What You Need To Do About The WannaCry Ransomware Attack

What You Need To Do About The WannaCry Ransomware Attack

Multiple news reports have focused on how this attack was launched and had used NSA codes leaked by a group of hackers. Hackers known as the Shadow Brokers are people who want to compromise files, documents, and videos.

Wanna Decrypter 2.0

It was a difficult Friday for many organizations and they started their assault against hospitals before spilling across the globe. This attack appears to have exploited a Windows vulnerability that Windows computers use to share files and printers across local networks.

Microsoft knows some of their customers are running versions of Windows that no longer receive mainstream support. Has now taken a highly unusual step of making a security update for older platforms and is available to everyone.

The attack shows this message:
What Can You Do?
  1. Patch your systems, even if you’re using an unsupported version of XP, Windows 8 or Windows Server 2003.
  2. Back up regularly and keep a recent backup copy off-site and encrypted.

What You Need To Do About The WannaCry Ransomware Attack

Blackbox Connections has detected WannaCry Ransomware Attack as a Troj/Ransom-EMG, Mal/Wanna-A, Troj/Wanna-C, and Troj/Wanna-D.

Don’t wait, Act Now!

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

How Secure Are You Keeping Your Social Media Account

How Secure Are You Keeping Your Social Media Account

How secure are you keeping your social media account and are you giving away fraudsters access to your Facebook?

Would they be able to get enough information from just your Facebook to steal your identity?

That is a few very important questions you should really consider while surfing your social network.

All It Takes

A recent study shows 30 percent of adults include their full name, address and date of birth on their profiles.

Furthermore that’s two of the three key pieces of information a fraudster needs to steal your identity.

Now they have access to your bank accounts, take out loans or take out mobile phones in your name.

Ultimately once a fraudster gets your identity they are able to attack your business.

Is Social Media Bad For Children Only

There is a huge risk for children when it comes to social media but are adults aware of the risks.

They could be signing rights away or giving out details through images and posts that fraudsters can use.

Questions You Should Ask Yourself

Have you put your birthday on your social media profile?

Did you click the box allowing Facebook to quote your relationships?

Could that make your mother’s maiden name easy to find?

How many institutions use that name as a security question if you need to reset a password?

Security Precautions

Check your settings regularly to see which apps you have granted access and delete any that you no longer need.

It’s OK to lie about birthday and location but just remember what you put or keep a note.

Many free social networks don’t require personal credentials so you have no clue who your talking with.

How Secure Are You Keeping Your Social Media Account

When keeping your information private it should be at the utmost priority.

This kind of attack leads to Ransomware once the fraudster obtains personal information.

Check out this new Ransomware intercept X tool by Sophos because it’s an excellent tool Sophos Ransomware Tool

Don’t wait, Act Now! Why not Ask?

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

Have You Closed All The Back Doors To Your Enterprise

Have You Closed All The Back Doors To Your Enterprise

Have you closed all the back doors to your enterprise due to high risks of cyber attacks nowadays?

New data is showing that companies are still struggling to close all entries because of the lack of knowledge.

Back Doors

Backdoors make up the most of cloud malware detection while standing at 37 percent detected.

Since last quarter it dropped being at 43 percent yet still a huge threat to companies.

Other Viruses

Behind back doors are adware at 14.3 percent, Microsoft Office macros at 6.0 percent.

Javascript making up 5.8 percent, Ransomware at 4.2 percent, also mobile at 1.5 percent.

PDF exploits one 1 percent, percentages of malware-infected files is 9.3 percent which is down from 26.5 percent last quarter.

False Sense Of Security

With the focus of cloud based services at a high rise right now its important that IT implement controls.

Either both visibility into or control over the use of all cloud services especially relevant when using external cloud providers.

Web Mail

Web mail data loss prevention is even better then cloud based storage.

Hence it sits at 39.94 percent of violations from web mail compared to 38.96 percent from cloud storage,

 

Cloud Services

Cloud use is still rising with enterprises and is marked as one of most used by retail, restaurants, and hospitality industry.

Microsoft Office 365 usage continues to rise as it becomes a platform.

Most noteworthy partners integrate using their own external services and apps.

Microsoft now makes up 40 percent of the list of top 20 cloud services.

Have You Closed All The Back Doors To Your Enterprise

In conclusion making sure all doors are closed on your computer systems security can be difficult so consult your IT regularly.

Check out this new Ransomware intercept X tool by Sophos because it’s an excellent tool Sophos Ransomware Tool

Don’t wait, Act Now! Why not Ask?

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

Make Changing Your Company’s Social Media Password A Habit

Make Changing Your Company’s Social Media Password A Habit

Make changing your company’s social media password a habit because bad password habits can put company accounts at risk.

Internet Of Things

Study shows much as 53 percent of social network users don’t change their company account passwords within the year.

Furthermore study shows that 20 percent of social network users have not ever changed their company account passwords.

Why Change Your Password

You and i know that social networks hold our private information also handing out our information without telling us.

Facebook, Twitter and LinkedIn accounts can be the normal venue for companies to post and share information.

Security Hazard

Without changing your company password you’re allowing hackers other facets into your company most noteworthy emails and computer logins.

Security Professionals

30 percent of security professionals still admit that they use birthdays, addresses, and children names for company passwords.

This is a huge vulnerability because all of these types of security measures can be public knowledge.

Day To Day Security

It’s pretty bad that security professionals that work day in and day out, still are using poor security measures.

45 percent of respondents say they believe privileged accounts accounted for at least half of the cyber attacks.

In addition many believe security is not going to get better because of poor protocol and lack of cyber security.

Make Changing Your Company’s Social Media Password A Habit

Keeping your enterprise safe from Ransomware, Phishing Emails, and Hackers should be more then a habit.

Sometimes the know how or where to look can be difficult.

Most of all don’t wait for your computer systems to tell you when to change your password.

Check out this new Ransomware intercept by Sophos and is an excellent tool Sophos Ransomware Tool

Don’t wait, Act Now! Consult a Professional 

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

New One Day Ransomware Strain Pops Up Over The Weekend

New One Day Ransomware Strain Pops Up Over The Weekend

New one day Ransomware strain pops up over the weekend and it was believed that towards the end of 2016 Ransomware declined.

IoT

Keeping up with the Internet Of Things can be difficult these days also new strains of Ransomware popping up every week.

Hence this weeks Ransomware was dubbed PyCL because it’s programmed in Python also researchers saw it running through the EITest malware.

Were You Infected?

Seems like this Ransomware went out for only one day therefore it actually did not encrypt any files this time.

Therefore this could mean that this Ransomware was a test or seems like something else.

Issues With Businesses Today

improper backup of systems seems to plague the work place therefore could it be because of budget?

Surveys Don’t Lie

Survey shows that 75 per cent of Canadian respondents paid the ransom to unlock their computer systems consequently.

Did They Get Their Files Back?

All respondents did say that even after paying the ransom consequently they did not get all their files back or unlocked.

It’s especially relevant that Ransomware is out to get your companies files for money not cooperate and give it back.

New One Day Ransomware Strain Pops Up Over The Weekend

Family strains of Ransomware is popping up therefore it would be most noteworthy to:

  • Make sure your computer systems are up to date
  • Maintenance to servers and back ups
  • Have a protocol in place for email exchanging

Check out this new Ransomware intercept by Sophos and is an excellent tool Sophos Ransomware Tool

Don’t wait, Act Now! Consult a Professional 

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

Beginners Guide On How To Use Microsoft Word In The Workplace

Beginners Guide On How To Use Microsoft Word In The Workplace

Beginners guide on how to use Microsoft word in the workplace so you can get on with your work day since Microsoft word can be complicated at times

What It Can Do For You

This guide is a step by step, photo by photo on what you may not know and what you do know. Therefore making your life easier and getting on with your documents.

Easy as 1 2 3

What’s nice about this guide is it starts from the beginning so you can learn right away on how to start a document and end it.

Sometimes just trying to print a document can be a challenge. Fortunately this step by step goes over it with you.

Number or Bullet list

Clients looking to number or bullet a list for employees or co-workers can use this step by step.

  1. Now open or start a new Microsoft Word document if you do not already have one open.
  2. So that you can create a numbered list, click on the numbering icon at the top of the document.
  3. You will see the first number will now be inserted into your text.
  4. Try typing the first item on your list.
  5. Once you press the Enter or Return key to go to the next line, the next number will be inserted and so on.
  6. When you want to stop the numbers being inserted and go back to standard text, click on the numbering icon again at the top of the document.
  7. Now you want to create a bullet list. Click on the bullets icon at the top of the screen in the menu ribbon.
  8. You will see a bullet point will be inserted into your text.
  9. While typing your list. Every time you press the Enter key to go to the next line, a new bullet will be inserted.
  10. In conclusion to stop bullets being inserted, click on the bullets icon again.
Beginners Guide On How To Use Microsoft Word In The Workplace

As you may find out this is not a full extended deep dive into Microsoft word but it is a start. Starting from the beginning is the best result when it comes to figuring out something on Microsoft word.

Suggestion would be to click the Read More because it shows you a picture by picture, step by step on how to do things with in Microsoft word.

Stop Thinking About It. Contact BlackBox Connections Today!

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine