The purpose of this article is to educate users on the dangers of Ransomware, or Cryptolocker.
Definition: Ransomeware is malicious software that is delivered usually via emails that look legitimate, and are designed to trick users in to opening attachments or opening links to files in order to encrypt files (making them unreadable) and demanding a fee to have the data de-crypted.
What is CryptoLocker?
CryptoLocker is a ransomware program that was released in the beginning of September 2013 that targets all versions of Windows computers. This ransomware will encrypt files using a strong encryption that is almost impossible to crack. When it has finished encrypting your files, it will display a CryptoLocker payment program that prompts you to send a ransompayment in order to decrypt the files.
If the payment is not made in time, access to all of the files will be lost. The only good way to recover from CryptoLocker is restoring from a backup (if you have one, and hopefully it’s recent).
How do you become infected with CryptoLocker?
This infection is typically spread through emails sent to company email addresses that pretend to from Fedex, UPS, DHS, or even invoices. These emails traditionally contain a zip file that when opened will infect the computer. These zip files contain executables that are disguised as PDF files , office files or any sort of document that can use macros. The infection can also spread and wreak havoc on your network if not stopped. According to Newsweek, in 2015 affected Americans paid about $325 million due to ransomware attacks; in 2016 cyber security analysts estimate it will be much higher.
If these attachments are opened, they will change files files on the network (workstations and servers) to an encrypted version that can only be unlocked with a special key. Without this key, your data is impossible to get to, and must be restored from a backup.
These unlock keys are available for purchase, typically for thousands of dollars. Without a backup, even the FBI says “pay the ransom”
i.t.NOW does its best to ensure data that resides on servers is protected, but we typically do not back up every single workstation we manage. This means if you were to open one of these attachments, the data on your C: drive would be unrecoverable.
Even with backups, downtime is costly. It can take hours to restore from backups, and during that time the entire company is typically at a standstill waiting to regain access to valuable data.
What about protection??
i.t.NOW provides several layers of protection to prevent these types of attacks on your network. Emails are filtered by a spam and virus firewall. Workstations are loaded with the latest OS patches and anti-virus software. However, these attacks are typically referred to as “Zero Hour” attacks. This means that the anti-virus and anti-spam databases of the world don’t yet know about this particular flavor of virus, and can’t flag them as such until they are identified, and virus definitions are created and applied. Additionally, attackers are getting more and more clever at the delivery methods, like embedding viruses into word documents and java scripts.
i.t.NOW is providing this information because some of these messages look so legit, they would trick even the most savvy of users. Have a look at the copies of actual emails below and let us know if you would open the attachment.
Generally, if you’re not expecting an email with an attachment, don’t open it! Especially if it says is from a scanner or e-fax. When in doubt, have someone check it out! We’re happy to help, we’d rather get 1000 calls asking if you should open an email than have to spend hours, or days cleaning up damage caused by ransomware. We’ve had several infections this year and with each one we sure up our defenses. However part of those defenses is you! We want to educate you so that you can be better prepared against this ever changing threat landscape.
Social Engineering attacks- Additionally, we’ve had a couple cases where an attacker will purchase a domain that is very close to your domain- for example, if your domain was acmepartners.com, an attacker may purchase acmepartnars.com and use it to send emails that seem to be from the CEO to the Controller asking for a wire transfer. If you see something like this- pick up the phone and verify! We had a client wire $60,000 to what they thought was their vendor, who at the last minute changed the bank routing number for the payment they were expecting. Closer inspection showed the from address was one letter off on the domain name.
The bottom line is to be cautions when opening email attachments, or requests for large sums of money to be transferred, even from an email that looks legit, it could be a spoof or a domain thats one letter off.
If you see anything suspicious, feel free to forward the email to email@example.com, or you can open a ticket by right-clicking your i.t.NOW icon and selecting “Create Service Ticket”.
Thank you for helping us protect your networks!
Netflix’s journey to the Cloud started all the way back in 2008 when the company experienced a major database corruption – an event that hindered their ability to deliver DVDs out to their customers. That’s when the idea of a Cloud migration came about. Netflix needed a highly reliable and scalable platform like the Cloud to host their systems. Prior to 2015, they migrated the majority of their systems to the Cloud with the help of Amazon Web Services. In early January 2016, Netflix reported the completion of their Cloud migration and shut down the last remaining pieces of their data center used by their streaming service.
One reason it took so long to make the shift was because Netflix had to rebuild nearly all of its software before the start of their Cloud journey to minimize the risk of disruption. The company built a series of tools such as “Chaos Monkey” – a service which identifies groups of systems and randomly takes them offline to ensure Netflix’s safety without affecting customers. Netflix’s “Simian Army” consists of services including Chaos Monkey, Janitor Monkey, and Conformity Monkey in the Cloud that generate failures and detect abnormalities to test Netflix’s ability to survive them.
Since their Cloud migration, the company has seen numerous benefits. They have eight times more streaming members compared to 2008 and are experiencing a viewing growth by three orders of magnitude.
The flexibility offered by the Cloud allows Netflix to add thousands of virtual servers to support their long-term expansion. On January 6, Netflix became a global force, expanding its service to over 130 new countries. Their Cloud migration has allowed them to offer better and more enjoyable streaming services to Netflix members all over the world.
“We rely on the cloud for all of our scalable computing and storage needs – our business logic, distributed databases and big data processing/analytics, recommendations, transcoding, and hundreds of other functions that make up the Netflix application,” Netflix stated on their company blog. “Video is delivered through Netflix Open Connect, our content delivery network that is distributed globally to efficiently deliver our bits to members’ devices.”
One of the main reasons why the company decided to migrate to the Cloud was because of the cost benefits. With the Cloud, they are continuously able to grow and reach economies of scale that wouldn’t be possible with their own hosted data center.
The technology behind Netflix streaming has come a long way within the past eight years, and the company is continuing to reach new heights with the possibilities offered by the Cloud.
“…it feels great to finally not be constrained by the limitations we’ve previously faced,” Netflix stated. “As the cloud is still quite new to many of us in the industry, there are many questions to answer and problems to solve. Through initiatives such as Netflix Open Source, we hope to continue collaborating with great technology minds out there and together address all of these challenges.”
Here at i.t.NOW, we equip you with the latest technology in Cloud computing to help your business grow more efficient and scalable. For more information, please contact us for a free consultation!
Spotify is one of the largest music content providers in the world, has finally adopted cloud computing to continue to offer its users the best music streaming service available. Until recently, Spotify used the traditional data-center space method, which was once recognized as being both affordable and efficient. This method let Spotify deliver quality music streaming to users around the world. As the business continued to grow, its scaling requirements meant taking a second look at its data-center space. Although cloud computing is still uncharted territory for many businesses, Spotify decided to take a leap of faith in an attempt to scale back on unnecessary expenses while increasing efficiency.
Cloud Computing Allows Spotify To Keep Pace With Growth
To understand Spotify’s migration to the cloud, it helps to think of traditional data-center space as a shoe box with set dimensions. Once the shoe box is filled, nothing else can go in it. The cloud is more like a rubber band that expands and contracts as your business’ needs change. Like Spotify, your business can get instant access to more storage space as it grows and then scale back when that extra space is no longer needed. With 30 million songs, 2 billion playlists, and 75 million users and counting, it is easy to see why Spotify felt the need for a more flexible storage system.
The Cloud Is Cheaper
When Spotify was managing its own data center, the business had to pay for server hardware, networking gear, and data-center leasing space. In addition to these material costs, Spotify also had to pay for personnel to manage storage and maintain the technology. With the cloud, you can immediately reduce your in-house maintenance costs.
The Cloud Gives Efficiency
By transferring data using Google’s Direct Peering, Cloud VPN, and Cloud Router, users get a fast and secure music service. Spotify’s move to the cloud also means that streaming services are will continue to be fast and with great quality for users. When your business switches to the cloud, you gain the benefit of cloud support as well as functionality. This can drastically reduce your in-house support costs.
And these are just the beginning of the benefits Spotify’s move towards the cloud is expected to have. The Spotify Labs blog documents Spotify’s migration to the cloud and how it will allow them to develop new applications and provide more utility.
Talk to us to find out more features that cloud computing gives your business.
In the technology realm, nothing stays at a standstill. Bring your own device (BYOD) was a hot trend for enterprises in 2015, and it’s certainly not dying down or going away this year.
In fact, a recent Tech Pro Research report found that 72% of organizations were allowing BYOD in the workplace or planning to do so in the near future. BYOD continues to thrive in workplaces all over the world, with the majority of companies allowing employees to bring in their personal devices to conduct business.
Wearable devices and the “Internet of Things” (IoT) are also being thrown into the mix, making the topic of mobility and security a bit more complicated. But there’s no doubt that BYOD will continue to make waves in 2016 and take on exciting new avenues. Here are five possible ways that this policy will evolve in the new year.
1. BYOD will go from being a work perk to more of a business requirement.
The days of you begging to bring in your smartphone and tablet into the office will be long gone. In fact, companies will start requesting or even requiring employees to hook up their personal devices to do company work. Tech research and advisory firm Gartner predicts half of employers from all over the world will require BYOD by the end of 2016.
More businesses of various sizes and industries are beginning to realize the many benefits of BYOD, such as remote working and greater flexibility. As more organizations start empowering their employees with mobility, the remote workforce will grow steadfastly. Also, smaller companies in their early stages will begin to experience real gains from BYOD.
2. The Internet of Things will dominate.
BYOD will no longer be confined to smartphones and tablets. The Internet of Things (IoT) – basically devices talking to devices – will continue to make strides in the mobile landscape. With the rising trend of wearables, personal sensors, and environmental monitors, innovative business leaders will figure out how to factor these into their company strategy.
3. Mobile device management will be needed.
As the complexity and scope of BYOD grows, the strategy and guidelines needed to manage mobile devices in the workplace will grow in accordance. Corporations will have to rely on experienced IT companies to plan out how they can handle the onset of BYOD and the influx of changes in the mobile market. IT departments will need to define mobile device guidelines and requirements for its uses and the best security policy for it.
4. Storage may be a growing problem.
This issue doesn’t necessarily concern storage limitations or costs, but rather where business-sensitive files end up. Do you ever recall a time when you saved a document locally only to later delete its contents entirely by accident, resulting in you being unable to find it?
Centralized cloud storage and synchronization allows you to seamlessly access and save documents across various devices, both personal and corporate-owned. But setting the proper storage up requires a lot of forethought and planning by both users and IT departments. Managing more devices means keeping track of more locations and more opportunity for confusion and chaos. Luckily, using predictable settings and controls and following a secure mobile management policy can help you maintain the information on your devices more easily.
5. Security will be more of a challenge.
Lack of security is one of the biggest reasons why companies are not on board with BYOD. And their concern is a valid one. Firms that allow BYOD practices will have to work harder than ever with their IT department or tech provider to contain and regulate it.
To put it simply, there are millions of devices out there that store and have access to sensitive corporate data. These precious devices can easily wind up in the hands of unauthorized individuals, leading to higher security risks. Although the benefits of BYOD have always resulted in a security tradeoff, this concern will only grow more prominent in 2016.
To learn more about keeping your workforce up-to-date with the latest technology, contact i.t.NOW for a free consultation!
Good upgrades to your business’s network infrastructure and IT systems can be a huge boost to your bottom line. It’s common for a business to have a standardized IT system that they acquired in the early days and just upgrade in pieces along the way. This can hold your company back because it wasn’t initially designed for the growth of the business. An upgrade can help customize the system to your needs, save costs, increase revenue, promote productivity, improve the customer experience, and more. In this post, we will go over three ways system upgrades can benefit your business to explain why and how such an update should be a priority project for growth-minded business owners.
Everyone has seen the headlines in the past few years. Hackers are attacking businesses, breaking into their networks, and stealing data. Information stolen could be trade secrets, product designs, and internal protocols, or it could be customer financial and personal information that the hackers will use for identity theft. While big names like Target are the hacks that make the news, in reality, small and medium-sized enterprises are just as likely to come under fire from hackers. While the rewards are not as great, hackers know that most smaller businesses do not have as many resources to commit to security, and, therefore, are weaker targets.
Outdated network security is one of the easiest ways for hackers to get into a business’s network. As software ages, the companies that maintain it stop supporting it. For example, Microsoft no longer provides new security updates to Windows XP, so any business that is still using XP is running a significant risk. A new system upgrade to install new software and ensures everything is up to date closes all known security holes. This is quite valuable because many breaches exploit known holes instead of creatively finding new ones. Hackers want easy, soft targets, and a freshly upgraded system is neither of those things.
Upgrades Improve Processes
Right now, IT infrastructure plays a huge role in the productivity of any business. This will vary based on your industry, but there are very few companies that do not have a strong reliance on a functioning and effective network. It goes further than just whether or not you have a network: the quality of your whole IT system determines how much you can get done in a working day. With a new system, you can send files and data to one another more quickly, sharing results and designs. You have the ability to work through the day without worrying about whether or not the system will go down for one reason or another. Greater capacity means less downtime and better speed.
This is a qualitative difference as well as a quantitative one. Upgrades can unlock new features and tools that you were unable to access previously. For example, consider a new system that automatically backs up all of your important data to the cloud and stores it securely. If you have a power failure or a storm, you don’t need to worry about losing work. All of your progress will still be there when the office reopens. If you are a business that involves bringing customers or clients on site, then an upgrade might improve their experience by giving them a WiFi network for guests of the company. An improved network could allow for video-conferencing or other forms of communication that were not possible without the upgrade. Considering how critical IT is to productivity, it’s not surprising that a small upgrade project can pay big productivity dividends.
Globalization means that companies can now operate across borders, hire staff in different countries, send their employees across the world on business trips, and operate with agility in any time zone. But that is only possible with the right IT infrastructure. You need, for example, the ability to allow workers to connect remotely from offsite locations and still work as if they were at the office. It’s not easy to do this and ensure the connection remains secure. It’s particularly true if you also want to allow connections from mobile devices. For example, if you want to make an overseas hire, or you have an employee at a client meeting who needs information stored on his work computer, the right IT system can make that possible. However, without a recent upgrade, it is unlikely that your network can provide all of the functionality you need. Remote work is becoming such a big part of business growth making it hard to justify holding off on making the investment now. Even if this kind of remote work is not currently part of your workflow, that might just be because you don’t have the capacity to do it. Once your network supports it, you will find all kinds of uses for connecting remotely. It lets you distribute your network’s advantages to workers who are not physically present, opening up a wealth of opportunities.
The bottom line is that the business world is becoming more fast-paced than ever. An IT upgrade project is an up-front cost that provides a return on your investment for a long time because you get access to the latest tools and gain more capacity. A good network will reduce the chances that you need computer repair and other forms of support because it will have superior uptime and fewer bugs than in an old network. Computer repair is a cost that businesses would love to cut, and partnering with itNOW for your IT upgrades can increase your revenue and significantly decrease your future repair costs. By reaching out to us, you’ll experience a win on both counts.
What Is Office 365?
Office 365 is a powerful business suite that contains well known applications such as Word, Excel, PowerPoint, and Outlook. What separates Office 365 from other business suites is its collaboration tools which push documents to the cloud and make them easily accessible to all team members. By using Office 365, you can easily enhance your project completion speed by allowing your employees to work on the go. You can access documents in Office 365 from any device that can connect to the internet, and other team members can see the edits made to documents in real time. Office 365 isn’t static, and you can easily upgrade to newer versions that become available over time. With strong security and privacy options, you can keep your data safe while working on new projects.
Using Office 365 to Boost Productivity
Businesses are always looking for new ways to stay competitive. But sometimes, the easiest ways to get a leg up go unnoticed or get glossed over. Although Office 365 is well known, most companies do not maximize it. By properly utilizing Office 365, you can easily access all of your documents with any device at any time. That means in-house projects and collaboration is easier than ever, and communicating with clients and sending out files is a breeze. Our team at i.t.NOW can help you troubleshoot through any issues that you might have with the business suite so that you can keep work disruptions and technical issues to a minimum.
Make Collaboration Simpler
Whether you are working on a spreadsheet, an animated video, or a Word document, sending files through email is inefficient. You can’t tell if your recipient has seen what you sent over, much less if they’ve been able to make edits or changes to your project. With Office 365, you can instantly see in real time if another team member is working on your project. With communication and collaboration made easier, you can speed up project timelines and deliver completed projects to clients faster.
Technical Support From i.t.NOW
When you use Office 365, you won’t be alone. i.t.NOW’s IT support staff will be there for you every step of the way. We’ll help you avoid technical issues so that you can continue to use your business suite while avoiding downtime. Our goal is to help you improve productivity and keep your suite up and running smoothly.
Downtime Is Damaging To Any Business
When your systems go down, your prospective clients can’t view your website. But downtime is more than simply a website that potential clients can’t see. That’s business that you are missing out on, and trust that you are losing. If your business develops a reputation for downtime and unreliability, your current clients and prospective business will take their dollars to a competitor. When your systems are down, you can’t provide the products and services that your clients rely on, and losing that trust can be difficult to overcome. That’s why the best businesses avoid downtime at any cost. You shouldn’t let downtime stop you from growing your business—with the right backup and recovery services, you can keep your clients satisfied and avoid downtime, damaged systems, and lost files.
Data Backup and Recovery Keeps Your Company Protected
Downtime doesn’t come on a predictable schedule. Your systems can go down after a disaster such as a flood or a storm. Or it can come when a hacker attempts to get into your systems. There are a variety of scenarios that can damage your systems or take you off-line, so you need to be prepared. Keeping your systems protected means using backup and recovery services that fit your company’s needs. Backup and recovery isn’t a monolith service—there are a plethora of different solutions that you can utilize. You can have a physical on-site backup, or you can have a physical backup off-site. You can also backup your systems in the cloud, or through virtual servers. And you aren’t limited to choosing a single solution either. You can backup your systems through the cloud as well as have a physical backup on-site.
Finding The Right Backup Solution
Every company needs to have functional backup and recovery services. But the chosen backup solution might be different for each company. You should determine your company’s needs—such as how much data you need to back up, and how much you are willing to pay for the service—before you determine which backup solution you want to choose. You can scale your backup solution upwards as your company grows, so if you start out with a small backup and recovery package, you can upgrade it as your needs expand. You can always rely on the IT experts at i.t.NOW to help your business find the right backup solution for your needs. If you are interested in backing up your company’s data, give our team a call today! We’d be happy to get to work on keeping your systems protected and helping you avoid downtime.