Tag Archive for: malware

An I.T. Manager’s New Year’s Resolution

The beginning of the year is the perfect time to review your systems maintenance program, tweak your plans and processes and optimize your overall I.T. strategy.

Review, Evaluate and Optimize.
More than likely, your business could live or die based on your IT strategy. We have all become dependent on our technology both in our personal and professional lives, so be sure to give it the TLC it needs. Review your key procedures and plans such as network failure testing, disaster recovery, business continuity, virus protection and data backup (for an integrated, online backup, storage and sharing application, click here). For those of you with an on-site backup solution, now is the perfect time to run those backups with a test recovery. With erratic weather on the rise and winter around the corner, taking the time to be sure you have a tight, foolproof strategy in place to keep both your systems and your information protected from loss or damage.

Be Smart About Your Data.
Inadequate protection or spotty management of critical data can have a profound effect on sustainability. Regularly scheduled testing of your backup strategy and implementing a daily backup routine will help prevent the disasters that prove fatal for many companies.

  • 31% of PC users have lost all of their files due to events beyond their control.
  • 34% of companies fail to test their onsite backup solution, and of those that do, 77% have found back-up failures.
  • 60% of companies that lose their data will shut down within 6 months of the disaster.
  • Every week 140,000 hard drives crash in the United States.
  • Simple drive recovery can cost upwards of $7,500 and success is not guaranteed.

We recommend assessing your existing data protection strategy and learn what data repository and storage medium options are available. It’s important to understand traditional backup methods as well as the benefits of developing an enhanced protection solution that meets the needs of your particular business.

Think of it as a Flu Shot for your Systems.
There are lots of people out there determined to infect your computers with viruses. Optimize your security with new or updated anti-virus, Spyware and Malware software. Be wary of free anti-virus software that sounds too good to be true because it often is.  You get what you pay for, and software that protects your computer needs regular and consistent updating to stay useful because viruses are constantly being generated. This is especially important if you use a networked computer system. Do your homework,  invest in effective software and keep it updated. (For an easy-to-use, simple, and effective anti-malware application, try Malwarebytes)
Give your Computer a Tune Up.
Straight out of the box, computers have often been loaded with unnecessary programs at the factory.  So, from day 1, your computer is accumulating software programs, update reminders, “bonus” software, and random files that you don’t need and over time it will become increasingly sluggish. By taking a few important steps, you can get it running efficiently again, for a lot longer. The first thing you should do is disable the programs that start up when your computer boots.  While there are many places this can occur, the easiest one to check is the Startup menu in your Programs menu. Additionally, simple tasks such as clean out your Windows Registry, remove unneeded files and programs, empty your recycling bin or trash, and perform a disc defragmentation can make a huge difference.  Even if your computer has been performing slowly for some time, beginning this regimen is sure to produce results.

Email – a Blessing or a Burden?

Most of us are guilty of being slaves to our inbox, whether we like to admit it or not. We keep every thing that has ever been sent to us out of some sort of unfounded fear of not having it should we ever need it. And the “reply all” function makes it exponentially worse. Well, each of those emails, particularly the ones with large attachments, take up space on your computer  – and space in your head when you are actually trying to find something. Email is the third largest culprit of workplace interruptions and email mismanagement costs you money.   Take charge and clean up that clutter by creating folders and subfolders to organize your communications. Save the attachments that you will need later onto your hard drive in a logical place, then delete the email if its unnecessary. Set your computer to delete your Trash after 30 days. Anything you can think of to reduce the number of emails in your actual inbox will save you time and money down the road.

GCInfotech can get you started on the path to a leaner, more efficient IT strategy. If you don’t have an IT Manager to make a New Year’s Resolution for you, then give us a call.

Malware – it’s a loaded word that strikes fear into both luddites and hardened techies. From spyware and unwanted adware to software that’s solely designed to make your day a little less pleasant, there’s a wide range of malware floating around the web, waiting to be downloaded by an unwitting victim.

Thankfully, as protective antivirus software has become more commonplace and ever-easier to use, it’s trickier for malware to get its hands on your computer’s innards.

Don’t become complacent, though. Keeping a keen eye out for tell-tale signs of infection and being proactive about protection is the key to ensuring your devices and data stay perfectly safe.

Here we’ll be running down some of the key symptoms of malware infection to be on the lookout for. And, if you think your digital hazmat suit has been compromised and something nasty has wormed its way in, check out our guide on the best malware removal tools to remedy your silicon affliction.

1. Sluggish performance and frequent crashes

Just like any other software, malware takes up space on your hard drive and uses RAM to function.

However, unlike most programs you’ll have installed, the developers of said malware aren’t interested in streamlining your workflow or creating lightweight applications. All they’re interested in is their end goal – which, in some cases, could be as irritatingly simple as slowing your machine to a crawl.

If your device is taking an age to open new applications despite the fact you haven’t overloaded it, it might be time to crack out a specialist tool to see if something sinister is afoot.

2. New icons, tasks, or toolbars

Noticed something on your PC that you don’t remember installing yourself? It could very well be the doing of malware.

Although less common than in days gone by (we’re looking at you, Yahoo), toolbars and other ‘helpful’ additions that crop up in your browser aren’t always the altruistic applications they purport to be. Instead, they’re likely to be recording your activity and selling your data, or injecting bloated ads into the webpages you visit.

The same goes for tasks running in the background – although these can be little more difficult to decipher. Press ctrl-alt-del and enter Task Manager, and it’s likely you’ll be unfamiliar with plenty of the active processes. However, it’s worth googling any outliers just in case – or, of course, using dedicated software to scan your entire device.

3. Adverts everywhere

Serving infected users extra ads is a quick and easy way for malware developers to generate revenue.

As such, this is as clear-cut a case as we can think of. If you’re noticing trusted websites you frequently visit being overloaded with ads – often strange, foreign, untargeted ads – it might be time to break out your malware detection tool and run a scan.

If you’re seeing ads on your desktop – it can happen – it’s an even surer sign that your device isn’t as squeaky-clean as it used to be. Take action, and stop the ads in their tracks.

4. Your browser settings have changed

Once it’s inside, malware likes to make itself comfortable and adjust its surroundings to suit its needs.

A common symptom of infection is noticing your homepage has changed – doing this is likely to benefit the creator, as the homepage’s traffic will increase ad revenue in real terms. Other settings that may change are cookie settings, your default search engine, and the addition of new extensions.

5. Disabled security software

If some cunning malware has made it past your defenses, it may take action against any security software already installed. Just like when altering your browser settings, malware may well change settings to make it easier for it to do its job.

This could include making firewall rules more lenient, or even totally deactivating all your security software like antivirus. It’s always worth checking in on your AV software to make sure it’s still functioning as you intend – and if not, make sure you take action to stop your settings being changed again.

6. Your hard drive is inexplicably filling up

Another symptom of a virulent malware infection is a hard drive full to bursting without you making any large downloads to explain it.

This is due to the fact that some malware – often adware – is concealed within the folders of seemingly harmless applications. This may be because you downloaded a free program from an unauthorized source or worse: downloaded a pirated version of an expensive app.

Beyond the copyright implications, this is yet another reason to stay savvy about where you’re sourcing your software from, and to always pay for your tools and entertainment.

7. Your internet usage is through the roof

Many forms of malware require a constant internet connection, and use it to download secondary infections.

Other forms of malware like botnets and spyware also need a constant connection to a ‘command and control server’. If you’ve been exposed to these most sinister of infections, your internet will consistently be in action thanks to the back-and-forth between your device and this server.

While excessive internet usage is unlikely to be an issue itself in the era of largely unlimited Wi-Fi plans, it’s a useful symptom to help diagnose any malware-based issues you may be suffering from.

Are you interested in learning more about cybersecurity? Call us today and discover how our wide array of tech services can safeguard your business.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

True story: At a company I once worked for, employees received an email about an unexpected bonus. In private Slack channels, we wondered whether it was a well-played phishing attempt. Turns out, the bonus was legit, but so was our inclination to question it. Phishing—when cybercriminals pose as legitimate institutions to get info or money from you—is the origin of up to 90 percent of breaches and hacking incidents, says Frank Cilluffo, director of Auburn University’s McCrary Institute for Cyber and Critical Infrastructure Security in Alabama.

These cyber bad guys have even taken it to the next level with “spear phishing,” a practice of sending emails that appear to be from someone you personally know. “This happened to me once and it was a humbling experience,” says Adam Doupé, director of the Center for Cybersecurity and Digital Forensics at Arizona State University in Tempe. Turns out, the email seemed to be coming from a colleague, and Doupé was boarding a plane when he got it so he wasn’t as careful as he would normally be. “I ended up replying with my cell phone number,” recalls Doupé. “When the phisher responded with a request to send gift cards, the alarm bells went off.”

Knowing that a cybersecurity expert got played, an average person has to be hypervigilant. But could you be missing out on legit offers and emails because you’re being too cautious? Your first line of defense: install a protection software (like Malwarebytes). This sort of protection that lives on your computer, coupled with our expert tips below, will stop phishers in their tracks.

3 Ways To Tell If It’s Phishing Or Not

Experts say there are a few things you can do if you’re unsure whether an email is a phishing attempt.

1. Check the email address carefully.

Hover your cursor over the full email—not just the sender’s name—to see if anything looks off. “For instance, instead of .com, the address may contain .ru,” says Cilluffo. (.Ru indicates that it’s from a Russian server.) Compare the address on a recent email to one that you’ve responded to previously.

2. Call or text the person you think may have sent the email.

Ever receive an email from a friend or colleague and it seems off? Maybe it’s much briefer than usual or perhaps they addressed you by your full name rather than a nickname. Trust your gut, and don’t respond or click on any links or attachments until you’ve verified the email. While it truly may just be a link to their kids’ fundraiser, it could be the work of a cyber criminal trying to get you to download malware—aka malicious software.

3. Verify through an independent news source.

Sometimes you may receive an email about an important recall notice or info about a class-action lawsuit. Search on a trustworthy news site whether the link contained in your email appears in any news articles, suggests Doupé.

Bottom line?

Cyber criminals are getting more and more creative at making their phishing attempts appear legitimate. Go with your gut, slow down to verify the validity of messages you receive and install a protection software (like Malwarebytes) to stop phishers before they start.

Are you interested in learning more about cybersecurity? Call us today and discover how our wide array of tech services can safeguard your business.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from yahoo.com SOURCE

Without technology, businesses cannot compete and succeed. But with the advancement in technology comes the ever-constant threat of hackers and cybercriminals. That’s why small- and mid-sized businesses (SMBs) need to protect themselves with robust cybersecurity solutions managed by reputable managed IT services providers (MSPs).

The numbers

Through the years, the number of SMBs falling victim to cyberattacks has drastically increased. Ransomware attacks, misconfigured systems, credential stuffing, and social engineering are among the many cyberthreats that SMBs face. Also, according to Verizon’s 2021 Data Breach Investigations Report, one in every five data breach victims was an SMB. What’s more, only 47% of SMBs are able to detect breaches within days.

The financial consequences have also considerably increased. IBM’s Cost of a Data Breach Report 2021 shows that “data breach costs rose from USD 3.86 million to USD 4.24 million.”

The numbers don’t lie, so it’s only about time SMBs take cybersecurity seriously. You can safeguard your business from cyberattacks and provide a more secure customer experience by working with a trusted MSP.

Why managed services?

Partnering with MSPs is the most effective way to prevent attacks and defend against malicious threats. MSPs offer a full range of proactive IT support that focuses on advanced security, such as around-the-clock monitoring, data encryption and backup, real-time threat prevention and elimination, network and firewall protection, security awareness training, and more. Here are some of the services an MSP can offer:

    • Around-the-clock monitoring – A cyberattack can happen at any moment. By having someone watching your networks and systems 24/7, MSPs ensure that any potential threats are identified and dealt with quickly.
    • Data encryption and backup – Data encryption transforms readable data into an unreadable format. This can be done through the use of a key, which is only accessible to authorized users. This way, even if the data is compromised, it can’t be read without the key. Meanwhile, data backup is the process of creating and preserving copies of data so that it can be restored in the event of data loss.
    • Real-time threat prevention and elimination – By using technology that can detect and stop threats as they happen, this security solution can minimize the impact of an attack and keep your business data safe.
    • Network and firewall protection – Networks and firewalls create a barrier between the business network and the internet, securing confidential data, such as customer information, employee records, and trade secrets. Networks can be configured to allow certain types of traffic through while blocking others, so that only authorized users can access specific resources.
    • Security awareness training – Now, more than ever, SMBs need to be aware of cybersecurity threats and how to protect themselves. MSPs can facilitate security awareness training that can help employees spot red flags and know what to do (and not do) to keep company data safe.

Managed IT services are designed to identify and fix weak spots in your IT infrastructure, enabling you to optimize the digital backbone of your business processes. With managed IT, you’ll also have faster network performance, a solid business continuity and disaster recovery strategy, and minimal downtime. You’ll also get a dedicated team of IT professionals ready to assist you with any technology-related problems. This is much more effective and budget-friendly than having in-house personnel juggling all of your business IT needs.

Being proactive when it comes to cybersecurity is the only way to protect what you’ve worked hard to build. If you’d like to know more about how managed services can benefit your business, just give us a call — we’re sure to help.

Are you interested in learning more about cybersecurity? Call us today and discover how our wide array of tech services can safeguard your business.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from techadvisory.org SOURCE

Small businesses aren’t exempt from Russian cyberthreats, according to US officials. Here’s what to know.

In the wake of Russia’s invasion of Ukraine, cybersecurity concerns in the US are mounting for small businesses, home offices and larger enterprises, according to national security alerts issued by the FBI, DHS and CISA.

Even though government-sponsored attacks are gaining public attention, cyberattacks from independent actors or groups are always a concern for small to midsize businesses. Factors like budget and IT staff limitations can leave small businesses more vulnerable to cyberattacks. The Small Business Administration reported there were 32.5 million small businesses in the US as of 2021.

There’s no foolproof way to completely protect yourself from online attacks, but the first step is to understand what the threat is, where your business may be at risk and which proactive steps you can take. To that end, we’ve compiled a list of cybersecurity tips for small business owners.

Know the most common cyberattacks

Cyberattacks can take many forms and are constantly evolving, according to the US Small Business Administration, but the best defense is knowing the most common cyberattack forms like malware, viruses, ransomware and phishing.

Malware is an umbrella term for malicious software that aims to damage your computer, server, network or client.

Viruses and ransomware are also considered as types of malware. Viruses mean to infect your computer as well as other devices, leaving your system vulnerable. Ransomware, which has been on the rise in the US, works like a virus, but is usually delivered through a phishing email and essentially holds your system hostage until a sum is paid.

Phishing is a type of scam that tricks people into clicking links that appear legitimate, but are actually malicious. Clicking the link infects your device with malware. Once your system is infected, cybercriminals can attempt to steal sensitive information. Phishing falls in a wider category of social engineering, a tactic meant to deceive individuals into disclosing sensitive information or clicking a malicious link.

Train employees to be security-conscious

Cybersecurity is a team effort. Make sure your employees create strong passwords and reset them on a regular schedule. Employees should be aware of red flags that indicate phishing emails and malicious files, as well as have an action plan in the event that an attack happens. It’s also important to keep devices, software and browsers up to date. The FCC suggests establishing clear guidelines for internet use, how to best handle customer data, as well as penalties for violating those policies.

Secure your Wi-Fi networks

Your business’ Wi-Fi should be secure, encrypted and hidden, according to the FCC. Your business’ router needs to be password protected, and it shouldn’t broadcast the network name.

If your small business is operated out of your home, consider whether it’s time to upgrade your router to handle modern security threats. If you’re new to Wi-Fi networking, CNET has a handy FAQ that covers the basics.

Back up your files

Cyberattacks often mean to compromise, delete or steal your data. Backup programs can help mitigate this risk. It’s even better if the backup software you’re using lets you set up a schedule or automate backups, according to cybersecurity firm Kaspersky. Keep a copy of your backups offline in case of a cyberattack.

Use antivirus software

Finding the right antivirus software is an important weapon in your small business’ arsenal against cybercrime. Antivirus software doesn’t have to break your bank either — Microsoft Defender is free for Windows, for example. Check out CNET’s guide for the best antivirus software for more information.

For more information, check out big tech’s efforts to support Ukraine shift the industry’s role and how you can help Ukraine refugees and those affected by Russia’s invasion.

Are you interested in learning more about cybersecurity? Call us today and discover how our wide array of tech services can safeguard your business.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from cnet.com SOURCE

Hackers have found a clever way to get around anti-malware software — they’re using fileless malware, a type of malicious software that’s not as visible as traditional malware. This means it can infect your entire infrastructure without you even knowing. Let’s take a closer look at how fileless malware works and what you can do to defend against it.

What is fileless malware?

Fileless malware is malicious software that doesn’t rely on executable files to infect your infrastructure. Rather, it hides in your computer’s random access memory and uses trusted, legitimate processes, such as Microsoft Office macros, PowerShell, and Windows Management Instrumentation.

Fileless malware isn’t as visible as traditional malware. It uses a variety of techniques to stay persistent and can adversely affect the integrity of a business’s processes and the infrastructures that run them. Because there are no files to trace, fileless malware escapes detection by most anti-malware programs, especially those that use the databases of known threats. Most automated sensors cannot recognize illicit scripts, and cybersecurity analysts who are trained to identify them usually have a hard time determining where to look.

What potential damage can fileless malware do?

If it is not detected and removed, fileless malware can do a lot of damage to business systems, such as:

  • Steal or destroy data
  • Modify files without authorization
  • Act as a backdoor for other types of malware
  • Cause system crashes and instability
  • Disrupt normal operations by taking up CPU time or memory

Examples of high-profile fileless malware attacks include the Democratic National Committee hacking in 2016 and the Equifax data breach in 2017.

How big of a threat is fileless malware?

Cybersecurity provider WatchGuard Technologies’s Internet Security Report for Q4 2020 found that fileless malware attacks during the year jumped by 888% from 2019. Worse still, their Q2 2021 report revealed that just halfway through 2021, the number of fileless malware detections originating from scripting engines like PowerShell was already at 80% of 2020’s total script-initiated attack volume.

How can you defend against fileless malware?

Your business should practice defense in depth in which you implement multiple safeguards to reduce exposure and mitigate damage. Such safeguards include keeping your systems updated, limiting user access rights and privileges, cultivating a security-aware workforce, and utilizing advanced security solutions that analyze behavioral trends. Lastly, you should also partner with a managed IT services provider that offers 24/7 network monitoring, security audit, and penetration testing. Call us today to get started.

Are you interested in learning more about cybersecurity? Call us today and discover how our wide array of tech services can safeguard your business.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from smallbusinesstechnology.com SOURCE

Maintaining your WordPress website is not as hard as it seems — just follow this simple maintenance checklist we’ve prepared for you. We’ve outlined six essential tasks that you should perform regularly to keep your WordPress site running smoothly.

Create complete backups of your website

One of the most important things you can do to protect your website is to back it up periodically. This will allow you to restore your site if something goes wrong, such as a hacker attack or server crash. There are several ways to create backups, including using plugins or manually copying your files and database. But while plugins like BackUpWordPress and hosting servers like SiteGround automate the backup process, performing manual backups may still be necessary to cover all your bases.

Verify your backups

Just because you have backups doesn’t mean they’re doing their job. You should test your backups regularly to make sure they are working properly. This can be done by restoring a backup to a test site or simply downloading the files and checking them to make sure they are complete. The last thing you need is for your backups to fail on the day you need them most.

Perform daily security scans

One of the best ways to stay ahead of potential security threats is to monitor your website closely for any signs of compromise. A good way to do this is to perform daily security scans, which will help you track any changes or suspicious activity. There are a number of different tools and services that can help you with this, and one of the most popular ones is Sucuri. Not only does this plugin carry out inspections, but it also sends an SMS to notify you of any suspicious activity and emails you a daily status report of your website’s security.

Scan for malware

Cyberthreats are growing in both number and sophistication. With every passing day, new strains of malware are developed and released onto business networks and systems. Unless you are a bonafide hacker yourself, detecting malware might be a little tricky. WordPress plugins like Wordfence keep your website safe using the latest firewall rules and flagging the latest malware signatures and malicious IP addresses.

Conduct page speed audits

Slow and steady may be qualities valued by some, but not when it comes to your website. Plugins like Google Pagespeed Insights test how fast your site loads. If it takes more than five seconds, you should consider implementing caching and other measures to speed up your site. Slow sites put off visitors, and that further lowers those sites’ search rankings.

Review your site’s structure and content

Just as you should periodically review your website’s security, you should also take a look at its overall structure and content. Are the pages well organized and easy to navigate? Is the content relevant and up to date? If not, you may want to consider making some changes.

Forbes, National Geographic, and The New York Times are all powered by WordPress, which means you are in good company. By sticking to the checklist, you too can harness the power of this online, open-source website creation tool. Or, instead of signing up for half a dozen services that need daily check-ins, why not have us take care of all of it for you? If you have further questions, don’t hesitate to send us an email or give us a call!

Ask yourself what your website is doing for you and whether it’s aligned with your business needs and objectives. The GCInfotech professional web design team is here to help.

Published with permission from TechAdvisory.org. SOURCE