Categories
Blog

How To Use @Mentions In Microsoft Office

You have a lot going on during the business day and beyond, so any short-cut that adds productivity and efficiency to your day is a nice welcome. Microsoft recently updated its Word, Excel, and PowerPoint programs with a nifty even if simple tool: the @mention.

You have likely been there where you want to make a comment, you do make a comment, and that comment gets lost among all the other comments. Worse yet: the document you are reviewing will be reviewed by not just one but many other people. Without personalization in these comments, everyone will read each comment without knowing for whom it was intended. The @mention is a feature that solves these types of problems — problems that seem trivial at first but which can really add up. Here’s how to use the @mention feature and how to do so with success.

How to Use @mention in Microsoft Office?

The @mention feature is only available using Office 365. It allows you to tag someone who has permission to open the document for feedback by emailing that person with a direct link to the comment. It is really quite simple to use:

  1. Make sure you are signed into Outlook and then sign into Office 365.
  2. Open the document to be reviewed in either your SharePoint library or OneDrive for Business.
  3. Go to Review > New Comment.
  4. Type @-person’s-name within the comment.

The feature, for the moment, however, is only available online and to those who are Office Insiders using Windows or macOS. It is not yet available in iOS or Android.

How to Use @mention strategically?

Using the @mention strategically is what will really make this feature work for you. Here are a few tips to keep in mind:

  • Bring a comment to someone’s attention immediately by using @mention. Here, we specifically mean targeting a colleague who may have specific interest or knowledge of the matter or who may be loaded with work and an @mention may be the thing to get his or her attention.
  • For one comment, you can @mention more than one person, so there’s no need to draft more than one comment for the same issue.
  • You can @mention someone without permission to access the document — in this case, Microsoft will ask you to provide permission.
  • Make sure before starting the review that you have given permission to everyone who may also need access to the document so you do not need to worry about this additional step later.

Also, if you are wondering whether or not a person subject to multiple comments will now receive multiple emails, Microsoft has already thought about it, too. Microsoft will batch the links into a single email if there is more than one @mention for the same person.

mentions in Office365

Now that you know how to use @mentions in your Microsoft programs, and how to use it strategically, it is time to get back to get back to being productive. Sign in and try it out and see how soon other reviewers start responding.

Categories
Blog Technology News

Confused With All The IT Consulting Companies in Dallas?

The Dallas IT support industry has witnessed incredible growth over the past few years. This is attested to by the emergence of reputable IT consulting companies in Dallas such as Data Magic. Most IT companies offer services that are somewhat similar because they serve related niches of the market. The multitude of IT firms in Dallas can make it difficult for you to choose one that understands your needs and can meet them.

IT Consulting in Dallas

The benefits of outsourcing managed IT services shouldn’t be understated. Nevertheless, it is wrong to leave your data and IT systems in the hands just any managed services provider that you meet. This highlights the significance of establishing the benefits that you will get from a service provider before you sign on the dotted line. Here’s what you should do before signing that IT support contract.

Find Out About Services that Are Included in the IT Support Contract

Managed IT services providers generally offer bundled services, which can also be individually sourced. Therefore, you should have an idea about the kind of services that fall within each bundle, and the ones that are not covered by your contract. Besides, find out about services that are not part of the IT support contract, and any additional costs that you will incur if these services are extended to you.

Ask About Companies’ Specialty

The managed IT support industry is diversified, with each company specializing in specific areas. Before you embark on the search for IT consulting companies in Dallas to partner with, you must first identify what your IT needs are. This will give you an idea about the company that is appropriate for you.
Ask a company about the kind of services that they offer and gauge whether it is the right fit for you. Specialization is essential in IT consulting and therefore, you should avoid companies that claim to provide everything since they may not have the expertise to address your specific IT needs.

Establish The Response Times of IT Consulting Companies in Dallas

When looking for IT support companies to partner with, you should inquire about their response times once you face a crisis. This will help you know how long it will take for them to resolve your IT issues.

Companies’ response times generally depend on the level of IT support that you are paying for. Faster response time means that the IT company you are considering will swing into action and try solving your problem as soon as it arises.

Ask About the Flexibility and Scalability of their Support

No IT consulting company in Dallas can claim that it is perfectly sized for all businesses. Therefore, you should ask about the size of managed IT companies under consideration to establish whether they have the workforce and infrastructure to meet your firm’s IT needs. If your business has diverse and complex IT needs, a small IT company will not be the right fit for you since it may lack the resources required to support your firm’s needs.

You want to work with an IT consulting company that you can build a long-term partnership with. Therefore, you should inquire about the scalability and flexibility of the support services that will be extended to you. You should also establish whether a company can modify its services to meet the ever-changing IT needs of your business.

Find Out About Their Remote Monitoring Capability

A good IT consulting company should have the capability of extending support services to you 24/7. You don’t expect technicians to hang around your premises waiting for a crisis to arise. In this regard, an IT support services provider should have a network operations station for offering round-the-clock support. This is a guarantee that should your IT system face any problem; swift action will be taken to remedy the situation.

You also need to inquire whether IT firms under consideration offer preventive maintenance rather than waiting for problems to arise before swinging into action. Preventive maintenance may entail keeping your systems updated to avoid disruptions caused by security attacks. IT consulting firms that offer preventive maintenance should be given first consideration.

Establish How IT Consulting Companies in Dallas Will Store Your Data

Data firms the backbone of your company’s operations. Therefore, it is essential that you establish how a managed services provider will take care of your data. Find out whether the company will host the data in its data center or on the cloud. It is also advisable to inquire about measures that will be put in place to prevent data from getting compromised.

Which Data Backup and Recovery Measures are in Place?

You should find out about the data backup and recovery measures of different managed services providers. A suitable managed service provider will have a clear plan for backing up your data and recovering it if it gets compromised. The infallibility of the data backup and recovery strategy that a company puts in place will go a long way in helping you recover swiftly in case you are affected by a breach.

It is challenging to select an IT services company that can meet the needs of your business. Asking the right questions to managed IT services providers will help you determine their suitability to handle your IT needs. It will similarly eliminate the confusion that often arises when choosing IT consulting companies in Dallas.

Categories
Blog

Sextortion Scam Pretending To Come From Your Hacked Email Account

A recent sextortion scheme highlights the vulnerability users face when their data is stolen and used against them.

The widespread threat made it seem as though a hacker had compromising video of a victim taken while visiting adult pornographic websites. The scammers threatened to release the video unless they were paid in bitcoins.

Sextortion Scam

Here’s a closer look at the threat and how to prevent such ruses in the future.

What Happened in the Sextortion Case?

The latest fraud was different from earlier sextortion cases in one significant aspect. Victims were targeted with an email that appeared to come from their very own email account.

In the past, similar hacks used passwords to an adult website that had been stolen in a data breach. The scammer would threaten to release information about the victim’s activity in exchange for cryptocurrency.

Are These Schemes Successful?

The risk of public embarrassment is a powerful motivator for many victims who would rather pay than be exposed for visiting questionable websites. The recent scheme was first noted in the Netherlands, where it reportedly netted €40,000 in short order. That kind of quick cash is highly motivating to hackers looking to make a large amount of money fast.

What Did the Sextortion Email Say?

The English version of the scam had a subject line that included the victim’s email address and “48 hours to pay,” e.g. “username@example.com 48 hours to pay,”

In broken English, the scammer claimed to be part of an international hacker group that now had access to all accounts and gave an example of a stolen password.

Throughout several months, the email alleged, the victim’s devices were infected with a virus from visiting adult websites. Now, the hackers had access to a victim’s social media and messages.

“We are aware of your little and big secrets … yeah, you do have them,” the email continued. “We saw and recorded your doings on porn websites. Your tastes are so weird, you know.”

The email further claimed to have recordings of the victim viewing these websites and threatened to release them to friends and relatives. It demanded payment of $800 in bitcoin within 48 hours of reading the message. If the funds were received, the data would be erased. If not, videos would be sent to every contact found on the victim’s device.

For unsuspecting victims, receiving such an email could be terrifying. That’s why so many people succumb to such demands and pay up.

What Can Users Do?

While it’s easy to be scared into sending payment, the reality is that these emails can be ignored and deleted. It’s a good idea after doing so to run an anti-virus scan on all your devices to be sure that there is no malware installed.

Many of these scams occur because a domain has been hacked. However, these vulnerabilities can be eliminated by using some basic protections. Using domain name system (DNS) records designed for email validation and authentication are an essential first step. Here are three of the most common:

  • SPF. A sender policy framework (SPF) verifies that an email that claims to come from a domain is associated with an authorized IP address. An SPF can detect faked sender email addresses in spam filters. Hackers are less likely to target such domains for phishing attacks.
  • DKIM. DomainKeys Identified Email (DKIM) lets an email receiver verify that an email coming from a domain was authorized by that domain. Senders need to attach a digital signature to each outgoing message that’s linked to a domain name. The recipient’s system can compare that signature to a published key.
  • DMARC. Layered on top of SPF and DKIM is domain-based message authentication, reporting and conformance protocol (DMARC). Established in 2011, DMARC allows email senders to publish policies about unauthorized email. Also, email receivers can provide reporting to those senders. Both are designed to build a domain reputation and credibility about Domain-issued emails.

Your users and domains are vulnerable to hackers looking to exploit technology to shame people into paying. With the right technology assessments, security protocols and safeguards in place, your systems will be protected and dissuade hackers from attacking your sites in the future.

Categories
Blog

Hacked Passwords Leading to Increase in Sextortion Scams

It seems computer hackers will go to any length to complete their scams and wrestle money out of the hands of their victims. In one of the latest scams to come to light, hackers are finding real passwords and then using them to send emails threatening to expose people for watching porn. The unsuspecting victims receive an email disclosing part of a password associated with the email account that states the sender has set up a camera and filmed the recipient using a legitimate porn website. Unless the victim pays a ransom using Bitcoin, the sender of the email threatens to disclose the video to people closest to the victim.

Sextortion

Sextortion: A New Twist on an Old Plot

Many people receive so many scam emails that they no longer bother to open them. The scammers behind the sextortion scam hope to catch people’s attention by disclosing some or all of their email password immediately. If that works, the email goes on to describe how the hacker installed malware on a porn site while the email recipient was viewing it. However, it does not stop there. The hacker claims to have collected all of the victim’s contacts from Facebook, the Messenger application, and his or her email address as well.

As the email continues, the hacker threatens to send the supposed video of the recipient viewing porn to everyone on the contact lists mentioned above. The only thing the person receiving the email can do to stop this is to pay a ransom within 24 hours. The threatening language continues by informing the reader that the sender of the email knows the message has been read and not to waste time replying to it. In short, the reader should send the money or else.

Hackers Using Old Information

There is an element of truth in the sextortion email people receive in that some recipients have reported that the password is one they have used in the past. However, no one who said this scam had used the exposed passwords in more than 10 years nor have they used them on their current computer. The most likely explanation for the scam is that hackers obtained passwords from a security breach at a well-known website more than a decade ago. They merely added scripts to go with the passwords to make the scam seem more legitimate.

The Ruse is Getting More Sophisticated

Hackers have learned from this attempt at so-called sextortion that they must use more current information and a believable script to get anywhere with their intended victims. They now search for as much personal data as they can find online to convince the email recipient that the threat is real. Some have gone so far as to use illegal password lookup services associated with email addresses. The people behind that data breach have reportedly stolen billions of username and password combinations that they then sell to other scammers.

Yet another modern twist on sextortion is for hackers to email everyone with the information listed on a newly hacked customer database. In addition to demanding large sums of money, some of these scammers are demanding that the victims send nude photographs of themselves and other sexually explicit material. Some are so bold as to demand an in-person meeting where the victim must provide them with sexual favors to avoid having their private information exposed to everyone they know.

How Internet Users Can Protect Themselves from Sextortion

The FBI has received enough of these complaints to create an official document warning people of its dangers. It recommends that anyone who accesses the Internet regularly follow these steps to protect themselves from sextortion scams:

  • Make sure the web camera is turned off or covered when not in use
  • Never send a compromising image to anyone regardless of who they claim to be
  • Do not open email attachments unless the sender is well-known and trusted

To add even greater pathology to this scam, perpetrators are often adults disguising themselves as teenagers. They depend on younger recipients to be more naive about online scams and to fall for their demands without question. Anyone who feels they have been targeted for a sextortion scam via email should forward the email to the FBI as well as contact them immediately.

Categories
Blog

Tech Tips: Top 10 Free Windows Applications

Sure, you can purchase Windows applications for a price. With some — like Microsoft Office and Adobe Photoshop — it’s impossible to get around.

Free Windows Applications

But there are also many Windows applications out there that are 100% free. Some of them can even replace most of the features of your favorite paid programs (Microsoft Office and Adobe Photoshop included). Or, if you’re considering buying the paid versions of these programs, you can first download the free version to ensure you like the layout, options, and fluidity.

Below, we go over 10 of the best free Windows applications for download. These applications aren’t trials, and they aren’t limited to things like watermarks or other incomplete features. They are absolutely free, downloadable applications that you can use for … well, forever.

Let’s get started!

1. DaVinci Resolve

DaVinci Resolve is one of the most professional video editors on the market. Functionality is excellent, and you have a range of options when editing video in nearly any form. With this program, however, you’ll need to keep in mind two things.

First, in order to properly run DaVinci Resolve, you’ll have to have at least 8 GB of RAM, 1 GB of graphics memory, and a 64-bit version of Windows.

Second, there are two versions of this software: DaVinci Resolve (free version) and DaVinci Resolve Studio. The latter is a paid version and, naturally, has more capabilities and features. If you don’t want the paid version, choose the option on the left when downloading this program. And remember that for basic editing practices (with some added keen features), the free version of DaVinci Resolve is still quite capable completely worth it.

2. Blender

Blender is another of the best free applications for Windows. It is an open source 3D modeling package. Use it to create amazingly-professional 3D images of any kind; if you like, you can even translate your designs to a 3D printer. Blender can also be utilized to create animations.

In addition to its 3D imagery modeling capabilities, Blender also features video editing capabilities (basic) and has an integrated compositor.

3. Apache OpenOffice

When Microsoft Office is too pricey of an option for your word and data processing needs, Apache OpenOffice is an excellent alternative. It has been downloaded over two hundred million times.

This program includes a word processor, database, drawing package, presentation package, and spreadsheet maker. All of these programs are compatible with the paid version of Microsoft Office.

A sub-option of OpenOffice is another free Office package called LibreOffice. They are essentially comparable with only a few features that differentiate them.

4. Audacity

In terms of sound applications, Audacity is one of the most widely-used and professional multi-track audio editors out there. It is also a recorder. Volunteers created this super easy-to-use program to be completely open source. It can record and edit an entire album, has multiple themes and playback options, and allows you to edit and use effects just like a professional program.

5. SketchUp Make

SketchUp is a modeling program and is used often by those interested in 3D printing; the software can create all types of models that can later be translated to a 3D printer. It is extremely easy to use.

There are two SketchUp programs, and this is the free version. The professional (and paid) version is called SketchUp Pro. As a result of this, it is essential that you state that you are only going to use SketchUp for personal projects at the time of your free download.

6. GIMP

GIMP is an image editor and is completely open source. This program is an excellent alternative to Adobe Photoshop for editing photographs and other images. Even though the program has quite a steep learning curve, it’s definitely possible to get used to the platform and reap amazing benefits from the program — especially if you’re not ready to shell out for Photoshop.

7. Krita

Krita is a painting program and is open source. It was created by artists and is geared toward artists. You can download the program from the Krita website. The program allows you to create drawings on your computer, much in the way that real drawings (with paper and pen or pencil) are created. If you have a Graphics tablet, the program works especially well.

8. Sculptris

Sculptris is a 3D sculpting program available from Pixologic. It uses technology that professional 3D-modeling sculptors use. The whole package is a pared-down version of an all-in-one-digital sculpting solution called ZBrush (also by Pixologic), but this doesn’t mean it’s not possible to use Sculptris to create some pretty amazing things — great for those thinking about investing in ZBrush, who want to see how the software works.

9. Inkscape

A vector graphics editor, Inkscape allows you to “Draw Freely” as the advertising proclaims. It is comparable to Adobe Illustrator.

The program was created by developers for professionals and amateurs alike. Those who can benefit from this software include classic designers, web designers, illustrators, and anyone else interested in vector imagery. A broad array of structured drawing tools are available for a clean and neat final presentation.

10. Scribus

Scribus is a desktop publishing package that can produce a range of excellent results in terms of type- and image-setting. It is a top-notch DPT program for PDF and animated presentations as well. Create and arrange typesetting, layout, and much more.

Keep in mind that many of these applications can also be used on Macs or with Linux. Applications that are Mac compatible include:

  • Sculptris
  • Krita
  • Scribus
  • Inkscape
  • Audacity
  • SketchUp Make
  • GIMP
  • Blender
  • DaVinci Resolve
  • Apache OpenOffice

Applications that are Linux compatible include:

  • Krita
  • Scribus
  • Inkscape
  • Audacity
  • GIMP
  • Blender
  • Apache OpenOffice

Are There Any Other Free Application Options?

In addition to the ten free applications listed above, there are also two other, runner-up free applications you might consider.

Bonus App #1: Fusion from Blackmagic Design

This is a motion graphics program and compositor for both 2D and 3D design. Just make sure that you have strong enough capabilities with your PC as this program has specific requirements.

Bonus App #2: Autodesk 123D

Finally, here’s another 3D modeling option that is free for users of all ages. Autodesk 123D offers a variety of packages for assistance with 3D modeling that can create jewelry, home décor, Minecraft models and other toys, and much more. For industry, the models created with Autodesk 123D can be used in a variety of settings as well.

If you are interested in any of the areas listed above — illustrating, 3D modeling or sculpting, sound editing, video editing, image editing, or word and data processing — be sure to give these free applications a try on your Windows computer. These free versions were created by professionals to be open source for use by everyone and anyone, so take advantage of the technology and get creative!

Categories
Blog

How Does Managed IT Services Save You Time & Money?

Anyone who owns or runs a business knows that there is always more work that could be done, and there are almost endless ways to improve or help the business. Running a business is a full-time enterprise, and a good leader will need to learn how to be efficient to meet the company’s goals.

Managed Services Saving Money

The bottom line is crucial to keeping any business alive. Resources are by nature limited, so it is essential in saving money without sacrificing quality or results. IT is one of the areas which, if not managed correctly, can cost unnecessary time and money and lead to problems down the road. Using managed IT services is a way that many businesses save time and money, protecting their investment while offering more efficient services.

How Managed IT Services Save You Time

As a manager, you need to use your time in your business. Your business is your business, and other issues and problems keep you from doing the important and necessary work you do every day. Companies have become increasingly dependent on tech, using it for everything from human resources to security to finance or manufacturing. Unless your business is IT, you probably don’t know how to manage, troubleshoot and upgrade all those systems without help.

You are probably like most people who try to fix computer problems yourself first. If your solution doesn’t work, you may have made it worse, and you may have just wasted time spent trying to diagnose your own computer problems. If you use specific IT vendors for certain tasks, you probably spend too much time talking to them and trying to get them to fix your problems.

With managed IT services, you have a system where problems are assigned to technicians who are professional in their field. They don’t spend as much time working on a solution, because they have experience with those kinds of problems and have a pool of experts to call on. Your business isn’t left waiting while you try to solve computer issues. Perhaps more importantly, your clients and customers don’t see the chaos which can be created when you are struggling with problems outside your area of expertise.

How Managed IT Services Save You Money

While your company has its own values which define it, such as the core values which define your vision, you also cannot stay in business forever if you’re not making money. That means not funneling money down an endless black hole when you encounter a security breach or a problem with your hardware or software.

When you use managed IT services, you get the benefit of all the experience your IT service has. With the best IT jobs being competitive, you can choose an IT company which has recruited the best of the best. Instead of paying these top techs full-time salaries with benefits, you only have to pay for the services you specifically order. The IT company makes sure they are compensated as needed so they can help a broader range of clients.

You can choose the level of service you want and what kinds of problems you need help with. When you need an upgrade or new software, the IT company can seamlessly install the new product and assist if training is required.

Employee Tech Preferences

Surprisingly, the people who work at your business probably already have brand loyalty as far as the kinds of tech they enjoy using. Many of those who work in business bring in their own tech when possible, or introduce tech they are already familiar with to the company. This is especially true for those who work from home.

As long as everyone is able to communicate their needs, this is actually a positive thing. If employees collaborate, they can usually find common ground and solve their problems more efficiently. Almost half of professionals or business team members have introduced technology into the workplace, meaning they brought in products which work for them and which they’re comfortable with.

Flexibility is an excellent quality to have while working out any conflicts you have when personal tech is integrated into the workflow. In the end, you may have to make compromises or force some changes. Using managed IT services may also solve some of these problems as the wide variety of experienced techs may have more familiarity with popular alternatives. The most important thing is making sure that you are taking advantage of the resources you have while giving your employees the job satisfaction they deserve.

Categories
Blog

Important FBI/DHS Warning: Update On FBI and DHS Warning: SamSam Ransomware

The Department of Homeland Security and the Federal Bureau of Investigation issued a critical alert Dec. 3, warning users about SamSam ransomware and providing details on what system vulnerabilities permit the pernicious product to be deployed.

SamSam Ransomware

According to the alert, which came from the DHS’s National Cybersecurity and Communications Integration Center (NCCIC) along with the FBI, the SamSam actors targeted multiple industries—some within critical infrastructure—with the ransomware, which also is known as MSIL/Samas. The attacks mostly affected victims within the United States, but there was also an international impact.

As pointed out in the alert, organizations are more at risk to be attacked by network-wide infections than individuals because they are typically in a position where they have no option but making ransom payments.

“Organizations that provide essential functions have a critical need to resume operations quickly and are more likely to pay larger ransoms,” the alert states.

That does not mean individual systems cannot or are not attacked, but they are targeted significantly less by this particular type of malware.

How do SamSam actors operate?

Through FBI analysis of victims’ access logs and victim-reporting over the past couple of years, the agencies have discovered that the SamSam actors exploit Windows servers and vulnerable JBoss applications. Hackers use Remote Desktop Protocol (RDP) to gain access to their victims’ networks through an approved access point and infect reachable hosts. From there, the cyber actors “escalate privileges for administrator rights, drop malware onto the server, and run an executable file, all without victims’ action or authorization,” the report states.

RDP ransomware campaigns are typically accomplished through stolen login credentials—sometimes purchased from darknet marketplaces—or brute force attacks. Since they do not rely on victims completing a specific action, detecting RDP intrusions is challenging, according to the alert.

Ransom notes instructing victims to establish contact through a Tor hidden service are left on encrypted computers by the SamSam attackers. Victims are assured that once they pay the ransom in Bitcoin, they will receive links to download cryptographic keys and tools for decrypting their network.

Where did SamSam originate?

The Department of Justice recently indicted two Iranian men who allegedly were behind the creation of SamSam and deployed the ransomware, causing approximately $30 million of damage and collecting about $6 million in ransom payments from victims. The crippling ransomware affected about 200 municipalities, hospital, universities and other targets during the past three years, according to an article from Wired.

Keith Jarvis, a senior security researcher at SecureWorks, reiterated the sophistication of the SamSam ransomware and how it gains access to systems through weak authentication or vulnerabilities in web applications, methods that don’t require the victim to engage in a particular action. Hackers also go out of their way to target specific victims whose critical operations rely on getting systems up and running as quickly as possible, making them more likely to simply pay up.

What technical details about SamSam are important?

In the joint DHS and FBI report, the federal agencies provided a list, though not exhaustive, of SamSam Malware Analysis Reports that outline four variants of the ransomware. Organizations or their IT services administrators can review the following reports:

MAR-10219351.r1.v2 – SamSam1

MAR-10166283.r1.v1 – SamSam2

MAR-10158513.r1.v1 – SamSam3

MAR-10164494.r1.v1 – SamSam4

What mitigation and prevents practices are best?

In general, organizations are encouraged to not pay ransoms, since there is no guarantee they will receive decryption keys from the criminals. However, relying on a contingency plan or waiting out an attack, as advised by the FBI, is difficult when an entire operation has been compromised.

The best course of action is for organizations to strengthen their security posture in a way that prevents or at least mitigates the worst impacts of ransomware attacks. The FBI and DHS provided several best practices for system owners, users and administrators to consider to protect their systems.

For instance, network administrators are encouraged to review their systems to detect those that use RDP remote communication and place any system with an open RDP port behind a firewall. Users can be required to use a virtual private network (VPN) to access the system. Other best practices, according to the report, include:

  • Applying two-factor authentication
  • Disabling file and printer sharing services when possible, or using Active Directory authentication or strong passwords for required services
  • Regularly applying software and system updates
  • Reviewing logs regularly to detect intrusion attempts.
  • Ensuring third parties follow internal policies on remote access
  • Disabling RDP on critical devices where possible
  • Regulating and limiting external-to-internal RDP connections
  • Restricting the ability of users to install and run the unwanted software application

This just scratches the surface of actions that administrators and users can take to protect their networks against SamSam or other cyber-attacks. The National Institute of Standards and Technology (NIST) provides more thorough recommendations in its Guide to Malware Incident Prevention and Handling for Desktops and Laptops, or Special Publication 800-83.

Information technology specialists can also provide insight and advice for how organizations can detect gaps or vulnerabilities in their cyber-security that leave them susceptible to SamSam or other malware infections.

Categories
Blog

Threat Advisory: SamSam Ransomware

SamSam Ransomware is becoming a massive problem for multiple industries across the United States. In fact, the problem is so big that The Department of Homeland Security, (DHS), National Cybersecurity and Communications Integration Center, (NCCIC), and the Federal Bureau of Investigation, (FBI), have all recently issued a US-CERT alert due to the SamSam ransomware. Like other types of ransomware, files and networks are infected. In exchange for uninfected the system, hackers want a ransom, that typically costs thousands upon thousands of dollars. Every company that runs a network needs to be aware of SamSam ransomware. Here is what you need to know about this topic.

SamSam Ransomware

What is SamSam Ransomware?

SamSam ransomware is a type of ransomware that is designed to exploit Windows servers to gain access to your network. Once it is in the network, it uses the JexBoss Exploit Kit to access your JBoss applications. This type of ransomware is also able to use Remote Desktop Protocol to access your network. The virus is difficult to detect, due to the path it takes to access your system. Once the virus has made its way inside, hackers are able to get administrators’ rights, putting their malware on your server and basically hijacking your network. They do not release their hold on their network until you pay them the ransom they are asking.

What Can You Do to Decrease Your Chances of Getting SamSam Ransomware?

It is extremely important that you take the correct precautions to decrease your chances of getting infected with SamSam ransomware.

One of the steps you can take is to enable strong passwords and an account lockout policy. If you have strong passwords and a good lockout policy in place, it makes it much harder for the software to hack into your system and infect it. Enabling multi-factor authentication can also help. Before any new software can be installed, before software can be wiped or before changes can be made to your network, authentication is needed. The more authentication levels you have, the harder it will be for any ransomware to infect your system.

Unfortunately, while you can decrease your chances of getting infected with SamSam ransomware, there is no way to prevent infection altogether. As such, it is essential that you regularly install system and software updates and maintain a great backup system for all of your data and systems. This way, if you do get infected, you have a recent back-up for all of your system and data. You can wipe your current, infected system and start fresh from your backup point, without losing much at all.

How Can You Learn More About SamSam Ransomware?

If you are looking to learn more about SamSam ransomware, including the technical details surrounding it. It is highly recommended that you read through the SamSam Malware Analysis Reports that have been released by the US-CERT. A list of the reports, including links, are included here:

SamSam Ransomware is infecting computer systems and networks in multiple industries all across America. It is important that you learn what this ransomware is and how to protect yourself against it. Taking the right action can help to minimize the chances of your network being held ransom by SamSam ransomware.

Categories
Blog

Marriott Data Breach: What You Need To Know

Heads up if you’ve stayed or made reservations at a Marriott or Starwood property over the last decade. A major security issue was just announced and the scope of the problem is actually quite astonishing. Here’s what you need to know about the Marriott International data breach.

Marriott Data Breach

What is the Marriott Data Breach?

On November 30th, Marriott International announced that the private information of up to 500 million guests became compromised. The breach is one of the largest in history and brings up a variety of concerns regarding consumer privacy safety.

They noted that an internal tool recognized a data breach in September, but wasn’t able to confirm the issue was part of the Starwood database until November. Further investigation revealed that the problem has happened since as far back as 2014 and that the exact breadth of the issue isn’t yet known.

Who is Affected by the Marriott Data Breach?

To be blunt, 500 million people is a lot. If you’ve traveled on business in the past or regularly stay at the hotel chain’s properties, your personal data is likely compromised. Additionally, those who merely made reservations but never actually stayed the night are also included in the breach.

According to NBC News, Marriott also reported that for 327 million of those people, the information includes some combination of a name, mailing address, phone number, email address, passport number, Starwood Preferred Guest account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences. Encrypted credit card information is also likely stolen, but the company isn’t yet sure if the thieves were able to reveal account numbers.

An additional report also suggested that employee information might have even been compromised, especially in situations where workers took advantage of employee discounts to stay at hotels around the globe.

What is Marriott Doing After the Data Breach?

While the initial statement from the company was vague, they have taken steps to improve the situation by hiring the public relations firm Kroll. Those concerned about being part of the Marriott data breach may check for more information at a website provided by the hotel chain.

Maryland Attorney General Brian Frosh is opening an investigation into the incident, citing the company headquarters in his state as the reasoning for his inquisition. Additionally, New York planned to look into the incident and other states where the company has properties are likely to follow. There is no word yet on how the breach is being reviewed internationally.

Furthermore, within hours of the news, a class action lawsuit for 12 billion dollars was filed by Ben Meiselas of Geragos & Geragos. The suit is on behalf of two plaintiffs who feel duped by the company not immediately admitting there was a security issue. In other cases in the past are any indication, there’s likely to be a settlement out of court soon.

What Can Other Companies Learn from Marriott’s Data Breach?

At this time, it is hard to tell what other companies can learn from Marriott International’s data breach since news of the incident is still relatively recent. Other companies have faced similar issues in the past, such as Yahoo’s admission earlier this year that the three billion accounts had information hacked and Under Armour’s data breach of 150 million MyFitnessPal user accounts. Those companies were able to provide customers with free credit monitoring to try to earn back trust, but time will still tell on how it affects each firm’s reputation overall. Both have made attempts to increase application cybersecurity.

In short, if you have made a reservation or stayed at a Marriott Hotel or Starwood property in the last few years, it is wise to invest in some version of identity theft monitoring. Also, consider additional discussion and concerns with your lawyer general and by making a claim on Marriott’s data breach website.

Skip to content