Categories
Blog

Warning! USB Drives Could Infect You With Ransomware

Researchers report that the latest Spora ransomware strain, a highly sophisticated version of the malware, can now spread itself through USB thumb drives. What’s worse, Spora’s encryption procedures don’t have the usual requirements, such as a Command & Control server, a user-friendly payment site, etc.

Like many versions of ransomware, Spora uses a ZIP file that arrives in an email attachment to infect the victim. Once the user opens the ZIP, the file writes a script file and executes it immediately, encrypting the user’s data and holding it for ransom.

virus warning

However, Spora also exhibits traits associated with “worms”, using new technology from other malware in the form of Windows shortcuts (.LNK files). Spora adds these to files and folders on the desktop, in the root of USB drives and the system drive, and ensures they are hidden. This allows Spora to execute the malware without being detected.

What makes Spora especially dangerous is that this now puts anyone using a USB drive at risk as well. Just navigating through the system, or double-clicking the wrong file will activate the worm, spreading to any connected USB drives, which can then spread to other devices later on.

That’s why it’s so important for you to ensure that your staff understands how dangerous ransomware really is. The more they know, the more likely they’ll wait before double-clicking an email attachment that contains harmful malware.

Categories
Blog

Move to the Hybrid Cloud with Microsoft Office 365 for Government Users

Microsoft Office 365 for government users is the ideal solution to security, compliance, and agility needs in the government sector. Each subscription plan offers cutting-edge features designed around a personal computing suite and a secure, user-friendly interface.

Office 365 Government

Here is a not-too-well-known fact: Microsoft is the only software vendor that offers a complete hybrid cloud approach to IT solutions. What that means for government agencies ready to transition to the cloud is that by subscribing to Office 365 government agencies can:

  • integrate their on-premises data centers into private, public, and government maintained clouds
  • undergo a partial to complete digital transformation consistent with their mission and priorities
  • rely on a trusted and monitored network with levels of security and compliance

Office 365 meets 3 mission-critical IT challenges

Microsoft Office 365 solves several IT problems for government agencies, specifically the need for security, compliance, and agility.

What that means for agencies:

  • Security involves protection of data–from regulated personal information to highly classified defense information.
  • Compliance requires airtight assurance that data is safe from unauthorized access either inadvertent or through sinister intent.
  • Agility is the ability to respond quickly as new IT solutions make mission accomplishment easier.

The Office 365 service plan

Office 365 U.S. Government plans include features available to private users. In fact, Microsoft has designed this product around the paradigm of personal computing, which is moving to an intelligent cloud environment and is reinventing the notion of productivity in support of mission accomplishment.

The plans are available to qualified government entities–i.e., U.S., state, local, territorial–on a monthly subscription basis. There is no limit to the number of licenses the agency can purchase.

Standard features available to government Office 365 subscribers

Backed by 24/7 support for mission critical issues, each Office 365 U.S. Government subscription plan includes access to MS Office on line, email and calendars, collaboration through conferencing and team intranet sites. Users can share and store their files in the cloud under the supervision of a security and privacy monitoring and access control system designed to keep data safe and private.

Going the full-installation route

The full-featured plan is the Office 365 U.S. Government E4 with the following features:

  • full installation of Microsoft Office applications–This feature includes the new version of Office 2016 (Word, Excel, Access, PowerPoint, Outlook, Publisher, and OneNote) for both PC and Mac. (Note: MS Access is not available to Mac users). Each licensed user can install Office 365 on up to 5 PCs or Macs
  • Office 365 for tablets and phones–Users can install Office 365 on up to 5 tablets and 5 phones
  • Online versions of Microsoft Office–Includes cloud access to Word, Excel, and PowerPoint
  • file storage and sharing with 1 terabyte of cloud storage for each user
  • a business-class time-management solution with email, calendar and contacts management list–Each user owns a 50-gigabyte inbox
  • Skype for Business for unlimited online meetings–Includes instant messaging and video conferencing
  • dedicated intranet sites for agency teams–Includes customizable security settings and permissions for access control.
  • a corporate-style social network–Employees can collaborate across agency department boundaries and locations
  • application management with access and computer activation restrictions for work groups
  • “Business Intelligence” on demand–Analyze and view data using the power of MS Excel dashboards
  • Protection against data loss and compliance violations–Covers system files and email. Includes rights management and automatic legal hold in cases of data breach
  • hosted voice mail with a built-in auto attendant
  • enterprise telephone calling capabilities of Skype for Business Server 2016–Provides unified communications for PCs to either improve or replace a PBX phone system

Compare plans designed for the specific needs of U.S. Government organizations with the chart located on this page.

What Government Agencies Get for Free

Government Office 365 subscribers benefit from a lifetime of automatic Office 365 software updates. Software update and maintenance headaches go away. Agency IT staff are freed from technical trouble shooting and can concentrate more in mission-critical areas.

Office 2016 upgrades

Additionally, Office 365 now incorporates the newest version of the MS Office 2016 Office suite upgrades. Online as of November 2016, among other new and enhanced features, with Office 2016, users can:

  • turn data into maps with Excel’s new Maps chart–Annotate the maps with insights, trends, etc.
  • collaborate online in PowerPoint and edit presentations in real-time.
  • in Word, adjust text spacing, show breaks between syllables, and highlight each word as a document is read aloud.
  • take advantage of enhanced accessibility support to read and edit Word documents, Excel workbooks, and PowerPoint presentations and projects.
  • enjoy enhanced file management with the new Recent tab and files “Shared With Me” feature on the Open menu.
  • take advantage of enhanced graphics tools without resorting to third party “expert” software.

How agencies procure Microsoft online services

Typically, buying a subscription to Office 365 for a government agency requires working with a Microsoft partner. The partner helps the agency to license and install the software and get moving in the cloud.

Categories
Blog

Is Security A Myth?

How safe is your physical property, data, trade secrets & other valuables at your home or business? High & low tech together can secure it all.

It’s typically just a matter of time before any security system can be defeated. Eventual obsolescence, however, is no reason to give up on feeling secure. Just use our high- and low-tech tips, listed below, to keep safe all that you value.

Cyber Security

The Internet of Things: Convenient for Whom?

The continuing advance of wireless connectivity, including apps, and systems to remotely manage your home online, provides the utmost convenience for users on both sides of the fence. The pure convenience for home and business owners and for criminals. Being fully able to manage your physical world digitally, at a distance, means there’s a community of thieves and hackers out there, busily trying to reverse-engineer you out of your belongings and your IP (intellectual property). Also, the tried-and-true option of brute force, where only “smash and grab” before help can arrive, still exists.

Don’t let these security risks get you down, nor should you ditch your Wi-Fi security system in despair. Understanding your level of vulnerability is the first step to real security. Now, learn how to stay ahead of those who covet your belongings.

Solving Your Security Problem

High-tech wireless security, combined with low-tech backup methods, may be our best answer to enjoy Wi-Fi security and connected-world convenience, without anxiety. Also required are a frequent update/upgrade schedule for apps/software and an eye on the latest news about security hacks and break-ins.) Let’s start with a new look at familiar territory–password security.

Password Security Tips

  • Create strong passwords. Here’s how — Make them long, and mix the typical alpha-numerics with those often-ignored symbols on your keyboard. How to recall such a string? Pick a word or phrase you can remember, then mix in $ for S, and 3 for E, and so on. Important: Don’t use the same substitutions consistently. Use the letter S for S in the beginning of the password, and the $ for S toward the end, or vice versa. In fact, sometimes use 8 for S and sometimes, and other times opt to use 8 for B.

    Pro password tip: Instead of using a word, select a pass phrase (sentence) and abbreviate, then use number/letter substitution as described here above. Test your passwords using this tool from digital security guru Kapersky.

  • Use unique passwords for every website, system and app. Sigh. Yes, it can be a brain drain, but that’s where a good password manager comes in…
  • Get help with a password manager. Some of the best are reviewed by TechRepublic here.

Beyond Passwords: More Security Tips

  • Update, Update, Update. Always have the latest app version and OS (operating system) on all your devices. Once you’ve set up your ideal system, don’t rest on your laurels. Pay strict attention to updates and upgrades from the manufacturer or provider. Try to avoid the temptation of “remind me tomorrow” options on the dropdown.
  • Secure your router. Create a separate network for guests visiting your home or office. (The guest net must also have its own regularly updated password. Yes, frequent visitors must type in a new password each time, rather than saving it on their device–because who knows who has access to your guests’ devices?) To further secure your router, turn on firewalls and change the router name (its SSID) from the pre-set name. Also, set your router not to broadcast its name, if you have this option.
  • Automate frequent data backups. Consider making a bootable backup for your laptop. This backup allows you to restore your entire computer, rather than just access copies of your files. It includes copies of your settings, etc. For the best security, use both an outside cloud provider and your own (physical) removable hard drive, stored safely.

Low-Tech Security that Still Works

  • Hold your physical mail and package delivery. When away, place a vacation hold and/or have a friend, family member or trusted employee pick up regularly.
  • Use security signage at home. There is evidence burglars still skip these homes. Consider signage without the logo of your provider, in case the burglar is familiar with getting around the security methods of a specific alarm company.
  • Use your security system when you are home or at your business after hours. Some systems have an “at-home” setting that guards the perimeter (windows, doors, etc.) without activating indoor motion detectors, so you/your kids or employees can walk around safely inside the home or business.

True security is possible. It simply means that backup methods, both high-tech and low-tech, along with prevention techniques and a healthy measure of secrecy, are necessary to keep your valuables secure.

Need more than expert advice? Let us make IT security simple for you. We provide expert help to manage your business IT services. We are {company} based in {city}. Contact us at {email} to learn more — or call (469) 635-5500 today!

Skip to content