Category Archives: Malware

What Should You Do If You Think You Have Been Hacked?

Small business owner upset over being hacked in the workplace. Leaning head on crossed arms over a laptop

Being a small business and being hacked can put you out of business if your not prepared

There are a couple of questions many business owners ask when it comes to hacking, and those two questions are:

  • How can I tell if I have been hacked?
  • What steps do I take if someone has hacked my business?

Unfortunately, many small business owners do not know they have been hacked. Apart from ransomware, there are many cybersecurity events that go unnoticed. Can you believe that many small businesses and medium-sized businesses can have data breaches that go unnoticed for a significant period of time, including several years? The breaches that are noticed are eventually noticed by someone outside the business, including law enforcement officials.

Can you imagine being breached and not knowing this has occurred until a third-party notifies you? If you data breach occurs and it goes undetected for a substantial period of time, you may never identify what actually caused the breach to occur in the first place. When you do not know how, why, or where the data breach took place, you may start questioning if all of your company’s data has been compromised.

How Do You Know If You Have Been Hacked?

When you have a full understanding of the different types of hackers and what their intentions are, you will be able to understand how anyone can be hacked. There are different businesses, small, medium, and large, that can all become a target for hacking. Hackers look for sensitive data that has not been carefully protected.

What Type Of Hacks Are More Common?

It does not matter if a hack is basic or advanced because even a basic hack can cause severe damage to a business. A small or basic hack can result in your computers or any devices doing things that they should not be doing. Some of the common hacker techniques include the following,

  • viruses
  • Distributed Denial of Service (DDoS) or Denial-Of-Service attack (DoS attack)
  • fake Wireless Application Protocol (WAP)
  • phishing attacks
  • in-house attacks

What Should You Do After A Hack Takes Place?

Do you have a plan in place if a hack does take place in your workplace? Your employees need to be trained well enough so they will be able to identify an attack on the business. When your employees are trained, they will be able to help your business get back to operating at its normal pace. Your business needs to get back to business as soon as possible after an attack has been identified.

If you have noticed that your system is behaving unusually and if you notice suspicious files that seem to be harmful, an attack has likely taken place. Professional and experienced hackers know how to carefully cover all their tracks. We suggest that you look carefully at your systems’ log files.The hackers also know how to delete those log files as well.

After you have identified you have been hacked, you should make sure the attack has been confirmed. Once there has been confirmation of the attack, you should check your computers, devices, and your networks to determine if anything else has been compromised. You will need to identify how much information the hackers have obtained.

When security breaches occur, critical data and information can be lost when your systems are down, include your network connections and content that is stored in your RAM. You will need to consult a professional so you can fully understand the options you have at this point.

It is extremely critical that you have the proper backups in place. It is also important that you have the right Managed Service Provider (MSP) that will provide you with the tools and resources you need to conduct business as usual after an attack has taken place. Contact us today for more information on how you can protect your business from hackers.

Recent Virus Release: Issues With Ransomware

Recent Virus Release

How to avoid dangerous Ransomware

Although computer viruses have always been a problem in the workplace, nowadays, surfing the web is getting more dangerous than ever. Not only are there plenty of websites filled with dangerous viruses, but many developers might even try to trick you into downloading dangerous software.

For example, let’s say you were looking for a solution to update your computer, and there was a seemingly legit website that provided some download links. In reality, this could just be a trick to get you to download some dangerous software. Even worse, though, many times, you might even accidentally download ransomware.

Basically, it is a sophisticated piece of malware that blocks the victim’s access to his/her files. Obviously, though, that’s only the gist of it, and the malware can be a lot more dangerous than it appears at first glance. With that said, even though many businesses know how to handle computer viruses, ransomware is in a league of its own. Here are a few things businesses should know when dealing with ransomware, and how to prepare it.

#1. What Makes Ransomware So Dangerous?

As I had mentioned before, even though it blocks access to your files, that’s putting it mildly. Aside from encrypting and locking all the data on your computer, the hacker also demands a ransom. If the sum of money isn’t paid within a certain amount of time, all your files will be deleted. Another downside is that once your device gets infected, it’s nearly impossible to get rid of the virus. In fact, the FBI has even encouraged victims to pay the ransom, since it’s the only way out. With that said, the only way to truly beat this piece of malware, is by paying the ransom, or avoiding it completely.

#2. How Does Ransomware Affect Your Business?

Aside from the obvious, which includes deletion of your files, ransomware affects your business from a more personal perspective as well. A company’s reputation is essential to running a successful organization, and ransomware can have a major effect on this, especially when it comes to your loyal customers. Remember, whatever happens in the workplace will have an impact on everyone, especially if it’s security related.

For example, let’s say you had both your files and customer documents on one device. If they got deleted due to ransomware, imagine how this would affect your customers. Not only would they go to look for business elsewhere, but more than likely, they will tell other potential customers about the incident as well. In the long run, this could turn potential customers away from your business. After all, customers don’t want to hear excuses. They want a business that not only protects their data, but one that also knows how to respond in the event of any unexpected incidents.

#3. How Can You Protect Yourself?

As dangerous as ransomware is, it’s definitely not unbeatable. One of the key ways to protect yourself, is by making sure to avoid it, since it’s very difficult to get rid of once you’re infected. Not only do you need to be smart about the websites you visit, but also be cautious of suspicious files and emails. Make sure to scan everything before downloading it, and always have anti-virus software installed. By taking these precautions, not only are you preventing yourself from getting infected, but you’re also setting a good example for your employees in the workplace.

For more information about the recent impact of ransomware, why it’s so dangerous, and how it affects customers, feel free to contact us today at SystemsNet. We look forward to hearing from you, and assisting you in the best way possible.

No end to ransomware in sight – so how can Webroot Antivirus help?

20170216

Protection against a ransomware attack

Malware seems to be everywhere, spreading to your devices from a range of sources including infected websites and email attachments.

One type that’s been frequently making the news is ransomware. Once ransomware gets in your system, it will lock you out of critical files or prevent you from using devices on your network. Cyber criminals deploying ransomware give you an ultimatum: pay a certain amount of money by a deadline, or lose access to your data permanently.

ZDNet recently reported on how ransomware has come to dominate malware infections, and has become more malicious and sophisticated, with some strains locking users out of their entire operating system or stealing data off the infected devices.

What are some of the effects of ransomware?

Ransomware can hit businesses and other organizations with staggering costs:

  • If you haven’t made regular, reliable data backups that have been kept safely apart from any system infected with ransomware, you may permanently lose your data. Ransomware can deny you access to financial spreadsheets, invoices, contracts, employee records, customer data, and ongoing projects.
  • Applications you need to use for your business operations are no longer accessible, hindering your ability to meet customers’ needs.
  • You suffer from downtime, with various business operations grinding to a halt.
  • Customers lose trust in your ability to safeguard your systems and their own data.

If you decide to pay the ransom (an inadvisable course of action), you wind up losing more money to the cyber criminals targeting you. Furthermore, they won’t necessarily hold up their end of the bargain; maybe you’ll end up permanently blocked from your data. It’s also possible that the criminals will accept your payment, restore access, and strike again the next day.

The news is full of painful reports about ransomware. Just recently, a police department lost several years of data (including some evidence) to ransomware, and a hotel paid cyber criminals who used ransomware to control the rooms’ electronic door locks. Hospitals, schools, and of course businesses of every size have come under attack from his virulent form of malware.

What can you do to prevent a successful ransomware attack?

Maintaining well-protected data backups and training employees in safer computing habits are both essential strategies for decreasing the chances that you’ll suffer a ransomware infection.

There’s also another line of defense that can help you protect your devices: a powerful, comprehensive anti-malware program.

For example, let’s look at the highly recommended Webroot anti-virus.

The core quality of any anti-malware program is its ability to identify malware and block it from becoming active on your devices. To detect malware, Webroot works off a massive database in the cloud. The database undergoes real-time updates, keeping you protected against the latest known threats.

What if you’re facing a new strain of malware that hasn’t yet been identified? This is a legitimate concern for ransomware in particular, with cyber criminals generating and deploying new strains. In that situation, what Webroot would do is analyze the new code introduced to your computing device and maintain it in a kind of quarantine until it’s deemed acceptable.

Will this work to fend off ransomware 100% of the time? Unfortunately not. There isn’t any anti-malware program that can successfully block every single strain of ransomware, especially new ones that crop up. Webroot, at least, offers you powerful, intelligent monitoring that will still detect many of the threats menacing your business.

The prevalence and maliciousness of ransomware makes it one of the greatest threats to your business. Although anti-malware/anti-virus software can’t serve as your sole defense against ransomware, when it’s an effective program like the one offered by Webroot, you still enjoy significantly heightened protection. Don’t hesitate to contact us for more information, including advice about the Webroot package that’s best suited for your business.

Signs Your Computer Is Infected With Malware

20160408

Suspicious or unwanted pop-ups could be a sign your computer has been infected with malware.

Whether you own a personal computer, or have an entire network at your disposal, it’s always important to be knowledgeable about malware. Aside from infecting your computer in numerous ways, malware is also found where you’d least expect it to be. For example, there are many websites out there which seem safe at first glance, but upon visiting them, your computer may become vulnerable to malicious software and other dangerous programs. As another example, you may even receive an email from what appears to be a coworker, only to find out it’s completely unsafe when you open it. With that said, what are some ways in which you can tell your computer’s infected with malware?

#1. Repeated Advertisements 

While just about any website will have advertisements, one sign that your computer is infected, is if you notice the same ads on every website visited, especially if they happen to be suggestive or explicit. For example, let’s say that you’re on a website for your business, and the advertisements are for estrogen pills. When visiting other sites, you also notice these same ads constantly showing up. It’s not often for websites to display the same advertisements, so this could be a case that your computer has become infected.

#2. Unwanted Pop-ups 

One of the most common signs that your computer is infected with malware, is if you keep receiving frequent pop-ups. This doesn’t just happen from visiting unsafe websites, either, but many downloadable files are often bundled with adware and other hidden programs, which are often the cause of this issue. Because there are many who don’t read the terms of service before downloading files or programs, they might not be aware of what’s really being downloaded. However, there are plenty of downloadable programs where you wouldn’t suspect they’re unsafe, even through careful observation. Always be cautious when installing files and/or programs on your computer.

#3. Suspicious Emails

As was briefly mentioned earlier, a sign your computer may be infected with malware, is if you happen to receive suspicious emails, especially from your coworkers. In the emails, are they requesting important information from you, and does the tone of their message seem off? If you’re not sure whether the message was from them, always confirm before taking any action, and block the email address in question. While suspicious emails may not always be a sign that your computer is infected, it could be an indication that someone wants your device to become susceptible to malware, which will be the case if you open the suspicious email.

#4. Slowdown on Your Computer

While there are plenty of reasons for a computer to run slower than usual, never hesitate to check and see if it’s malware related, as it can have an effect on your computer’s performance. Besides, how long has your computer been running slow? If it’s an incident that’s happened recently, perhaps it’s a problem with your machine being infected. On the other hand, if it’s not very frequent, it may just be a case of unnecessary programs slowing down your performance. Either way, always make sure you know the reason for your computer’s lack of performance. Unlike the other signs your computer is infected with malware, such as receiving unwanted emails, it can be harder to narrow down the reason for your computer’s slowdown.

While many businesses are more than aware of how dangerous malware is, knowing whether your computer’s infected or not, is just as important. Between repeated advertisements on various websites, numerous pop-ups through downloadable programs, as well as receiving suspicious emails from what appear to be your coworkers, there are plenty of ways to tell that your computer is infected. For more information, contact us today at SystemsNet.