Your Smartphone and Tablet Need Security Too

phone-thiefMobile smart devices have all the capabilities of a laptop or computer.  What this means from a cybersecurity perspective is that they are every bit as vulnerable as a laptop or desktop computer.  The fact that they are small makes them easy for a thief to slip in a pocket or backpack and carry away, along with your personal information, contacts, pictures, geo-location history, and a raft of critical and revealing information.

In ...

Continue Reading →
0

Does Your Computer Have A Malware Infection? – Part 2

malwareOn Wednesday we looked at the obvious, visual symptoms of a malware infection.  Today we will explore some changes in performance that can indicate that your computer is infected.

Performance Symptoms

Most malware writers are NOT interested in giving you easy visual clues, but the malware will create additional activity on your system that can tip you off to an infection.

  • Constantly Flashing Hard Drive Light – If the hard drive activity light is constantly ...
Continue Reading →
0

Does Your Computer Have A Malware Infection?

malwareToday we are going to look at the symptoms that your computer may be displaying that are indications of a malware infection.

Visual Symptoms

These are signs that you will see on your computer display, and are the most obvious symptoms.

  • Ransomware  – The last stage of a ransomware or cryptoware infection is the prominent display of instructions on how to pay the attackers to get your decryption key
  • Fake Security Pop-Up – I haven’t ...
Continue Reading →
0

How Did They Take Over My Computer?

Computer breaches can happen many ways, but the two most common are stolen credentials, and phishing emails.  Credentials, your user name and password, sometimes are stolen from a web server breach, and then sold online on the criminal marketplaces.  Or sometimes you are tricked into giving them up on clever fake websites.  Phishing is one way that credentials are stolen.  The links in phishing emails often will direct the unwary user to the fake web page with the helpful web ...

Continue Reading →
0

The Growing Threat of Ransomware

The cyber-criminal underground has found a real moneymaker in the various forms of encryption based ransomware schemes.  These exploits turn all your readable work product, your documents, pictures, music and video files, into a collection of encrypted gibberish, and then kindly offers to sell you the decryption key.  I recently saw an infographic from Symantec on the Bromium blog that illustrated the problem perfectly.

ransomeware-infographic

What ...

Continue Reading →
0

Google Says: Bet You Can’t Hack A Chromebook

google-logoWe have been recommending the Google Chromebook to our clients for use as a dedicated online banking system.  The reason we like this platform even more than a Linux LiveCD boot disk is that because the Chrome operating system simply supports the operation of the notebook itself, and the Chrome browser.  That’s it.  There is not a way to install any programs to a ...

Continue Reading →
0

Windows Defender Gets Muscles

Windows10Tired of cyber-creeps kicking sand in your face at the virtual beach?  Microsoft wants to pump you up!!.  Businesses using the Enterprise version of Windows 10 will have the option of using Microsoft’s new enhanced Windows Defender Advanced Threat Protection.  In addition to providing end point security through Windows Defender, Defender ATP will connect with a cloud services based SIEM (security Information and Event Management) that will provide more protection, ...

Continue Reading →
0

Crypto-Ransomware Round-Up

cryptolockerSome of the nastiest exploits going around are the many variants of the CryptoLocker and CryptoWall malware that encrypt all your personal files and hold them for ransom.  Payment in bitcoin is required, in amounts starting at $200 and ranging upward to the $17,000 (400 BTC) that Hollywood Presbyterian Hospital just paid to unlock their files.  Or even more.  The amount will be whatever the attackers think they can extract from the victim.

  • The latest ...
Continue Reading →
0

OpenDNS Umbrella – Web Filtering and Security for SMBs

OpenDNSA great product for quickly and easily adding web site filtering to your organization is OpenDNS Umbrella.  OpenDNS was recently purchased by Cisco Systems.  OpenDNS is another featured security product that is part of the Managed Services program here at CIT.

The way OpenDNS works is that all of your traffic to and from the Internet is run through the proxy server cloud at OpenDNS.  In addition to protecting your organization ...

Continue Reading →
0

Bitdefender Rated Best Business AV

bitdefenderAV-Test rated Bitdefender Endpoint Security 5.3 the best anti-virus software for Windows client business users in its December 2015 test.  I mention this because this is the product that we deploy here at CIT for our managed service customers.  They rated a nearly perfect score.  Here are the particulars:

  • 100% effective against zero-day malware out of 140 samples used
  • 100% detection of 14,658 pervalent malware samples
  • Bitdefender affected performance negliably, adding a ...
Continue Reading →
0
Page 4 of 6 «...23456