What You Need To Do About The WannaCry Ransomware Attack

What You Need To Do About The WannaCry Ransomware Attack

Multiple news reports have focused on how this attack was launched and had used NSA codes leaked by a group of hackers. Hackers known as the Shadow Brokers are people who want to compromise files, documents, and videos.

Wanna Decrypter 2.0

It was a difficult Friday for many organizations and they started their assault against hospitals before spilling across the globe. This attack appears to have exploited a Windows vulnerability that Windows computers use to share files and printers across local networks.

Microsoft knows some of their customers are running versions of Windows that no longer receive mainstream support. Has now taken a highly unusual step of making a security update for older platforms and is available to everyone.

The attack shows this message:
What Can You Do?
  1. Patch your systems, even if you’re using an unsupported version of XP, Windows 8 or Windows Server 2003.
  2. Back up regularly and keep a recent backup copy off-site and encrypted.

What You Need To Do About The WannaCry Ransomware Attack

Blackbox Connections has detected WannaCry Ransomware Attack as a Troj/Ransom-EMG, Mal/Wanna-A, Troj/Wanna-C, and Troj/Wanna-D.

Don’t wait, Act Now!

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

How Secure Are You Keeping Your Social Media Account

How Secure Are You Keeping Your Social Media Account

How secure are you keeping your social media account and are you giving away fraudsters access to your Facebook?

Would they be able to get enough information from just your Facebook to steal your identity?

That is a few very important questions you should really consider while surfing your social network.

All It Takes

A recent study shows 30 percent of adults include their full name, address and date of birth on their profiles.

Furthermore that’s two of the three key pieces of information a fraudster needs to steal your identity.

Now they have access to your bank accounts, take out loans or take out mobile phones in your name.

Ultimately once a fraudster gets your identity they are able to attack your business.

Is Social Media Bad For Children Only

There is a huge risk for children when it comes to social media but are adults aware of the risks.

They could be signing rights away or giving out details through images and posts that fraudsters can use.

Questions You Should Ask Yourself

Have you put your birthday on your social media profile?

Did you click the box allowing Facebook to quote your relationships?

Could that make your mother’s maiden name easy to find?

How many institutions use that name as a security question if you need to reset a password?

Security Precautions

Check your settings regularly to see which apps you have granted access and delete any that you no longer need.

It’s OK to lie about birthday and location but just remember what you put or keep a note.

Many free social networks don’t require personal credentials so you have no clue who your talking with.

How Secure Are You Keeping Your Social Media Account

When keeping your information private it should be at the utmost priority.

This kind of attack leads to Ransomware once the fraudster obtains personal information.

Check out this new Ransomware intercept X tool by Sophos because it’s an excellent tool Sophos Ransomware Tool

Don’t wait, Act Now! Why not Ask?

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

Are You Finding It Difficult To Use OneNote By Microsoft Office 365

Are You Finding It Difficult To Use OneNote By Microsoft Office 365

Are you finding it difficult to use OneNote by Microsoft Office 365? No worries we got you covered.

Maybe your learning about Microsoft Office 365’s tools and would like to learn more?

Getting Started

Among the few things in OneNote is creating a workbook in the cloud, adding sections, pages and taking notes.

Sharing meeting notes is so essential and a powerful tool so that everyone can be on the same page.

Capture, organize and share are just so valuable and OneNote provides all of that.

In The Cloud

Since it’s in the cloud, your hard drive is free of space and your notes are always up to date.

A wonderful feature we like is the fact that you can access OneNote anywhere and on your mobile device securely.

Versions It Supports

For now it is supporting Windows 7, Windows 8 or 8.1 and Windows 10

How It Works

OneNote is made up of sections, pages and features like color coding.

The pages never run out of space, and you can add as many sections as you want.

Take Notes Now

OneNote provides many ways to take notes, typing, writing, drawing, sketching, speaking, copying.

An awesome feature we like is being able to copy and paste a URL right to the pages or sections.

Are You Finding It Difficult To Use OneNote By Microsoft Office 365

If your having difficulty with OneNote don’t wait, click the Read More button below.

It is a tutorial from Microsoft and a step by step with pictures.

If you are on the edge about using OneNote? Consult a professional and see it it works for your company.

Check out this new Ransomware intercept X tool by Sophos because it’s an excellent tool Sophos Ransomware Tool

Don’t wait, Act Now! Why not Ask?

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

Have You Closed All The Back Doors To Your Enterprise

Have You Closed All The Back Doors To Your Enterprise

Have you closed all the back doors to your enterprise due to high risks of cyber attacks nowadays?

New data is showing that companies are still struggling to close all entries because of the lack of knowledge.

Back Doors

Backdoors make up the most of cloud malware detection while standing at 37 percent detected.

Since last quarter it dropped being at 43 percent yet still a huge threat to companies.

Other Viruses

Behind back doors are adware at 14.3 percent, Microsoft Office macros at 6.0 percent.

Javascript making up 5.8 percent, Ransomware at 4.2 percent, also mobile at 1.5 percent.

PDF exploits one 1 percent, percentages of malware-infected files is 9.3 percent which is down from 26.5 percent last quarter.

False Sense Of Security

With the focus of cloud based services at a high rise right now its important that IT implement controls.

Either both visibility into or control over the use of all cloud services especially relevant when using external cloud providers.

Web Mail

Web mail data loss prevention is even better then cloud based storage.

Hence it sits at 39.94 percent of violations from web mail compared to 38.96 percent from cloud storage,

 

Cloud Services

Cloud use is still rising with enterprises and is marked as one of most used by retail, restaurants, and hospitality industry.

Microsoft Office 365 usage continues to rise as it becomes a platform.

Most noteworthy partners integrate using their own external services and apps.

Microsoft now makes up 40 percent of the list of top 20 cloud services.

Have You Closed All The Back Doors To Your Enterprise

In conclusion making sure all doors are closed on your computer systems security can be difficult so consult your IT regularly.

Check out this new Ransomware intercept X tool by Sophos because it’s an excellent tool Sophos Ransomware Tool

Don’t wait, Act Now! Why not Ask?

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

Getting All You Need In One Customer Relationship Management Tool

Getting All You Need In One Customer Relationship Management Tool

Getting all you need in one customer relationship management tool (CRM) first of all can be difficult.

Why? You may ask is because not all CRMs can tailor to your needs and we know we’ve tested a few.

Customer Relationship Management

Is a term that refers to practices, strategies and technologies that companies use to manage and analyze customer interactions.

Also Using data throughout the customer lifecycle, with the goal of improving business relationships with customers.

Microsoft Dynamics Marketing

In Microsoft dynamics marketing they are continually updating the CRM to make it work better for you.

Fully customizable makes it a wonderful tool to use and also quick even if its a cloud based CRM.

Feature Walkthroughs

Taking the time to learn a new CRM can be annoying therefore going through the walkthoughs feature can be helpful.

Getting up to speed on how the system works is super helpful and most noteworthy doing common tasks.

eBooks And Videos

If it couldn’t get any easier there are eBooks and Videos to look over if your a more visual learner.

Videos like, New Features, Sales, Marketing, Services, and plenty more to waste your time on.

Other Great Features

Keeping everything all in one is a great feature that Microsoft Office 365 has done.

Having your Email, excel spread sheets, word documents and your CRM all in one can make life easier.

Getting All You Need In One Customer Relationship Management Tool

For us we’ve enjoyed having this tool at our finger tips for the past couple months.

Most of all, time management is essential. That is why we use this tool day to day.

Check out this new Ransomware intercept X tool by Sophos because it’s an excellent tool Sophos Ransomware Tool

Don’t wait, Act Now! Consult a Professional 

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine