge sensitive user account info.
Not knowing how to make these choices can be disastrous. One bad click, is all it takes to get your entire network encrypted by ransomware or install spyware that steals all your passwords.
Making IT Services and Personal Responsibility Work Together
This where your IT consulting firm comes in. If you have not received a Cybersecurity Policy from them request one. For most organizations, this should include:
- Criteria for evaluating if an email, website, link, or application should be trusted.
- Restrictions on what websites and services you may access from your work machine.
- Restrictions on what information can be saved and transmitted under various circumstances.
- Protocols for defining what information is confidential, and how to handle its storage and transmission.
- Instructions for identifying security redflags
- A policy for ensuring that employees are regularly trained on emerging security threats.
Don’t have a Cybersecurity Policy yet? Don’t settle for a one size fits all solution. ComSolutions’s expert security analysts can review your business model and help you determine the best approach for your business and regulatory compliance.
October 16th 2017, US-CERT publicly disclosed a vulnerability at the core of the WPA-2 encryption protocol. This vulnerability affects nearly every modern encryption configuration used for transmitting information across the internet, especially Linux and Android devices. The KRACK exploit was discovered by security researcher Mathy Vanhoef before it could be implemented for widespread misuse; however, now that this issue is public knowledge, it is extremely important for businesses to update their systems to protect against it.
How Serious is this Vulnerability?
In terms of how harmful this exploit can be, it is extremely serious:
- It can be used to steal any encrypted information that is transmitted from or received by your computer or mobile devices.
- It can be used to inject various forms of malware into local networks and website.
- It affects all kinds of internet enabled devices; however, the most serious threats of injection are specific to Linux and Android.
The good news here is that a hacker needs to be within range of someone’s wifi network to implement it; so, the likelyhood of it being used against your home computer is fairly low. The most likely candidates for this attack are big businesses and smaller businesses that handle secure information.
Due to the potential damage that this exploit could cause, we strongly urge our clients to review their local networks to ensure that all of their connected devices are properly patched.
Equifax revealed on Sept 7th, 2017 a data breach that compromised the personal information of 143 million users. This breach is reported to have exposed a number of sensitive pieces of personal information including Social Security numbers, birthdays, driver’s licenses, credit card numbers, and credit dispute documents.
To find out if your information has been compromised, visit:
What to do if you’ve been compromised?
- Check your bank and credit card statements for suspicious charges.
- You should make a habit of this. Many hackers wait months or even years to use your stolen information.
- Take an inventory of your online services that may be linked to your bank account or credit card.
- Make sure each account is using a different password to isolate breaches if they occur.
- Make sure you know what services you do and do not actually have so that you can better recognize fraudulent charges.
- Check your credit report for unexpected activity. Equifax is offering one free year of premium tracking to help users stay vigilant of issues that arise from this breach.
In light of the storms heading toward the Gulf of Mexico, ComSolutions wanted to share a few reminders to help make things a little easier when an emergency arises.
- Please note the following. If you are bringing your server or computer equipment with you or just want to leave it in place, please be sure to follow proper shutdown procedures. Remember that it is never safe to power a server off without following a specific protocol. To prevent damage, there is a specific order in which your equipment should be shutdown. If you’re unaware of how to shutdown your server or equipment orderly, CSI would be happy to assist. Please call our office at 504-224-9475 Ext 2 or email email@example.com to schedule a call or an on-site appointment.
- If you plan to work while out of town, here is a basic kit that can make working on the road easier:
- Plastic storage bin to carry the following
- Extension cord / surge protector
- Network switch and RJ45 patch cables
- Wireless router or WiFi HotSpot
- External drive(s) or NAS unit that we have identified.
- A list of all of your vendors, customers, and primary points of contact
- A copy of your insurance policies, agents phone number, and your business checkbook in the event of relocation.
- Setup an employee social media page for emergency communications
- Call ComSolutions at 504-224-9475 Ext 2. with any questions
- If you already have a cloud disaster-recovery plan with CSI, please call us so we can schedule a phone interview or appointment to review this. Remember to stay safe, keep us informed of your plans, and keep our contact info handy should you need any assistance.
March 31st is World Backup Day, but it’s important to backup more than one day per year! Here’s why.
Data can be lost in a number of ways including:
- Operating systems crashes
- Data corruption
- Hardware failures
- Lost or stolen devices
- Natural catastrophes including fires, flooding, etc.
- Accidental file deletion
- Failed or incompatible upgrades, patches, or other improvements to your system
- Deliberate sabotage by a disgruntled employee
- April Fools Day pranks gone too far… one more reason to do backups on March 31st
Remember don’t just back your data up, have a backup plan! This means having a comprehensive strategy for dealing with all of the above. Your backup plan should include solutions to all of the following common problems:
- If your entire workplace is destroyed by a catastrophe, do you have an off-site copy of your data to work from?
- Do your backups go back far enough to insure that you will have a good copy of your data, even if a virus or corruption gets saved to your most recent backup?
- Do your backups include all of the system settings required to restore your work to a new device without having to undergo lengthy reconfiguration issues?
- Do you have a place to restore your data and software to?
E911 Legislation and Compliance
As of 2017, your company or institution can be legally liable for 911 calls that fail to provide the correct location of the caller. As of December 31, 2016, if your system does not meet these standards, you have a legal obligation to change your phone system immediately in order to avoid stiff fines and penalties ranging from $500.00 to $5,000.00 per offense.
What does E911 compliance require?
- Calling 911 cannot require an outside access key such as having to press * to dial out (common in hotels and offices).
- A call to 911 must relay the detailed, physical location of the phone down to the room number, floor, or office number. Police, fire fighters, and paramedics use this exact information so they are sent to the correct location, avoiding any delay reaching the emergency.
- If disconnected, emergency dispatchers must be able to call the phone back directly without getting an auto-attendant, answering service, call center, or remote switchboard.
- 911 calls connect to the agency within closest proximity to the caller — not the central phone system’s location (e.g., corporate headquarters).
These safeguards are already built into our VoIP phone systems, but if you are unsure if your phone system meets these specifications, give us a call and we’ll make sure that you are covered.