The purpose of this article is to educate users on the dangers of Ransomware, or Cryptolocker.
Definition: Ransomeware is malicious software that is delivered usually via emails that look legitimate, and are designed to trick users in to opening attachments or opening links to files in order to encrypt files (making them unreadable) and demanding a fee to have the data de-crypted.
What is CryptoLocker?
CryptoLocker is a ransomware program that was released in the beginning of September 2013 that targets all versions of Windows computers. This ransomware will encrypt files using a strong encryption that is almost impossible to crack. When it has finished encrypting your files, it will display a CryptoLocker payment program that prompts you to send a ransompayment in order to decrypt the files.
If the payment is not made in time, access to all of the files will be lost. The only good way to recover from CryptoLocker is restoring from a backup (if you have one, and hopefully it’s recent).
How do you become infected with CryptoLocker?
This infection is typically spread through emails sent to company email addresses that pretend to from Fedex, UPS, DHS, or even invoices. These emails traditionally contain a zip file that when opened will infect the computer. These zip files contain executables that are disguised as PDF files , office files or any sort of document that can use macros. The infection can also spread and wreak havoc on your network if not stopped. According to Newsweek, in 2015 affected Americans paid about $325 million due to ransomware attacks; in 2016 cyber security analysts estimate it will be much higher.
If these attachments are opened, they will change files files on the network (workstations and servers) to an encrypted version that can only be unlocked with a special key. Without this key, your data is impossible to get to, and must be restored from a backup.
These unlock keys are available for purchase, typically for thousands of dollars. Without a backup, even the FBI says “pay the ransom”
i.t.NOW does its best to ensure data that resides on servers is protected, but we typically do not back up every single workstation we manage. This means if you were to open one of these attachments, the data on your C: drive would be unrecoverable.
Even with backups, downtime is costly. It can take hours to restore from backups, and during that time the entire company is typically at a standstill waiting to regain access to valuable data.
What about protection??
i.t.NOW provides several layers of protection to prevent these types of attacks on your network. Emails are filtered by a spam and virus firewall. Workstations are loaded with the latest OS patches and anti-virus software. However, these attacks are typically referred to as “Zero Hour” attacks. This means that the anti-virus and anti-spam databases of the world don’t yet know about this particular flavor of virus, and can’t flag them as such until they are identified, and virus definitions are created and applied. Additionally, attackers are getting more and more clever at the delivery methods, like embedding viruses into word documents and java scripts.
i.t.NOW is providing this information because some of these messages look so legit, they would trick even the most savvy of users. Have a look at the copies of actual emails below and let us know if you would open the attachment.
Generally, if you’re not expecting an email with an attachment, don’t open it! Especially if it says is from a scanner or e-fax. When in doubt, have someone check it out! We’re happy to help, we’d rather get 1000 calls asking if you should open an email than have to spend hours, or days cleaning up damage caused by ransomware. We’ve had several infections this year and with each one we sure up our defenses. However part of those defenses is you! We want to educate you so that you can be better prepared against this ever changing threat landscape.
Social Engineering attacks- Additionally, we’ve had a couple cases where an attacker will purchase a domain that is very close to your domain- for example, if your domain was acmepartners.com, an attacker may purchase acmepartnars.com and use it to send emails that seem to be from the CEO to the Controller asking for a wire transfer. If you see something like this- pick up the phone and verify! We had a client wire $60,000 to what they thought was their vendor, who at the last minute changed the bank routing number for the payment they were expecting. Closer inspection showed the from address was one letter off on the domain name.
The bottom line is to be cautions when opening email attachments, or requests for large sums of money to be transferred, even from an email that looks legit, it could be a spoof or a domain thats one letter off.
If you see anything suspicious, feel free to forward the email to [email protected], or you can open a ticket by right-clicking your i.t.NOW icon and selecting “Create Service Ticket”.
Thank you for helping us protect your networks!
Netflix’s journey to the Cloud started all the way back in 2008 when the company experienced a major database corruption – an event that hindered their ability to deliver DVDs out to their customers. That’s when the idea of a Cloud migration came about. Netflix needed a highly reliable and scalable platform like the Cloud to host their systems. Prior to 2015, they migrated the majority of their systems to the Cloud with the help of Amazon Web Services. In early January 2016, Netflix reported the completion of their Cloud migration and shut down the last remaining pieces of their data center used by their streaming service.
One reason it took so long to make the shift was because Netflix had to rebuild nearly all of its software before the start of their Cloud journey to minimize the risk of disruption. The company built a series of tools such as “Chaos Monkey” – a service which identifies groups of systems and randomly takes them offline to ensure Netflix’s safety without affecting customers. Netflix’s “Simian Army” consists of services including Chaos Monkey, Janitor Monkey, and Conformity Monkey in the Cloud that generate failures and detect abnormalities to test Netflix’s ability to survive them.
Since their Cloud migration, the company has seen numerous benefits. They have eight times more streaming members compared to 2008 and are experiencing a viewing growth by three orders of magnitude.
The flexibility offered by the Cloud allows Netflix to add thousands of virtual servers to support their long-term expansion. On January 6, Netflix became a global force, expanding its service to over 130 new countries. Their Cloud migration has allowed them to offer better and more enjoyable streaming services to Netflix members all over the world.
“We rely on the cloud for all of our scalable computing and storage needs – our business logic, distributed databases and big data processing/analytics, recommendations, transcoding, and hundreds of other functions that make up the Netflix application,” Netflix stated on their company blog. “Video is delivered through Netflix Open Connect, our content delivery network that is distributed globally to efficiently deliver our bits to members’ devices.”
One of the main reasons why the company decided to migrate to the Cloud was because of the cost benefits. With the Cloud, they are continuously able to grow and reach economies of scale that wouldn’t be possible with their own hosted data center.
The technology behind Netflix streaming has come a long way within the past eight years, and the company is continuing to reach new heights with the possibilities offered by the Cloud.
“…it feels great to finally not be constrained by the limitations we’ve previously faced,” Netflix stated. “As the cloud is still quite new to many of us in the industry, there are many questions to answer and problems to solve. Through initiatives such as Netflix Open Source, we hope to continue collaborating with great technology minds out there and together address all of these challenges.”
Here at i.t.NOW, we equip you with the latest technology in Cloud computing to help your business grow more efficient and scalable. For more information, please contact us for a free consultation!
Spotify is one of the largest music content providers in the world, has finally adopted cloud computing to continue to offer its users the best music streaming service available. Until recently, Spotify used the traditional data-center space method, which was once recognized as being both affordable and efficient. This method let Spotify deliver quality music streaming to users around the world. As the business continued to grow, its scaling requirements meant taking a second look at its data-center space. Although cloud computing is still uncharted territory for many businesses, Spotify decided to take a leap of faith in an attempt to scale back on unnecessary expenses while increasing efficiency.
Cloud Computing Allows Spotify To Keep Pace With Growth
To understand Spotify’s migration to the cloud, it helps to think of traditional data-center space as a shoe box with set dimensions. Once the shoe box is filled, nothing else can go in it. The cloud is more like a rubber band that expands and contracts as your business’ needs change. Like Spotify, your business can get instant access to more storage space as it grows and then scale back when that extra space is no longer needed. With 30 million songs, 2 billion playlists, and 75 million users and counting, it is easy to see why Spotify felt the need for a more flexible storage system.
The Cloud Is Cheaper
When Spotify was managing its own data center, the business had to pay for server hardware, networking gear, and data-center leasing space. In addition to these material costs, Spotify also had to pay for personnel to manage storage and maintain the technology. With the cloud, you can immediately reduce your in-house maintenance costs.
The Cloud Gives Efficiency
By transferring data using Google’s Direct Peering, Cloud VPN, and Cloud Router, users get a fast and secure music service. Spotify’s move to the cloud also means that streaming services are will continue to be fast and with great quality for users. When your business switches to the cloud, you gain the benefit of cloud support as well as functionality. This can drastically reduce your in-house support costs.
And these are just the beginning of the benefits Spotify’s move towards the cloud is expected to have. The Spotify Labs blog documents Spotify’s migration to the cloud and how it will allow them to develop new applications and provide more utility.
Talk to us to find out more features that cloud computing gives your business.
In the technology realm, nothing stays at a standstill. Bring your own device (BYOD) was a hot trend for enterprises in 2015, and it’s certainly not dying down or going away this year.
In fact, a recent Tech Pro Research report found that 72% of organizations were allowing BYOD in the workplace or planning to do so in the near future. BYOD continues to thrive in workplaces all over the world, with the majority of companies allowing employees to bring in their personal devices to conduct business.
Wearable devices and the “Internet of Things” (IoT) are also being thrown into the mix, making the topic of mobility and security a bit more complicated. But there’s no doubt that BYOD will continue to make waves in 2016 and take on exciting new avenues. Here are five possible ways that this policy will evolve in the new year.
1. BYOD will go from being a work perk to more of a business requirement.
The days of you begging to bring in your smartphone and tablet into the office will be long gone. In fact, companies will start requesting or even requiring employees to hook up their personal devices to do company work. Tech research and advisory firm Gartner predicts half of employers from all over the world will require BYOD by the end of 2016.
More businesses of various sizes and industries are beginning to realize the many benefits of BYOD, such as remote working and greater flexibility. As more organizations start empowering their employees with mobility, the remote workforce will grow steadfastly. Also, smaller companies in their early stages will begin to experience real gains from BYOD.
2. The Internet of Things will dominate.
BYOD will no longer be confined to smartphones and tablets. The Internet of Things (IoT) – basically devices talking to devices – will continue to make strides in the mobile landscape. With the rising trend of wearables, personal sensors, and environmental monitors, innovative business leaders will figure out how to factor these into their company strategy.
3. Mobile device management will be needed.
As the complexity and scope of BYOD grows, the strategy and guidelines needed to manage mobile devices in the workplace will grow in accordance. Corporations will have to rely on experienced IT companies to plan out how they can handle the onset of BYOD and the influx of changes in the mobile market. IT departments will need to define mobile device guidelines and requirements for its uses and the best security policy for it.
4. Storage may be a growing problem.
This issue doesn’t necessarily concern storage limitations or costs, but rather where business-sensitive files end up. Do you ever recall a time when you saved a document locally only to later delete its contents entirely by accident, resulting in you being unable to find it?
Centralized cloud storage and synchronization allows you to seamlessly access and save documents across various devices, both personal and corporate-owned. But setting the proper storage up requires a lot of forethought and planning by both users and IT departments. Managing more devices means keeping track of more locations and more opportunity for confusion and chaos. Luckily, using predictable settings and controls and following a secure mobile management policy can help you maintain the information on your devices more easily.
5. Security will be more of a challenge.
Lack of security is one of the biggest reasons why companies are not on board with BYOD. And their concern is a valid one. Firms that allow BYOD practices will have to work harder than ever with their IT department or tech provider to contain and regulate it.
To put it simply, there are millions of devices out there that store and have access to sensitive corporate data. These precious devices can easily wind up in the hands of unauthorized individuals, leading to higher security risks. Although the benefits of BYOD have always resulted in a security tradeoff, this concern will only grow more prominent in 2016.
To learn more about keeping your workforce up-to-date with the latest technology, contact i.t.NOW for a free consultation!
Good upgrades to your business’s network infrastructure and IT systems can be a huge boost to your bottom line. It’s common for a business to have a standardized IT system that they acquired in the early days and just upgrade in pieces along the way. This can hold your company back because it wasn’t initially designed for the growth of the business. An upgrade can help customize the system to your needs, save costs, increase revenue, promote productivity, improve the customer experience, and more. In this post, we will go over three ways system upgrades can benefit your business to explain why and how such an update should be a priority project for growth-minded business owners.
Everyone has seen the headlines in the past few years. Hackers are attacking businesses, breaking into their networks, and stealing data. Information stolen could be trade secrets, product designs, and internal protocols, or it could be customer financial and personal information that the hackers will use for identity theft. While big names like Target are the hacks that make the news, in reality, small and medium-sized enterprises are just as likely to come under fire from hackers. While the rewards are not as great, hackers know that most smaller businesses do not have as many resources to commit to security, and, therefore, are weaker targets.
Outdated network security is one of the easiest ways for hackers to get into a business’s network. As software ages, the companies that maintain it stop supporting it. For example, Microsoft no longer provides new security updates to Windows XP, so any business that is still using XP is running a significant risk. A new system upgrade to install new software and ensures everything is up to date closes all known security holes. This is quite valuable because many breaches exploit known holes instead of creatively finding new ones. Hackers want easy, soft targets, and a freshly upgraded system is neither of those things.
Upgrades Improve Processes
Right now, IT infrastructure plays a huge role in the productivity of any business. This will vary based on your industry, but there are very few companies that do not have a strong reliance on a functioning and effective network. It goes further than just whether or not you have a network: the quality of your whole IT system determines how much you can get done in a working day. With a new system, you can send files and data to one another more quickly, sharing results and designs. You have the ability to work through the day without worrying about whether or not the system will go down for one reason or another. Greater capacity means less downtime and better speed.
This is a qualitative difference as well as a quantitative one. Upgrades can unlock new features and tools that you were unable to access previously. For example, consider a new system that automatically backs up all of your important data to the cloud and stores it securely. If you have a power failure or a storm, you don’t need to worry about losing work. All of your progress will still be there when the office reopens. If you are a business that involves bringing customers or clients on site, then an upgrade might improve their experience by giving them a WiFi network for guests of the company. An improved network could allow for video-conferencing or other forms of communication that were not possible without the upgrade. Considering how critical IT is to productivity, it’s not surprising that a small upgrade project can pay big productivity dividends.
Globalization means that companies can now operate across borders, hire staff in different countries, send their employees across the world on business trips, and operate with agility in any time zone. But that is only possible with the right IT infrastructure. You need, for example, the ability to allow workers to connect remotely from offsite locations and still work as if they were at the office. It’s not easy to do this and ensure the connection remains secure. It’s particularly true if you also want to allow connections from mobile devices. For example, if you want to make an overseas hire, or you have an employee at a client meeting who needs information stored on his work computer, the right IT system can make that possible. However, without a recent upgrade, it is unlikely that your network can provide all of the functionality you need. Remote work is becoming such a big part of business growth making it hard to justify holding off on making the investment now. Even if this kind of remote work is not currently part of your workflow, that might just be because you don’t have the capacity to do it. Once your network supports it, you will find all kinds of uses for connecting remotely. It lets you distribute your network’s advantages to workers who are not physically present, opening up a wealth of opportunities.
The bottom line is that the business world is becoming more fast-paced than ever. An IT upgrade project is an up-front cost that provides a return on your investment for a long time because you get access to the latest tools and gain more capacity. A good network will reduce the chances that you need computer repair and other forms of support because it will have superior uptime and fewer bugs than in an old network. Computer repair is a cost that businesses would love to cut, and partnering with itNOW for your IT upgrades can increase your revenue and significantly decrease your future repair costs. By reaching out to us, you’ll experience a win on both counts.