Security Alert Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/security-alert/ Your Office Technology Partner Thu, 24 Sep 2020 14:22:26 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png Security Alert Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/security-alert/ 32 32 Is WannaCry Making You Wanna Cry? https://lesolson.redpeppersoftware.net/blog/is-wannacry-making-you-wanna-cry/ Sat, 25 Mar 2017 21:44:30 +0000 https://lesolson.com/?p=10451 Picture this. You are working on an important proposal at your company workstation when all of a sudden, your screen goes black. You receive a small, striking message on the top of your monitor: “Your files are being held for ransom.” What do you do? How can you fix it? Will your files ever be recovered? This is a small example of what can happen when you are not protected from ransomware.

The post Is WannaCry Making You Wanna Cry? appeared first on Les Olson IT.

]]>
[cz_image id=”cz_87908″ image=”11506″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_27251″ cz_title=””]Picture this: you are working on an important proposal at your company workstation when all of a sudden, your screen goes black. You receive a small, striking message on the top of your monitor,

 

“Your files are being held for ransom.”

 

What do you do? How can you fix it? Will your files ever be recovered? This is a small example of what can happen when you are not protected from ransomware.

 

Many organizations have recently been affected by an outbreak of a new ransomware variant, Wanna, which is known by a variety of aliases such as WannaC, WannaCryptor and, best of all, WannaCry. As a Sophos reseller, we want to provide you with the information that you need to protect your home and your business from these virulent attacks.

 

What is ransomware, and how do I protect my network from it?

Ransomware is a type of malicious software that holds true to its name. The ransomware will sporadically encrypt important files, documents and data and hold it hostage until a ransom is paid electronically. Programs such as InterceptX by Sophos serve a similar role as Liam Neeson from the Taken movies–they will find the ransomware, and they will kill the ransomware. Sophos InterceptX, Sophos Exploit Prevention (EXP), and Sophos Server Protection Advanced customers were protected proactively against Wanna ransomware from the first instance or outbreak that occured across many businesses at the beginning of May (see Wanna DecryptOr Outbreak).

 

On Friday, May 12th and Saturday, May 13th, Sophos was able to update their protection rules, and their endpoint software–Sophos Endpoint–now blocks every variant of Wanna from executing. This protection is crucial in protecting your business or organization from malicious software that could entirely halt business productivity.

 

How do I protect myself from Wanna and other ransomware?

This video demonstrates how Sophos products can help protect your network against Wanna ransomware.[/cz_title][cz_gap height=”25px”]

[cz_title id=”cz_102178″ cz_title=””]We have compiled a list of three simplified, important steps that ANYONE can take to ensure that you are protected from all variants of Wanna.

 

1. Patch up your network.

Wanna ransomware exploits a Windows vulnerability in small or midsize businesses for which Microsoft released a patch in March. It is highly likely that new attacks will appear based on the leaked exploit and is therefore critical to patch this vulnerability at the first opportunity. In order to patch the vulnerabilities, it is imperative that you update all Windows environments as described in Microsoft Security Bulletin MS17-010.

2. Update your endpoint software.

Endpoint software is essentially software that adds extra protection to the entirety of your network. That can include other phones, laptops and desktops that are on the network and vulnerable to attacks. Once the endpoint software is updated and running according to the Microsoft Security Bulletin featured above, your network should be protected from ransomware.

 

3. Ensure you are running advanced ransomware protection such as InterceptX by Sophos.

With this advanced protection, InterceptX serves as a safeguard from any future attacks by intercepting spontaneous file encryption and then reversing the encryption before it causes any permanent damage to your files. Home users should consider signing up for the Sophos Home Premium, which adds protection from ransomware in your home and on your personal devices.

 

If you still have questions about how to protect yourself from ransomware, click on the following button! Sophos wrote a great, all-inclusive article on protecting from ransomware that is user-friendly and easy to understand. We hope that you will be able to use this information to protect and safeguard your company and your home.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_77978″ sk_overall=”background-repeat:no-repeat;background-position:right bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/09/artArtboard-1types-of-cyber-attacks.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:%2Finfo%2Ftypes-of-cyber-attacks-and-how-to-prevent-them%2F|||”][cz_title id=”cz_68272″ link=”url:%2Finfo%2Ftypes-of-cyber-attacks-and-how-to-prevent-them%2F|||” sk_overall=”background-color:rgba(255,255,255,0.84);left:-16px;” cz_title=””]

TYPES OF CYBER

ATTACKS AND HOW

TO PREVENT THEM

[/cz_title][cz_gap height=”30px” id=”cz_62034″][cz_social_icons fx=”cz_social_fx_10″ id=”cz_98811″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Finfo%2Ftypes-of-cyber-attacks-and-how-to-prevent-them%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;” cz_social_icons=””][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_13803″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/10/artArtboard-1deeplearning.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||”][cz_title title_pos=”cz_title_pos_right” id=”cz_24640″ link=”url:%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F|||” sk_overall=”background-color:rgba(255,255,255,0.83);” cz_title=””]

DEEP LEARNING

ENHANCES

ENDPOINT SECURITY

[/cz_title][cz_gap height=”30px” id=”cz_62034″][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_60704″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22%2Finfo%2Fhow-intercept-x-uses-deep-learning%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post Is WannaCry Making You Wanna Cry? appeared first on Les Olson IT.

]]>
Beware of Flash Drive Hacker Scams https://lesolson.redpeppersoftware.net/blog/beware-of-flash-drive-hacker-scams/ Fri, 02 Jan 2015 15:14:55 +0000 https://lesolson.com/?p=10672 Flash Drives (or USB Drives) may seem like an innocuous item to find laying around in an office environment. You may find one and decide to use it, or simply plug it into your computer to see if you can identify an owner. What you might not know is that this can be bait used by hackers to gain access to your computer and network. Don’t fall victim to the flash drive hacker scam.

The post Beware of Flash Drive Hacker Scams appeared first on Les Olson IT.

]]>
[cz_image id=”cz_29055″ image=”12051″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_14731″ cz_title=””]Flash Drives (or USB Drives) may seem like an innocuous item to find laying around in an office environment. You may find one and decide to use it, or simply plug it into your computer to see if you can identify an owner. What you might not know is that this can be bait used by hackers to gain access to your computer and network. Don’t fall victim to the flash drive hacker scam.

 

Hackers commonly use flash drives to infiltrate networks and steal sensitive information. This is especially risky because code can be executed just by inserting a “hacked” device into your computer. Here’s how you can protect yourself and your business:

 

IF YOU SEE A FLASH DRIVE THAT ISN’T YOURS, DON’T INSERT IT INTO YOUR COMPUTER

It may be tempting to claim a found flash drive as your own or curiosity might get the best of you. However, it’s important to remember that you should never, under any circumstances, insert a flash drive into your computer without know exactly where it came from. It could be fine but it could also be a costly and unnecessary security risk to your business. Definitely not worth the free USB stick. If you find a flash drive and want to return it to its owner, try sending an email out to your co-workers asking if someone has lots it instead of trying to find clues about the owner in the files on the drive.

 

ONLY PURCHASE NAME-BRAND FLASH DRIVES FROM REPUTABLE RETAILERS

Another, equally harmful flash drive hacker scam is counterfeit “high-capacity” flash drives being sold online, particularly on sites like Ebay. These USB drives are sold at prices that are too good to be true, promising large amounts of storage. Many times they are doctored and will cause security issues for your business if used. It is very important to only purchase name-brand flash drives from reputable retailers. If you see a deal online for some off-brand USB drives that look too good to be true, it probably is. Even if the packaging and product look legitimate, it could be a scam.

 

IMPLEMENT A COMPANY POLICY REGARDING FLASH DRIVES

The most effective thing you can do to protect your business is making sure your employees are educated about flash drive hacker scams and what’s expected of them should they find a USB drive laying around. A good policy will outline what to do in a situation where a flash drive is found. If your company doesn’t have a policy, always ask someone if your IT department for guidelines.

 

Using these tips can save your company from the potential harms of flash drive hacker scams. Les Olson Company offers Managed IT Services, including data and network security services. Please contact us for a free security consultation.[/cz_title]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_19454″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/11/Artboard-1NetworkAnalysis.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_27621″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

GET A FREE,

COMPREHENSIVE

NETWORK ANALYSIS

[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_39112″ sk_overall=”background-repeat:no-repeat;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2019/12/Artboard-1cybersecuritytraining.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”|||”][cz_gap height=”35px”][cz_title title_pos=”cz_title_pos_left” id=”cz_84253″ link=”url:%2Fwp-content%2Fuploads%2F2019%2F04%2FGood-Copier-Vendor-Checklist.pdf|||” sk_overall=”background-color:rgba(255,255,255,0.84);”]

REQUEST YOUR

FREE EMPLOYEE

CYBERSECURITY TRAINING

[/cz_title][cz_gap][cz_button title=”Learn About Our” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_71392″ subtitle=”SECURITY TRAINING” link=”url:%2Fservices%2Fcybersecurity%2Femployee-cybersecurity-training%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”][cz_gap height=”35px”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

The post Beware of Flash Drive Hacker Scams appeared first on Les Olson IT.

]]>