Category Archives: Security

How Extensive is Malware in Today’s Business World? The Realities, and the Best Protection

Malware is becoming increasingly prevalent in this digital age, but that doesn't mean you need to become a victim.

Malware is becoming increasingly prevalent in this digital age, but that doesn’t mean you need to become a victim.

The word malware is an old term that probably makes you bristle whenever you hear it. You’ve likely heard the term used often ever since you’ve been on the Internet, and possibly close to 20 years. In those last two decades, malware went from something only the careless ended up getting on their computers to everyone getting it, even when taking precautions.

This doesn’t negate the reality it’s still preventable. What the real problem is involves not having proper managed services in place for expert preventative measures. When you’re on your own trying to stop malware, you’ll be tempted to skimp on real security just to save money.

It’s then when you place yourself at a higher risk based purely on complacency just because nothing happened before. Once it does happen, it can instigate downtime costing you more money than you think, sometimes enough to put you into bankruptcy.

The reality is, malware is a daily problem that’s only growing more troublesome because of its ubiquitous nature and how it’s fooling companies. Far too many types of malware are out there that come in emails looking eerily real. When someone clicks on a link they think is legit, it’s already too late.

Take a look at what’s really going on in the world of malware lately, what effect it’s having, and what you can do to prevent it. At the very least, you should see what tools are available to at least get you back on your feet if malware still hits you.

Malware in Apps

You’re starting to see an increase in malware getting into popular apps available on prominent app stores. Most recently, an Android malware ended up on Google Play and into an intelligence app (ironically) that infected multiple thousands of people in the process. It was an example of how something looking so innocuous in a prominent place is just as vulnerable as anywhere else.

What makes this malware especially bad is it stays on many mobile devices even after the infected app gets uninstalled. As a result, it poses a new problem for malware becoming more prolific in the app world and possibly beginning to infect more mobile devices across the country.

However, the above is only the beginning in malware infiltrating various tech devices worldwide.

Malware in Routers

A recent report shows that a new type of malware once thought theoretical suddenly infected routers made by Cisco. Found in several different countries, it shows you how global malware is. You can also see how malware can technically get into any device, which could cripple your company if infecting something you wouldn’t expect like a router.

Even worse is a type of malware that completely hijacks your computer to a point where your business could shut down for weeks.

Ransomware as the Worst Type of Malware

Arguably, ransomware is the worst malware currently in existence because it so easily fools people in emails and ends up hijacking your systems until you pay a ransom. Even after paying ransoms, businesses don’t always get their systems unlocked, though some lucky few do.

Wired recently did a detailed piece on ransomware and how you can avoid it. They reiterate as we do here at SystemsNet: Good managed services matter in how well you protect yourself.

With our managed services, you have everything you need and done remotely so it doesn’t get in your way. You’ll have complete protection from viruses, malware, plus remote IT support whenever it’s needed.

Contact us to find out more about our comprehensive IT services and how you can get protected from the encroaching threats of malware.

IT Help Desk Discusses How to Share Files Safely

IT Help Desk allows your business to share files in the cloud quickly and securely.

IT Help Desk allows your business to share files in the cloud quickly and securely.

In the old days before the Internet, the only way to share files was to copy them to hard media, such as a CD, and then send the media to the recipient either through the mail or by hand delivery. Such transfers were inconvenient, required extra time, and cost money. But they were also secure. Unless a potential criminal had a way to break into a mailbox on the exact day the files were being transferred, there was no way he could gain access to your data.

Today, sharing a file is as easy as emailing it or popping it in a cloud storage locker to which the recipient has access. Transfers are almost instantaneous but can be insecure. Putting your file on the Internet potentially exposes it to hackers next door or in Eastern Europe. While no online sharing of information can be 100-percent secure, you can increase the safety of your transfers with the following tips.

  • Educate everyone involved with file sharing. Make sure all people involved with the sharing process, whether it’s your clerk at reception or the client getting the info, are aware of the safety issues and what they need to do for security. Create a list of best practices that you can distribute to people involved. For example, do not allow file transfers over insecure public wi-fi services, such as coffee shops or commuter lines.
  • Add encryption and password protection. A file sharing or cloud service that automatically encrypts files adds a strong layer of security. But even if it does not, many operating systems, such as Windows, have built-in encryption services that are easy to use as right-clicking a file and marking a check box. Third-party encryption tools are also available, such as VeraCrypt or 7-Zip. Just make sure your recipient has access to the same encryption protocols or she won’t be able to access what you send.
  • Add security software and keep it updated. Viruses and other malware can hitch a ride on your files at any point during the transfer. You may not be able to stop a determined hacker from infecting your work but you can prevent his efforts from spreading throughout your systems with anti-virus and security software. Make sure that your firewall is enabled at all times. Keep all your software updated. Hackers constantly always develop more sophisticated attack methods, which requires nearly constant updates from security software manufacturers. The only way you can keep up is by implementing any changes as soon as they appear.
  • Double-check any files you receive. Your security software will hopefully automatically run checks on any files that are shared with you, whether they arrive online or via hard media. It will typically inform you that it is performing the checks and acknowledge what it finds with a message. If you see neither the performance message nor confirmation result, run a manual check on the files yourself. If nothing still happens, ask the sender what’s going on. The files may have picked up malware that prevents your security software from functioning on those particular files.

The most secure way of sharing files is also the most old-fashioned and inconvenient. Put them on media that you physically transfer to your recipient. Barring that, you can continue to share files online more conveniently and securely but only if you do so with knowledge and by taking appropriate precautions.

If you want to know more, please contact us. As your IT help desk experts, we will be glad to show you how to implement enterprise-wide security precautions that protect all your file transfers with minimal fuss on your part.

Viruses: Like a Ninja Waiting to Take Down Your Business

Like a ninja, some programs rely on secretly infiltrating your computer, embedding themselves among some of the systems most crucial to your computer, and simply wait.

Like a ninja, some programs rely on secretly infiltrating your computer, embedding themselves among some of the systems most crucial to your computer, and simply wait.

If you’re familiar with your computer, you’ve got a pretty decent idea what programs you have on it. You probably have a word processor, an internet browser or two, some work specific programs, and a few other odds and ends. There could be one or two others on there that you don’t even know about, though, and those are the ones that can cause you major problems down the road.

Hiding in the Digital Shadows

Like a ninja, some programs rely on secretly infiltrating your computer, embedding themselves among some of the systems most crucial to your computer, and simply wait. Often, these programs will not give any sign they’re there, and by the time they do give a sign that they’re in your system, it’s often a losing battle trying to get them out.

They can do anything from corrupt files, to render your computer completely useless, and never do they do anything good. They can even be used to gather information about you or your company that can then be used by criminals. It’s a scary thought.

A Hero to Save the Day

Thankfully, there is a reliable solution: Anti-Virus software. This software works tirelessly to detect and kill those silent, secretive, and damaging virus programs. Most anti-virus programs rely on extensive teams of analysts and coding masters to ensure they identify and learn how to remove new and unique viruses as soon as they come into circulation.

In this internet age, they’re simply essential, and they aren’t something you want to skip out on when it comes to personal or professional computers.

One of our specialties is finding the best anti-virus software available and helping to get you protected. We offer a wide range of protection options, from the more familiar Norton and Windows Defender, to programs that make your computer like Fort Knox against viruses; tools like Webroot and Virpre.

All the Options, How do you Choose?

Figuring out which option would work best for you depends on what you use your computer for, what kind of storage and back-up options you use, as well as some personal preference. If your computer is used to store critical information on clients, for instance, choosing one of the more robust anti-virus systems is likely the best option.

If you use your computer primarily for email, keep secure back-ups of any documents you have, and don’t need tons of options for how your computer is checked, there are more affordable options that will provide you protection, without a significant investment.

If you simply aren’t sure how much protection you need, we’re here to consult with you. Our staff is well versed in getting to know your system, how it works, where your vulnerabilities are, and which program would best serve to protect your important data from those sneaky viruses.

Double Agent ‘Anti’-Virus

What we will caution against, however, is attempting to go it alone in your battle against viruses. While we’re certainly well aware of viruses, that’s a two-way street. Those evil doers that make viruses have spent countless hours preying on people looking for protection from them, going so far as to release ‘free’ anti-virus systems that are, themselves, riddled with viruses. While that isn’t the case for all ‘free’ options, those that aren’t full of viruses often provide sub-par protection, use outdated information on viruses, and often ask for money to remove viruses when they do find them.

We’re Here to Help

By teaming up with a quality team of software professionals like SystemsNet, you can be sure that you’re getting a tested and reliable anti-virus program that will help keep you and your data safe, with professionals on hand to help you understand how to make sure it’s working for you and keeping your computers online and working as intended.

To find out how we can help you protect your computers from ninja virus programs, contact us. We’re here to help.

“Good Morning IT, I think I lost my phone” Avoid the worry when situations like this arise

Where did I have my phone last?

Where did I have my phone last?

It’s a Monday morning and this is your first phone call: “Good Morning, I think I lost my phone over the weekend. It has all my corporate email including patient information, on the device. I’ve looked everywhere for it.” What’s the first thing IT will do? Wipe the device in order to protect corporate data to avoid a data security breach.

Now it is Tuesday morning and that same employee calls, “Good Morning, I found my phone under the couch. Can you restore it? I have a video of my daughter’s first steps on there.” Too late—there is no way to get that data back. Now you have an unhappy employee who will think twice about ever calling IT when a device is lost (or misplaced). Let’s not forget the effect this will have on other employees hearing about this event.

So what’s the solution? You need a BYOD solution that leaves data off the device and allows employees to maintain control of their personal data. That is exactly what ZixOne does.

ZixOne is a mobile email app that allows employees access to their corporate email. Data is never downloaded to the device so IT departments never have to worry about managing multiple copies of the data. With just one click, access to their email can be stopped. So when an employee loses (or thinks they’ve lost) their device, or even leaves the company for another job, you can simply cut off access to corporate email.

Here’s the other great part—because there is no corporate data ever on the device, the phone never needs to be wiped. If the employee finds their phone after they believe it to be lost, all of that information will still be there.

You also eliminate any corporate legal liability associated with having insight into employees’ personal information. If you can prove you can’t see their personal data, how can they hold you liable?

ZixOne is a solution that meets everyone’s needs and it is built by the industry leader in email encryption, Zix, and they know email security.

With so many businesses implementing BYOD, there needs to be tools in the IT help desk to protect a companies data.  For more information about ZixOne, please contact us today.