Archive for the ‘Malware Protection’ Category

The best offense is a good defense: Disaster preparedness essentials

January 12, 2012

[tweetmeme source=LANSystems only_single=false]Guest blog by Cindy Bates, Vice President of Microsoft’s US SMB Organization

Planning for “the worst” isn’t quite as fun as refining a business plan or coming up with new ways to market your products or services, but doing so just might make the difference between the success or failure of your company. In fact, the U.S. Department of Labor estimates that more than 40 percent of businesses never reopen following a disaster; and, of the remaining companies, at least 25 percent will close in two years.

Yet, small businesses that take time to develop a disaster preparedness plan that includes preventive measures as well as actions to be taken in the event of disaster greatly increase their odds of withstanding catastrophe. To get started with creating a disaster preparedness plan, I recommend small- business decision makers consider the following:

  • Insurance plans and policies – Understanding the intricacies of an insurance plan or policy requires a good bit of time, but it’s a step well worth taking now since it’s unlikely there will be much time to do so when disaster strikes. Also, you might notice gaps in your plan that can be addressed before it’s too late.
  • Money management – It’s always wise to keep your finances in order, but all the more so when it comes to disaster preparedness. Have all financial obligations, including bill payments, payroll details and account information, in a safe place, since these responsibilities will still require attention even in the midst of dealing with a disaster.
  • Cloud-based software for storage and more – Cloud-based software services designed for small businesses store data in secure, offsite locations and provide access to data from anywhere employees have an Internet connection. If your physical office is hit by a natural disaster, you’d still be able to access your information for business continuity. Furthermore, many small businesses have found cloud-based software to provide a host of other benefits, including access to enterprise-class capabilities at an affordable price.
  • Microsoft Security Essentials provides real-time protection for your home or small- business PC that guards against viruses, spyware, and other malicious software. Microsoft Security Essentials is a free download from Microsoft that is simple to install and easy to use and that is automatically updated to protect your PC with the latest technology. The greater the security of your PCs, the less the chance that a virtual disaster like cybercrime could impact your business.
  • Technology      updates – By maintaining updated technology, small businesses can      prevent many virtual disasters from happening in the first place. Install updates      whenever prompted to do so, or set company PCs to install updates      automatically.
  • Virtualization –      Virtualization consolidates physical server hardware onto virtual machines      that live in the cloud. This not only helps small businesses recover more      swiftly from disaster but also can lead to cost savings and more efficient      operations.

Small businesses that need to implement new technology systems to better prepare for disaster should engage the help of a qualified IT services provider and can find a list of Atlanta-based providers here.

Also, for more advice on preventing and preparing for disaster, check out this free eGuide on disaster preparedness. Finally, I encourage you to keep tabs on my blog, where I regularly address a range of business and technology issues relevant to small businesses.

Cynthia (“Cindy”) Bates is the Vice President of Microsoft’s US SMB Organization where she is responsible for the company’s end-to-end SMB sales and marketing efforts, including SMB strategy, business development, regional field sales and national distribution sales, channel marketing, and customer marketing. 

Cindy and her team align Microsoft’s resources across customer and partner engagement to drive success in serving the millions of Small and Medium Sized Businesses in the US, helping them start, grow and thrive by leveraging today’s powerful and affordable technologies. At the pillar of these technologies lies cloud computing, in which Microsoft has more than 15 years of experience and understands how to meet the demands of SMBs for simplicity and impact, with enterprise-grade capabilities, flexibility and affordability in a familiar environment. 

Safe computing for the holidays

December 21, 2011

[tweetmeme source=LANSystems only_single=false]Taking time off to spend with family and friends is such a treat, but alas for many it is hard to stay away from the computer.  If you are going to do some online shopping, play a new game or check your work email, be sure to practice safe computing.  Your home computer may not have the same protection as work, so before you download that file or visit a new site make sure you are protected.

Protecting your computer

1)  Make sure your operating system is updated and all security patches are installed.  If you are using Windows, go to Control Panel Home, then Windows Update. This page will show you if you are up to date or if you need an update.  If you are out of date, follow the instructions and consider turning on automatic updates.  If you have a Mac, the update is similar to Windows so just follow the instructions.  If you have Unix or Linux, you are probably an expert and know how to patch your system.

2)  Browse safely.  Be sure your browser is current and that you are protecting against malware.  Malware are those nasty intruders that we often call viruses, trojans, worms or spyware.  For Windows, you can use Microsoft Security Essentials.  It is a free Microsoft tool that runs in the background and will alert you when a threat is identified.  Remember no protection is 100%, so you have to think before you click and be prepared to remove infections.

3)  Use a firewall. Firewalls can be hardware or software and screen Internet traffic as a first line of defense.

4)  Use spam filters. Most email programs include a spam and junk filter.  Not only can you trash unwanted junk mail, but you can disable email links (recommended) and be warned of malicious content.  There are many malicious emails that look legitimate so be careful when opening emails and never click on attachments or links unless you are certain of the source.

5)  Download safely. Only download from sites that you know are legitimate and reputable. When you download, save the file and be sure that your antivirus software is set up to scan when you open files.  A good rule to follow when opening anything is when in doubt – don’t!

6)  Have a computer expert you can count on.  If you are unfamiliar with computer protection, be sure to have someone who you can consult for advice and help.  It seems complicated, but there are many tools that are easy to configure that run automatically to keep you safe.  Be sure you are protected so that you can enjoy the holiday season with your family and friends rather than fixing your computer.

7)  Be sure you have a current backup.  Just in case the worst happens, you can restore to your latest backup.

Online information and help is abundant, but be cautious that you don’t get fooled by malware that pretends to offer help.  If you get a pop-up that claims it will remove an infection from your computer for a price, stop and call your expert!

If you need help or have comments/suggestions, please feel free to contact me at: mary@lansystems.com.

All of us at LAN Systems wish you a safe and joyous holiday season.

It’s a jungle out there – be smart online

June 29, 2011

[tweetmeme source=LANSystems only_single=false]Recently, I posted a job on craigslist for a senior systems and network engineer.  Although craigslist is a popular site, I have never used it and had some concerns about posting on a site that has received so much bad press. After researching, I decided to post our job and have been very happy with the response. But it’s a jungle out there and I knew to expect some scam artists to use the ad to try an attack.

Then today, I received an email from updates-craigslist: Updates!New Terms – Accept: June 29, 2011 with the following message:

———————————————————————-

craigslist

———————————————————————-
Dear Customer,

We need your help resolving an issue with your account. To give us time to work together on this, we’ve temporarily limited what you can do with your account until the issue is resolved.

We noticed some unusual activity . 

How you can help?

You must reverify your account and take the time to accept and read our terms: log in here  

It’s usually pretty easy to take care of things like this.

Ad: # 318-277-551-175

We understand it may be frustrating not to have full access to your account. We want to work with you to get your account back to normal as quickly as possible.

Thanks,

———————————————————————-

Copyright ©2011  Inc. All rights reserved. CL #73445897433\

It’s a scam and has all the characteristics (without typos) of a phishing attempt.  It tries to get you to login with their fake link and get you to input your account information.  Once your username/password was obtained, the phishers would take over your account and get as much information as they could about you.  They can’t do much on craigslist except make some inappropriate postings under your name, but they could use the username/password to break into other accounts like Twitter, Facebook or bank accounts.

So as a reminder, don’t fall for email scams.  When in doubt – don’t click, reply or forward.  Use strong passwords and make sure you have a good spam filter and malware protection.

How to Protect Your Computer Against Malware

February 21, 2011

[tweetmeme source=LANSystems only_single=false]Each year the damages from computer malware cost US businesses billions of dollars. These costs are not only in lost productivity, but permanent loss of critical business data. Arguably, most if not all infections are preventable with the proper understanding, training and protection. Don’t be the next victim, take the steps now to ensure protection and recovery if the worst should happen.

First, let’s understand computer malware. Often the term virus is used to describe all malware. Technically speaking, there are viruses, rootkits, Trojan horses, worms and spyware. The attack method may differ but they are all malicious.

A virus is a program that runs itself and replicates itself. It can affect files or the boot sector and can delete all your data. The “Melissa” and “I Love You” viruses gained global attention.

A rootkit or Trojan horse allows access to your system without your knowledge. Often they look like a useful piece of software but in fact they are back or trap doors.

A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes. Once on the system, worms do not need to attach to another program and can run themselves. Worms cause a denial of service attack making the network unusable. In general, worms target the network and viruses attack files.

Spyware is computer software that is installed on a personal computer to intercept or take control of the PC. Spyware can hijack a computer and cause serious problems by gathering and transmitting personal data, loading undesirable software or redirecting browsers to malicious sites.

Protecting yourself –

  1. Have a good backup, just in case you need to restore
  2. Use a firewall
  3. Keep your system updated with the latest security patches
  4. Install and update anti-virus and anti-spyware software (see below for choices)
  5. Do not open email from anonymous, unknown or suspicious sources
  6. Do not download files or software from anonymous, unknown or suspicious sources
  7. Do not navigate to suspicious or promiscuous websites
  8. Regularly scan your system for malware (see below for choices)
  9. Worth repeating – be sure that you have a good backup so that you can restore your full system if needed
  10. If you think you have been attacked, act quickly to isolate the infected computer and remove the malware.

You can purchase anti-virus and malware protection or there are many free versions for home users. For anti-virus, AVG, Avast and others have free versions. For corporate anti-virus, we use Symantec Endpoint. For malware, we like Malwarebytes (personal or corporate edition) and Advanced System Care. With so many choices if you like one better, use it. The important point is that you have to have malware/virus protection.

Use a three prong approach to keep your system safe: educate, protect, monitor. Try to understand the types of threats to your computer. The more educated and informed, the better you can protect your system. Monitor for threats and scan your system often. If it looks suspicious, don’t open the email, go to the site or download the file or software.

Please be watchful of the sites you visit, the software you download and the email you open as the threats to your system change daily.