What to Watch For – Ransomware Attacks

TeslaCrypt is one of the most prevalent ransomware attacks in the US

Ransomware – What You Need to Know

Diverse Tech Services has noticed a sharp increase in attempted ransomware attacks over Q1 and Q2 2016.  These attacks are primarily initiated through e-mail attachments, but also through social media websites linking to infected websites. Websites like Facebook, Twitter, and Pinterest are susceptible to these attacks by linking users to outside web addresses.
What does ransomware do?

There are different types of ransomware. However, all of them will prevent you from using your PC normally, and they will all ask you to do something before you can use your PC.

They can target any PC users, whether it’s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.

Ransomware can:

  • Prevent you from accessing Windows.
  • Encrypt files so you can’t use them.
  • Stop certain apps from running (web browser, anti-virus).

Ransomware will demand that you pay money (a “ransom”) to get access to your PC or files. We have also seen them make you complete surveys.

There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.

How to protect yourself?

  1. Be cautious about unsolicited attachments
    The crooks are relying on the dilemma that you should not open a document until you are sure it is the one you want, but you cannot tell if it is the one you want until you open it. If in doubt, leave it out.
  2. Do not enable macros in any document attachment received via email
    Microsoft deliberately turned off auto-execution of macros by default many years ago as a security measure. A lot of malware infections rely on persuading you to turn macros back on, so do not do it!
  3. Regularly backup your important files
    There are dozens of ways other than ransomware that files can suddenly vanish, such as fire, flood, theft, a dropped laptop or even an accidental delete. If your company has a share drive or file server, make sure to save your important files there. Often saving them to “My Documents” or to the “Desktop” does not ensure that they are backed up.

 

How does ransomware work?

Ransomware is computer malware that installs covertly on a victim’s computer, executes a cryptographic attack that adversely affects it, and demands a ransom payment to restore it.

Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt the computer’s Master File Table (MFT) or the entire hard drive.

Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.

 

How does Diverse Tech Service stop the threat?

Diverse Tech Services utilizes the latest in security tools. We work to block all threat vectors to ensure total protection. When it comes to stopping these advanced threats in their tracks, we rely on our Email Security Service, or ESS.

ESS is a comprehensive and affordable cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses, worms, phishing, and denial of service attacks.

Whether you manage your own mail server such as Microsoft Exchange or use a hosted service like Microsoft Office 365, Spam and viruses are blocked in the cloud prior to delivery to your network, saving network bandwidth and providing additional Denial of Service protection.

Seven Reasons Manufacturers Need Managed Services

  1. Skilled Resources: With an experienced managed services partner, manufacturers gain access to technologists with diverse experiences and depth of knowledge that can help them balance their IT needs with effectively running a manufacturing business.
  2. Lower Costs: These experienced, efficient technology experts are likely a fraction of the cost of full-time employees staffed round the clock thanks to managed services’ shared resource model.
  3. Best Practices: No more cutting corners. Professional managed services providers (MSPs) adhere to proven industry standards like the Information Technology Infrastructure Library’s (ITIL v3) best practices; Companies that operate on a global basis should also be able to deliver a common services platform that is consistent across all geographies, yet is flexible enough to meet unique regional needs.
  4. Proactive vs. Reactive Management: MSPs can offer detailed performance reviews that allow manufacturers to examine operational analytics and address issues proactively before a major service outage is experienced.
  5. Guaranteed Uptime: Using a managed services provider reduces the risk of downtime by properly managing physical, storage, and fixed network assets.  All changes are captured in an auditable configuration management database (CMDB) for compliance purposes, and stringent SLAs can be custom tailored to the organization’s needs.
  6. Predictable Costs: By embracing a managed service model, manufacturers can simplify budgeting with more predictable monthly costs for technology management.
  7. Time Savings: Knowing that they have a robust, reliable infrastructure in place puts the manufacturer’s struggle of prioritizing IT needs in the past. Previously overworked IT employees can now redirect their efforts to more value-added activities, focusing their time and attention on supporting business initiatives and building competitive advantage.

Touch on a frustration? Spark an interest? Reach out today! Call 317-524-5700 to learn more about Diverse Tech Services proven solutions for manufacturers.

Running Your Business From Your Phone

If you are a manager or owner of a company, your life is probably spent in meetings, answering emails, traveling, and a whole slew of other responsibilities. For many, work may take you out of the office, which means running your business can become even more complicated than it already is. Thankfully, today’s technology filled world means that running your business form your phone is completely possible. With so many apps available to schedule your time, manage your tasks, and stay connected to your work, it really is possible to run your business from your phone. Here are a few ways you can do this:

Read more

Business Security: Keeping Your Data Secure

Keeping your business protected is about more than the physical locks you keep on the front doors or on the filing cabinets. It involves have passwords on computers and networks, having firewall protection, and having a plan in place for data disasters. Keeping your data secure is vital to keeping your business secure, but how can you do that? How can you protect your data in today’s technology driven world? Here are just a few ways to start protecting your data:

Read more

Selecting a New ERP System

Whether you are looking for a new enterprise resource planning system or are looking to purchase your first one, there are specific elements you need to look for. Your ERP system allows you to collect, store, manage and interpret data from a variety of business activities. Through this data, you can improve your processes, plan products, and increase/manage your manufacturing and service delivery. Without an ERP system, you could be looking money, productivity, and other critical resources. However, choosing the wrong ERP system can be just as detrimental. As you begin the search for a new system, here are a few things to keep in mind:

Read more

The Benefits of Going Paperless

For many businesses, technology is becoming more and more integrated into their daily processes. From generating reports to tracking data, technology makes our lives easier. However, many businesses still rely on paper for many tasks and projects. While going completely paperless may not be an option for you, there are certainly great benefits of going paperless, or, at least, relying less on paper than in the past.

Read more

How to Use a Password Manager

If you are like most, then you probably have multiple passwords that you use on a daily basis. From unlocking your computer to accessing your email, you should be using different passwords for every account you have. By using multiple passwords, you are creating a better security wall and protecting yourself even more. However, keeping track of all of those passwords can be tedious. Luckily, password manager can store all that information securely for you.

Read more

Creating Your Data Disaster Recovery Plan

As a business owner, you rely on your data every day. You rely on data to make improvements, operate, and manage your business. However, do you have your data backed-up properly? Do you know what to do if your server crashes? What happens if a data disaster strikes and you are properly prepared to handle that?  A Data Disaster Recovery Plan will not only help you prepare for a situation like those, it will outline how to recover from the disaster and keeps your business running smoothly.

Read more

5 Productivity Apps for Your Phone

Starting the new year off right is crucial for any business or any professional. One of the best ways to accomplish this is to make sure you have the right tools. There are great productivity apps that you can download to your phone and increase what you accomplish on a daily basis. Whether you are a CTO or a help desk technician productivity apps for your phone can give you that extra advantage you need for the new year. Here are a few apps that you should consider downloading:

Read more

Which Internet Browser is Right for You?

Internet browsers are not as simple as they once were. They do so much more than connect us to the Internet. A browser can offer you plug-ins to help you with specific tasks. They can be set to your custom preferences. And, a browser can provide you with faster speeds when using the Internet, depending on what you are doing. So, the question is: which Internet browser is right for you?

Read more