What to Watch For – Ransomware Attacks

TeslaCrypt is one of the most prevalent ransomware attacks in the US

Ransomware – What You Need to Know

Diverse Tech Services has noticed a sharp increase in attempted ransomware attacks over Q1 and Q2 2016.  These attacks are primarily initiated through e-mail attachments, but also through social media websites linking to infected websites. Websites like Facebook, Twitter, and Pinterest are susceptible to these attacks by linking users to outside web addresses.
What does ransomware do?

There are different types of ransomware. However, all of them will prevent you from using your PC normally, and they will all ask you to do something before you can use your PC.

They can target any PC users, whether it’s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.

Ransomware can:

  • Prevent you from accessing Windows.
  • Encrypt files so you can’t use them.
  • Stop certain apps from running (web browser, anti-virus).

Ransomware will demand that you pay money (a “ransom”) to get access to your PC or files. We have also seen them make you complete surveys.

There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.

How to protect yourself?

  1. Be cautious about unsolicited attachments
    The crooks are relying on the dilemma that you should not open a document until you are sure it is the one you want, but you cannot tell if it is the one you want until you open it. If in doubt, leave it out.
  2. Do not enable macros in any document attachment received via email
    Microsoft deliberately turned off auto-execution of macros by default many years ago as a security measure. A lot of malware infections rely on persuading you to turn macros back on, so do not do it!
  3. Regularly backup your important files
    There are dozens of ways other than ransomware that files can suddenly vanish, such as fire, flood, theft, a dropped laptop or even an accidental delete. If your company has a share drive or file server, make sure to save your important files there. Often saving them to “My Documents” or to the “Desktop” does not ensure that they are backed up.

 

How does ransomware work?

Ransomware is computer malware that installs covertly on a victim’s computer, executes a cryptographic attack that adversely affects it, and demands a ransom payment to restore it.

Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt the computer’s Master File Table (MFT) or the entire hard drive.

Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.

 

How does Diverse Tech Service stop the threat?

Diverse Tech Services utilizes the latest in security tools. We work to block all threat vectors to ensure total protection. When it comes to stopping these advanced threats in their tracks, we rely on our Email Security Service, or ESS.

ESS is a comprehensive and affordable cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses, worms, phishing, and denial of service attacks.

Whether you manage your own mail server such as Microsoft Exchange or use a hosted service like Microsoft Office 365, Spam and viruses are blocked in the cloud prior to delivery to your network, saving network bandwidth and providing additional Denial of Service protection.

Business Security: Keeping Your Data Secure

Keeping your business protected is about more than the physical locks you keep on the front doors or on the filing cabinets. It involves have passwords on computers and networks, having firewall protection, and having a plan in place for data disasters. Keeping your data secure is vital to keeping your business secure, but how can you do that? How can you protect your data in today’s technology driven world? Here are just a few ways to start protecting your data:

Read more

Over 100 Famous Hollywood Actresses’ Secret Naked Smartphone “Selfies” Stolen By Hackers

As you probably read, earlier this year over 100 celebrities (including Hunger Games star Jennifer Lawrence, swimsuit model Kate Upton and many more) recently had naked and explicit photos hacked from their iCloud accounts and published online. The hackers aggressively attempted to blackmail many others, threatening to post their pictures online.
While it’s very easy to dismiss these hacks as a publicity attempt targeting only the rich and famous, it’s scary to think of all the data we have in our businesses that we would never want in the hands of any criminal.

Small Business Are Actually A Cybercriminal’s Favorite Target

Why? Because small business owners are not prepared and make it easier on criminals. One of the biggest issues facing small business owners in the fight against cybercrime is the lack of a cybersecurity plan. While 83% lack a formal plan, over 69% lack even an informal one. And over half of small business owners believe that cybercrime will never affect them.
Cyber-attacks cost SMBs an average of $188,242 each incident, and nearly two-thirds of the businesses affected are out of business within 6 months (2011 Symantec/NCSA Study). A separate study by Verizon showed that over 80% of small-business cybercrime victims were vulnerable because of insufficient network security (wireless and password issues ranked highest). With secure networks and no formal plan to combat them, we make it easy on the criminals.

Fight Back Against Cybercriminals With This Free Report:
“What Every Business Owner MUST Know To Protect Against Online Identity Theft”

This free report outlines in plain, non-technical English common mistakes that many small business owners make with their computer and network security that put their personal information and identity at risk of being stolen.

Out of Date Virus Scanner

You probably get that annoying pop-up window down in the lower right hand corner of your screen about your virus scanner. If you’re like most users, you probably even click on ignore or update later, but if you knew the damage that could cause, you wouldn’t. Out of date virus scanners can actually be just as harmful to your data and your computer as not having a virus scanner.

Read more

How to Make Your Password Stronger

How to Make Your Password Stronger

With the world increasingly turning to the Internet for solutions, work, finances, and basically everything else, passwords have become our first line of defense. But, what happens when that line is broken? What happens when your password has been cracked? The reality is, you can lose a lot because once someone has our password, then gain access to most of your life.

Read more

The eBay Hack and What You Need to Know

Password Security

By now, you have probably heard that eBay was hacked recently. There’s even a good chance that you are an eBay user and have been notified about the hack. If you received an email from eBay, it most likely told you that you should change your password to help keep NS0-920
your information protected. And while that is crucial, it certainly isn’t all you need to know.

Read more

Serious Internet Explorer Bug

Internet Explorer Bug

If you are currently reading this blog post in Internet Explorer, you might want to take minute to switch to a different browser. Over the weekend, FireEye Research Labs discovered a bug in the Internet Explorer Web browser that as of today (April 29) has no solution. It may not seem like it’s a huge deal, but when you consider approximately 50% of all browsers currently being used are Internet Explorer that can lead to some serious issues.

Read more

What You Need to Know About Heartbleed

Heartbleed FAQ

By now, you have probably read the term or heard someone say something about ‘Heartbleed.’ Recently, it was discovered that there is a small bug that in software that is designed to keep your password and other login information safe. There isn’t a need to panic, but learning about Heartbleed can help keep you protected now and in the future.

What is Heartbleed?

In simple terms, Heartbleed is a software bug that allows hackers to access and steal your personal information like passwords. And if someone can access your passwords, they can access just about anything.
Read more