All posts by SystemsNet Administrator

Proactive Monitoring of Network Infrastructure: Lessons from an October 2016 DDoS Attack

20161202

The October DDoS attack on Dyn showed the world how truly vulnerable and fragile our network infrastructures can be.

“It can’t happen here.” These are some of the most dangerous words business owners utter when it comes to their company’s IT system.

CSO Online highlighted this point in a recent article that urged people to anticipate new IT dangers and prepare for them even when they still seem remote. Along with malicious cyber attacks, companies face the danger of other emergencies, such as malfunctioning devices and massive network failures.

One example: The October 2016 DDoS attack

The article mentions a cyber attack that led to a massive Internet outage this past October, denying consistent access to major sites such as Twitter, Amazon, and Netflix.

The attack, which came in waves over a span of close to 12 hours, hit an Internet services company. It was a Distributed Denial of Service (DDoS) attack that used millions of Internet-connected devices, including security cameras, to send unsustainable amounts of traffic to the targeted company’s servers.

What are some of the lessons we can take from this attack?

  • Scant protection for Internet-connected devices can cause serious problems. Cyber criminals used a malware program to infect the devices and control them, allowing the DDoS attack to launch in a massive way from numerous systems. These devices generally had deficient protection against malware. For example, they may not have had strong passwords or firewalls, and they may have remained completely open to the public Internet. If a device is left with poor defenses, it can get exploited for nefarious purposes. That’s why it’s critical to choose the best devices, configure them properly, and monitor their activity. Understand the vulnerabilities of each device, and introduce it to your network only as needed.
  • Attacks can come from anywhere and for many reasons. There’s a misconception that cyber attacks get carried out only by computer experts. The reality is that even people without much training can use relatively simple programs or buy services from a shady entity to perpetrate cyber crimes. In this recent DDoS attack, the malware program that infected the Internet-connected devices was straightforward to use; it didn’t demand a high level of skill. Another point to consider is that attacks may stem from a range of motives. The usual ones involve stealing sensitive data for financial purposes. But there are potentially other reasons as well, including vengeance and political protests. It won’t always be clear why you’re under attack or what the cyber criminals want.
  • Monitoring for unusual network activity is critical. It isn’t possible to anticipate or fully block every single attack that may come your way. However, the proactive monitoring of network infrastructure and activity can still give you a warning that something is wrong. The sooner you detect a problem, the more likely you are to either thwart it completely or mitigate its effects. You’re less likely to get blindsided and have to scramble unprepared for a solution. Even if an attack gets launched on a massive scale, like the DDoS attack in October, proactive monitoring and organized defenses may still curb some of the worst effects. You’ll be able to regroup more quickly and reduce the amount of downtime you experience.

Protecting your network can seem like a daunting task, and in many ways it is. Unfortunately there isn’t any one protection that works 100% of the time. However, there are still effective measures for preventing or limiting cyber crimes and other IT emergencies. Monitoring your network round-the-clock is one of the best decisions you can make to protect your company.

Don’t hesitate to contact us to further discuss our network monitoring services. Unlike a purely reactive attitude, which results in a costly lack of preparedness, a proactive approach for your IT activities will save you money and unnecessary frustration. It will decrease the chances that you’ll suffer from protracted downtime and suffer serious damage to your system.

Backup Disaster Recovery and Dealing with Computer Viruses

20161118

A backup disaster recovery plan can ensure that, if you’re affected by a computer virus, your information will remain safe.

When you’re in the workplace, you always need to have a plan for combating viruses. Hackers are becoming tricker in their tactics, and it’s imperative that you’re outwitting them. In fact, viruses and other malicious software, should always be a cause for concern in the workplace. While it’s true that those aren’t the only disasters which may occur, they certainly leave the most lasting impact. For example, let’s say there was an unexpected power failure, or liquid spilled onto your keyboard. While these are damaging, at worst, you might simply lose any unsaved files.

With computer viruses however, some of these erase all the data on your hard drive, and make your device completely inaccessible. What is the best way to deal with these attacks? First of all, you need to have a disaster recovery plan. That way, even if your device does become infected, all your files are easily recoverable. However, just because you have a backup disaster recovery plan, that doesn’t mean you should seek out computer viruses, or be laid back about your security. We’ll get back to this discussion, but in the meantime, let’s look at the best way to actually combat these attacks from cybercriminals. After all, a recovery action plan is one thing, but you want to deal with these threats directly as well.

Anti-Virus Software

Even the most inexperienced businesses know that anti-virus software is the most common way to deal with…well, viruses. Whether you’re using McAfee or Kasperky Security, network protection is great for preventing your computer from getting infected. Without security on your computer, the Internet is a dangerous minefield. One wrong move, and you could be taken out.

However, having anti-virus software for your company isn’t enough; you need to have the right security as well. For example, have you installed the most recent software available, or have you been using the same program for years? Many hackers look for security holes and vulnerabilities in outdated software. If you’re not using the latest anti-virus software, for example, it might be easier for them to attack you.

One thing that makes these programs great isn’t just the network protection, but it secures you while you’re on the Internet as well. Many programs now have safe features which block malicious pop-ups on websites, and even warns you of sites that are dangerous. If you make a careless mistake and go to the wrong site, for example, you’ll be prevented from going any further. Overall, anti-virus software is one of the most important and basic tools for protecting your business.

Now that we’ve discussed the basics for protecting your business, let’s get back to having a disaster recovery plan. It may not combat viruses directly, but how is it effective when your business is under attack?

The Effectiveness of a Backup Disaster Recovery Plan

First of all, it’s effective because it makes the cybercriminal’s attack, completely ineffective. They lose all sense of power, and no longer accomplish their goal. In fact, let’s look at it this way. Let’s say you had multiple backup methods, storing your data via a flash and cloud computing. If a hacker infected your computer with a virus that erased the files on your hard drive, you’d have nothing to lose. You might need a new computer, and you’d still have to get the virus off, but your data is safe and sound. All files are still stored on your portable device, and even accessible via cloud (the Internet).

Overall, you can’t have one without the other. Combating viruses directly is important, but what if you need to recover your data, and don’t have a recovery plan? On the other hand, don’t completely rely on a backup plan, without having programs to combat these viruses, either.

For more information about the importance of having a backup disaster recovery plan, especially when dealing with malicious software, feel free to contact us today at SystemsNet. We look forward to hearing from you, and assisting you in the best way possible.

The Importance of Backup Disaster Recovery (BDR)

20161028

Cloud backup is a valuable part of a backup disaster recovery plan that ensures your data is secure.

Businesses rely on a complex network of servers to maintain their business operations, but their owners may not understand the various risks that exist in the present landscape. It’s important for business owners to choose different forms of protection against threats and to provide for disaster recovery. A comprehensive plan includes how to back up on-premise and off-premise servers.

Is Your Company at Risk?

Business servers and employee workstations are vulnerable to risks from inside and outside the organization. Your machines could have greater needs for backup disaster recovery (BDR) than you realize. It’s important to conduct a risk assessment to identify the key threats that could affect your servers. While yo might not buy a preventive solution for every risk, you can choose protective solutions for each server.

Do You Need More Equipment?

Your company may also decide to purchase special equipment that physically backs up data stored on each server. Even if you purchase one solution, bear in mind that your backup devices may also sustain damage. Some business owners mistakenly believe that sufficient protection for new servers many spending money once. The reality is that business servers require additional protective measures over their lifetime. Business owners like you need to prevent the actions of malicious people who target businesses. They’re constantly finding new ways to hack business IT systems.

Protecting Servers on the Premises

Some of your servers are located on-premises, and others are at other sites. It’s easy to believe that your building’s security systems can protect all servers, such as security personnel physical inspection of all work areas at night, employee monitoring software, and employee user profiles with frequently changed passwords. Even with these security practices, every server that you own could be compromised. For example, an employee could accidentally delete information or intentionally damage a business machine. Any disruption to a server’s normal operations produces downtime. If multiple servers go down, then your company cannot meet its obligations to customers.

Avoid Downtime

You don’t want downtime in your company. The longer the downtime, the higher the costs to your business. Without adequate backup solutions, important business data could be lost forever. You want to avoid the negative impacts on customers and business partners. You should invest in a comprehensive solution that will back up your data and take over for damaged servers.

Considering the Risks

We have only covered some risks to normal operations, which could be everything from hackers to building fires. A good backup disaster recovery provider will get your servers back up within minutes. If an adverse event damages on-premise machines, your server applications and associated data are immediately backed up. Their respective tasks are assigned to remote servers. Your business applications shift to the cloud and continue to run. For this peace of mind whenever adverse events affect your on-premise servers, count on a relationship with our virtualization company. We want to serve your needs.

What If Your Servers Are in the Cloud?

Not all businesses rely on internal servers, especially organizations that are subject to government regulations for protecting consumer data. Many applications are in the cloud, which means you aren’t able to physically protect servers at their exact location. An external provider’s servers may also sustain damage or total loss. What your company might need is a comprehensive solution that provides backup and recovery solutions to both internal servers and cloud-based systems.

Get Protected

It pays to use proven disaster recovery partners in ways that fit your company’s existing network of servers. Discover the benefits of backup disaster recovery through a partnerships with our company. For more details, please contact us today.

How to Use Dynamic DNS

20161104

Using a dynamic DNS can help ensure your home business’s online presence is runs smoothly.

You’ve been building up the computer systems for your home business. It’s reached the point where it’s worth putting them on their own Internet domain. It’s a little tricky, but you can do it.

Here’s the issue. Every device on the Internet has an IP address. It’s a set of four numbers, such as 10.1.1.1. People don’t access the Internet by IP addresses, of course; they use domain names. A Domain Name Service (DNS) maps domain names to addresses; for instance, www.example.com might have the address 10.1.1.1.

If you’re a big company with a lot of money, you can get a fixed IP address that belongs to your domain. It will rarely change, if ever. But for most of us, there’s a problem: There aren’t enough addresses to go around. If you’ve got an account with an Internet service provider, it allocates an address dynamically to you, using a pool of addresses. It can change at any time.

If you want to register a domain for your home-based system, that’s a problem. The IP address which you have at the moment could belong to someone else in a few hours. Still, there’s a way to do it. Some DNS registrars provide a service called Dynamic DNS.

(There’s another IP address scheme, called IPv6, which eliminates the problem by providing a lot more addresses. It hasn’t caught on universally, though, and till it does you need an old-style, IPv4 address.)

Setting up Dynamic DNS

With Dynamic DNS, your registrar keeps your IP address up to date on its server through all its changes. Your equipment has to notify the registrar of each change. The software that does this is called an update client. There are two ways to set it up.

One way is to have your router act as the update client. Many routers support this feature. This is the simpler approach, since you don’t have to install any software in your computer. You just need to configure it according to your provider’s instructions.

The other way is to have the update client run on your computer. That’s more reliable, since you can install software tailored for or recommended by your provider.

When should you use Dynamic DNS?

Dynamic DNS has some problems. A dynamic IP address can’t be cached as much as a fixed one, so there’s more overhead looking it up, affecting performance. If your client misbehaves, you might disappear from the Internet. Free services are available, but they usually limit you to certain domains or subject you to ads and “nagware.” A paid account isn’t expensive, though.

When does it make sense to use a home-based system with Dynamic DNS, rather than getting a free or inexpensive hosted site? Everyone’s reasons will be different. Here are a few possibilities:

  • You want to access your own computer easily when you’re on the road.
  • You’ve got specialized software which is very resource-intensive or otherwise problematic for a hosted system.
  • You have unusual computer hardware which is essential to what you’re doing.
  • You just like having full control of the host computer.

If you’ve got a specialized service that you want to run on your own equipment, you can still have your website hosted and use a subdomain (e.g., myservice.example.com) for your unique software. Every subdomain that you control can have a different IP address and different DNS service.

Hosting your own domain means extra responsibility. Any published domain becomes a target for crooks cruising the Internet for sites to attack. You have to be extra careful to configure your firewall and set up strong passwords to keep intruders out.

If you really need your own domain for your own equipment, though, Dynamic DNS is the way to go, and it’s not that expensive or difficult.

SystemsNet provides support and managed services to keep your computer systems running smoothly. Please contact us to learn what we can do for you.