You may be aware of the ‘WannaCrypt’ ransomware hack that propagated out May 2017 that hit Windows operating systems on over 200,000 computers across 150 countries, including dozens of large companies and institutions such as the UK’s National Health Service and France’s Renault factories. There’s an expectation that another wave of attacks will happen this week around the rest of the World.
WannaCrypt targets older versions of Windows such as XP, Vista, Windows 8 and Server 2003, which no longer have mainstream support from Microsoft. WannaCrypt can reportedly be spread over local systems without user interaction, it encrypts the files on the computer making them inaccessible. Once infected there’s no fix, you can’t unlock the files, the choices are to pay the ransom in bitcoins (not recommended), do a full reinstall of all your files; or wait until a solution is developed to remove the infection. Rockingham IT Solutions customers probably can’t afford to wait, business must go on!
The first line of defence is good virus protection. However, virus protection solutions can be breached, so if you receive an email containing a file attachment or URL you aren’t sure about, DON’T OPEN IT! The secondary line of defence is a good backup solution that stores the backup on another system in an offsite location – having a backup on another drive on the same machine isn’t a good idea, a ransomware attack will also encrypt the backup. Another risk is that if for any reason the computer is badly damaged or destroyed you will lose both the original data and backup!
A small number of Rockingham IT Solutions customers have suffered ransomware attacks in the past, for this reason we addressed the ransomware risk in past newsletters. Given the escalating number of ransomware attacks we now ask you our customers to check if you have an effective backup solution in place, or if you are unsure PLEASE CALL US.
As we are IT consultant we will typically be the first port of call if a customer suffers a ransomware attack, plus if our customer has to do a full reinstall it’s best that our techs reinstall from backups that we know how they are backed up.
Rockingham IT Solutions can offer an online 3rd party backup service, for details please contact our helpful Techs on 08 6102 2919 during Office Hours.
Director / COO
Rockingham IT Solutions
Microsoft forcing this upgrade despite users clicking no !
Rockingham IT Solutions are seeing many systems Windows 10 upgrades being presented for repair for several weeks now, but we can see after the 11th April a huge spike in problems with Creators Edition.
For most the upgrade may work but for many it will causing a massive headache and downtime in lost hours, which in turn means lost revenue especially for small businesses.
What you need to do is ring us up now and get our service tech out to you to firstly check over your system and make sure that there is a backup system in place just incase the upgrade goes wrong.
Also when the upgrade has gone through, check all your settings and installed programs and check they are all functioning properly. If not then Call us on 0861022919 and we will get one of our service techs on to your problem.
Remember, “We Are Your Fourth Emergency Service.”
Computer Workshop Technician / Mobile Support Technician
covering Rockingham and surrounding areas.
Have you backed up your data recently? Every day people, businesses, even games lose huge amounts of valuable data because they fail to follow this one basic procedure. World Backup Day is set aside as a reminder to back up your files, even if it’s once a year! A backup is a reserve copy of all the files you’d be loathe to use. There’s nothing more traumatizing than having losing your phone, or having your hard drive crash, and having hundreds of valuable and irreplaceable documents or photos suddenly gone beyond retrieval.
No matter how secure or safe you feel your data and equipment is, it’s important to back up your files. 30% of people don’t have any way to save their important files in the event that tragedy strikes. In our electronic based world, there are hundreds of ways to suddenly have things go terribly awry. 29% of all disasters are caused by accidents, costing valuable time and money as the resources they affected are lost forever. You may feel your computer is safe, but 1 in 10 of all computers, including household and business computers, are infected with a virus that may suddenly cause all of your data to be gone beyond retrieval.
The worst Virus these days is the dreaded CryptoVirus . Cryptolocker / CryptoVirus is a ransomware Trojan which has been running around since 2013 and is still doing the rounds these days ! If you or your business would like more information regarding Cyber Security, it would be a good idea to get one of Rockingham IT Solutions consultants in to do an audit of your establishment or attend one of our many Workshop Training Courses to learn how to protect your systems.
“But my phone is always on me!” I hear you say! Wonderful! That’ll make it easier for you to be one of the 113 phones stolen every minute, each day. In this modern digital world, many of us live from our phones. Whether it’s for business, or just personal use, these electronic assistants often contain gigs of valuable documents, pictures, videos, and music. Do you really want to chance losing all of that when backup options are so easy and available?
“Easy? How do I backup my files and protect myself?” There ya go! Now we’re asking the right questions! There are a myriad of ways you can use to backup your files, most phones are connected to some form of backup system. iPhones are tied directly into iTunes, which can back up all of your valuable data, you just need to hook that thing up to your computer and update the files daily! You can even do it as part of charging, just plug it in to your computer, set it to backup, and it’ll go about the process automatically while it takes a charge.
Android phones are intrinsically tied to Google, and with the availability of Google Docs and the Google backup, it’ll tie all of your data in to your profile, uploading it to a secure location while allowing you to choose which ones to share! Google Docs can also be used to store all of your valuable files online! The bonus here is that from google docs you can access your files from any computer, saving you from having to wait for your system to be back up before you get those important files back!
Another option is open that is the ‘all inclusive’ option. If you’d prefer to back up everything instead of just bits and pieces, there are tons of places online that will give you reviews of dozens of options for full backup services. Take some time to cruise through them and decide which one is right for you. Remember, if the only copy you have of your important files is all in one place, it only takes one accident, one small disaster for you to lose them all. So take the time to backup your files, and stop yourself from becoming one of this year’s April’s Fools.
YAHOO has admitted that hackers breached its system to steal data from one billion user accounts in a massive cyber attack that was unreported for more than three years.
At Rockingham IT Solutions we always suggest to small businesses and even home owners not to use free email accounts but to have your own domain and email and let us administer them for better security.
“You will be surprised at just how competitively priced and convenient having your own domain and email hosting is” Jon Ellis our Owner / Director states.
In the past few months, Yahoo has owned up to being hit by the two of the biggest data breaches in history.
In September 2016, it announced it had been hit by what was then declared the world’s biggest hack — now it has revealed a new attack that involves twice as many people and sets a new record.
The news could not have come at a worst time for Yahoo, which is in the middle of securing a huge buyout deal.
Yahoo today has reported a experts analysing Yahoo’s records in the lead up to the buyout by Verizon had identified the mammoth attack which occurred in August 2013.
The hack reported today is separate to another hack reported in September which targeted 500 million Yahoo in 2014.
“I need to learn more of how to protect my Systems Data?”
Then Come along to our Cyber Security Seminar on Tuesday 7th March to learn how to protect your systems and more importantly your Data!
Cybercrime prevention can be straight-forward – when armed with a little technical advice and common sense, many attacks can be avoided. In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target. The tips below provide basic information on how you can prevent online fraud.
Keep your computer current with the latest patches and updates.
One of the best ways to keep attackers away from your computer is to apply patches and other software fixes when they become available. By regularly updating your computer, you block attackers from being able to take advantage of software flaws (vulnerabilities) that they could otherwise use to break into your system.
Make sure your computer’s Antivirus & Malware is up to date.
Keep in mind that a newly purchased computer may not have the right level of security for you. When you are installing your computer at home, pay attention not just to making your new system function, but also focus on making it work securely.
We recommend to install a commercial grade package such as Trend as it is not as resource hungry like Norton, Kaspersky or McAfee.
Choose strong passwords and keep them safe.
Passwords are a fact of life on the Internet today—we use them for everything from ordering flowers and online banking to logging into our favorite airline Web site to see how many miles we have accumulated. The following tips can help make your online experiences secure:
- Selecting a password that cannot be easily guessed such as your date of birth, childrens or pets names, be at least 8 characters long and have a combination of upper and lower case, symbols and numbers.
- Keep your passwords in a safe place and try not to use the same password for every service you use online.
- Change passwords on a regular basis, at least every 90 days.
Protect your personal information.
Exercise caution when sharing personal information such as your name, home address, phone number, and email address online, the following list contains some advice for how to share personal information safely online:
- Keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor grammar, odd phrasings, Web site addresses with strange extensions, Web site addresses that are entirely numbers where there are normally words, and anything else out of the ordinary. Additionally, phishing messages will often tell you that you have to act quickly to keep your account open, update your security, or urge you to provide information immediately or else something bad will happen. Don’t take the bait.
- Don’t respond to email messages that ask for personal information. Legitimate companies will not use email messages to ask for your personal information. When in doubt, contact the company by phone or by typing in the company Web address into your Web browser. Don’t click on the links in these messages as they make take you to a fraudulent, malicious Web sites.
- Steer clear of fraudulent Web sites used to steal personal information. When visiting a Web site, type the address (URL) directly into the Web browser rather than following a link within an email or instant message. Fraudsters often forge these links to make them look convincing. A shopping, banking or any other Web site where sensitive information should have an “S” after the letters “http” (i.e. https://www.yourbank.com not http://www.yourbank.com)/. The “s” stands for secure and should appear when you are in an area requesting you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner).
- Pay attention to privacy policies on Web sites and in software. It is important to understand how an organization might collect and use your personal information before you share it with them.
- Guard your email address. Spammers and phishers sometimes send millions of messages to email addresses that may or may not exist in hopes of finding a potential victim. Responding to these messages or even downloading images ensures you will be added to their lists for more of the same messages in the future. Also be careful when posting your email address online in newsgroups, blogs or online communities.
CryptoLocker is a ransomware trojan. CryptoLocker propagates mainly via infected email attachments, when activated, the malware encrypts certain types of files stored on local and mounted network drives, with the private key stored only on the malware’s control servers. The malware then displays a message which offers to decrypt the data if a payment is made however it is recommended NOT to pay the ransom as it only encourages more infections.
Although CryptoLocker itself is readily removed, files remained encrypted in a way which researchers considered unfeasible to break.
Apple iPhone users are being urged to update their handsets after a private cyberarms dealer found a way to hack the iPhone with sophisticated malware.
The Isreal-based NSO group developed the ‘world first’ malware, which exploited three previously unknown iOS vulnerabilities.
NSO Group’s software effectively transforms the phone into a surveillance device, tracking its movements, logging messages and downloading personal data.
It also allowed hackers access to their passwords and could record sounds.
Apple quickly moved to patch the insecurities, and is advising all users to update their iPhones.
We were made aware of this vulnerability and immediately fixed it with iOS 9.3.5, through an Apple spokesperson.
Rockingham IT Solutions are advising all of our customers to always download the latest version of iOS to protect themselves against potential security exploits.
The majority of iPhone users are currently using iOS 9, though anyone who has updated to the iOS 10 beta is safe, Apple says. All users should update their iPhones to at least 9.3.5
To update your iPhone, plug your device into power and connect to the internet with Wi-Fi. Then tap Settings, General, then Software Update.
The malware was detailed in a report from Citizen Lab and Lookout security, and Lookout vice president of research Mike Murray said the NSO software, called Pegasus, is “the most professional piece of spyware that I’ve ever seen.”
He told The Wall Street Journal the software operates stealthily, ensuring that it doesn’t quickly drain the battery and speeding up its data transfer when it is on Wi-Fi networks so that it doesn’t get noticed.
NSO has billed itself as a leader in the field of cyberwarfare, offering tools for governments to keep tabs on criminals and terrorists who use encrypted communications. The company has been thought to be capable of installing unauthorised software on Android, BlackBerry and iPhone devices, but Thursday’s report provides the first in-depth look at its capabilities.
“We’re a complete ghost,” NSO co-founder Omri Lavie told Defense News in a 2013 interview. “We’re totally transparent to the target, and we leave no traces.”
Researchers highlighted the unusual way that Pegasus is installed on a phone, taking advantage of the three flaws in iOS to silently “jailbreak” the phone and circumvent the requirement that only Apple-approved software runs on the device.
This type of one-click iPhone attack previously has been described by researchers but never been seen in a real-world attack, Lookout’s Mr Murray said.
The cyber readiness team that’s part of the U.S. Department of Homeland Security has advised Windows users to uninstall Apple’s QuickTime media player from their PCs.
Users with Computers running the Apple for QuickTime on Windows have been dropped from support, meaning no future security updates will be issued and development has been halted.
The last wasn’t new: Apple hasn’t significantly upgraded QuickTime for Windows since 2009, when it launched QuickTime X for OS X but didn’t port the new player to Windows. The most recent security update for QuickTime on Windows was issued three months ago.
Apple used to rely on QuickTime to stream its live events to Windows PCs, but recently switched to HLS (HTTP Live Streaming), an Apple-implemented protocol. Because Windows 10’s Edge browser supports HLS, Apple has listed that version of Microsoft’s operating system and browser as the sole choice for Windows users who want to view its webcasts.
Do you have
Think your child is only using WiFi within the house ? If their iPhone is on 9.2.1. then think again.
If you’re the kind of person who routinely uses almost all of the mobile data included in your monthly plan, there’s something you should know about Apple’s latest iPhone software. A new feature called “Wi-Fi Assist”, which is turned on by default, has reportedly been quietly eating through users’ mobile data quota while they thought they were on Wi-Fi.
The Wi-Fi Assist setting can be turned off in the Mobile Data settings screen. This feature is designed to make sure users get a smooth online experience, switching automatically to mobile data to boost your connection speed if your Wi-Fi connection is determined to be too slow.
It’s easy to see how this could be handy if you’re trying to stream audio while walking away from
your house, or browsing the internet in your backyard right at the edge of your Wi-Fi’s range, but it comes with a downside as well.
For those who already use up most of their data plan while out and about, the feature could potentially blow out phone bills across the country, as iPhones pilfer mobile data at home to assist with flaky Wi-Fi speeds. Some users have already taken to social media to complain their mobile data usage has skyrocketed since they upgraded to iOS 9.
Those using the internet on a budget would appear to be at particular risk of bill shock, as in Australia low-cost mobile plans are notoriously stingy with the data allocation, and low-cost home broadband notoriously poor in its consistency.
Thankfully there is an easy fix, and here is how to do it :
Here are the four easy steps to turn off WiFi Assist.
Of course if you generally find yourself swimming in extra data allocation at the end of each month, or frequently find your phone clutches on to your home Wi-Fi well beyond the point of being useless as you walk down the street, this feature could be a great way to avoid buffering.