Archive for the ‘Internet Security’ category

The Best Cyber Security Advice from Experts.

February 22nd, 2017

Some great advice from PC World Online.

  1. Set up two-factor authentication to protect their internet accounts, especially email. It can be particularly useful when stopping hackers who are trying to steal login passwords from users, whether through malware or email phishing schemes.
  2. Businesses need to first think about what assets they’re trying to protect from cyber threats, as opposed to blindly buying the latest security products.
  3. Many people still think hackers will never target them, but that assumption is wrong. Everybody’s information is valuable.
  4. When a company gets hacked, it’s largely because there’s a computer, a box, a website that they didn’t know they owned.

Read the full article here:

http://www.pcworld.com/article/3171280/security/experts-at-rsa-give-their-best-cybersecurity-advice.html

 

Think Your Computer Might have a Virus?

February 15th, 2017

Yes… It happens. How can you be sure though?

We found this great article on the Kaspersky website and we thought we would share it with you this week. Here it is:

There is a number of signs or symptoms indicating that your computer is infected.

If you have started to notice weird things happening on your PC, such as:

  • unusual messages, images, or sound signals;
  • CD-ROM tray opens and closes voluntary;
  • programs start running without your command;
  • messages are displayed informing that one of your programs is attempting to access the Internet without your command.

Then it is likely that your computer is infected with malware.

Additional signs of email infections:

  • Your friends or colleagues tell you about having received emails sent from your email box which you did not send;
  • A lot of messages without a sender address and subject in your mailbox.
  • It must be admitted that such signs are not always explained by presence of malware. They may have some other explanation. For example, the issue with weird emails may be the result of somebody sending infected emails with your sender address from some other computer, not necessarily yours.

Read the rest at: http://support.kaspersky.com/us/790

Fake Government Sites – Daily Security

April 8th, 2015

The FBI has warned US citizens to beware of fake government websites showing up in search results. Watch today’s Daily Byte to learn about this latest phishing campaign, what blackhat SEO means, and how to avoid evil search results.

Computer Company  IT Manager, Bob Froess found this article here: http://watchguardsecuritycenter.com

Posted by Don Thurber

Windows XP Support Has Ended

April 8th, 2014

As of April 8 2014, your XP computer is no longer receiving automatic updates that help protect your personal information. Even if you have anti-virus software, your computer may not be fully secure.

What this means for you

If you continue to use Windows XP without XP support, your computer may still work but will become vulnerable to security risks and viruses.

Why Windows XP support ended

Windows XP is 12 years old. It’s typical to end service for software as it gets older and technology evolves. Most of us have replaced cell phones and even our cars over the last 12 years – now it’s time to replace your Windows XP computer with a new PC. Or you can check to see if your Windows XP computer can run the new Windows. The Computer Company offers a free evaluation to outline your options and are here to support you as you make your next step.

Help protect your personal files

The Computer Company wants to help your personal files, photos, etc. stay secure. To help ensure they stay secure, you’ll need to either upgrade your Windows XP machine to the new Windows (which may not work) or get a new Windows PC. If you get a new Windows PC we’ll help you migrate your files, photos and music

We’re here to help

If you still need answers, Ccontact the Computer Company about the end of Windows XP support. And if you’re concerned about moving your personal files, photos, music and more when you upgrade, we can help you transfer it.

 Hartford Location

15 Commerce Drive

Cromwell, CT 06416

860.635.0500

800 418 2358

info@computercompany.net

Email Encryption, Leading Industries Through the Maze of Increased Regulation

November 19th, 2013

Email is the most used communication tool in business. It is the greatest asset in enabling organizations to collaborate and share valuable information inside and outside their network. However, email can also be your greatest threat – leaking customer information, intellectual property and other sensitive data that should not leave your network.

Whether it is customer data, partner data or intellectual property, no industry is exempt from the need to maintain the confidentiality and security of sensitive information. In addition, no industry can deny that email continues to be the preferred application driving business communication. Based on these factors, it is no surprise then to see the increase in government regulations calling for the need to encrypt sensitive information in email.

As the market leader in email encryption services, The Computer Company’s encryption solutions mitigate the risk associated with sending sensitive information in email and assist organizations in achieving regulatory compliance by providing email encryption.

  • Healthcare – The burden of complying with HIPAA, the HITECH Act and other federal and state regulations is stressful, but the cost of one breach of electronic protected health information (ePHI) is too high to ignore
  • Finance – With the critical role of email in day-to-day operations and the increasing pressure of federal and state
    regulations, such as the Gramm-Leach-Bliley Act (GLBA), to protect consumer privacy, email encryption is the solution for securing the exchange of sensitive information for financial institutions.
  • Government – To manage the stress of government oversight and maintain public trust, government organization look to email encryption to assist in the protection of sensitive information.

With increasing federal and state regulations governing the security of personal information, many companies outside of these industries are also compelled to secure customer data and protect their businesses from reputation damage, government fines and other costs associated with a data breach.

To learn more about factors impacting your need for email encryption, please contact The Computer Company today for a free demonstration of how simple the product is to use.

The Computer Company, Inc.

Toll Free: 800-418-2358 x 127

Website: www.computercompany.net

Email: INFO@computercompany.net

Dirty Dozen: Top 12 Spam Countries Identified

July 22nd, 2013

Researchers identified the top 12 spam-relaying countries in its “Dirty Dozen” report that analyzed spam volume between April and June of 2013. The analysis determined the extent to which computers in a given country are used for delivering spam.

Three new countries entered the top 12 while several other countries — France, Peru and South Korea — fell off the list. Spam volume in countries sometimes mirrors population.

Spam messages, which are often viewed as unwanted messages pitching pharmaceuticals and pornography, also pose a serious threat. The unwanted messages can include phishing schemes and malware, and spammers have been seen pushing investment scams and other fraudulent activities,.

This season, Germany came in 12th overall for being responsible for relaying 2.5 percent of spam globally. The country is also known for receiving the most malicious spam messages, often laden with malware or links directing users to phishing attack pages. A report issued last year had Germany at the top of the list for pushing backdoor Trojans and other malware linked to the Zeus family of banking Trojans.

Russia is known for being the home of many financially motivated cybercriminal organizations, but it came in 11th overall on the Dirty Dozen list for pushing only 2.6 percent of spam globally. Law enforcement believe it also hosts major money laundering operations associated with credit card theft and malware attacks designed to drain bank accounts. Interestingly, the Republic of Belarus, which borders Russia to the northeast, has the title of having the most spam relayed by proportion to its population.

Italy came in 10th on the Dirty Dozen list for pushing about 2.9 percent of spam globally. Spammers have been quick to jump on news headlines in Italy to get people to open their messages. In 2009, a 6.3-magnitude quake was used as bait in a phishing campaign. Spammers have also used ongoing controversies surrounding Italian Prime Minister Silvio Berlusconi to lure people into clicking on links in the messages.

Argentina is a newly listed member of the Dirty Dozen list, earning the No. 9 spot for pushing 3.1 percent of spam globally. Despite being newly added, the country has aggressive spam laws. The South American country has a government agency that investigates spam incidents and has the power to levy stiff fines against spammers.

Kazakhstan, a Russian speaking country in central Asia, is also a newly listed member. It earned the eighth place title on the Dirty Dozen list for pushing 3.3 percent of spam globally. Malware and phishing are common in spam messages in Kazakhstan and several other top countries, with a correlation between the spam messages and incidents of piracy. Pirated copies of Windows and other un-updated software often contain vulnerabilities that can be exploited by malware attachments in spam messages. Pirated software also often contains malware that can make the system part of a global botnet that spreads spam.

Spain earned the No. 7 spot on the Dirty Dozen list. It pushed 3.4 percent of spam globally. Spain also earns credit for having a large amount of attack messages, spreading worms, ransomware and spyware, according to security experts.

India earned the sixth spot on the Dirty Dozen list for pushing about 3.6 percent of spam globally. Attackers often rent out spam servers for their campaigns and can even design a specific campaign for a region. We recommend users keep their systems patched, including their browser and its components. Antivirus software should also be receiving regular updates.

Taiwan earned the No. 5 spot on the Dirty Dozen List for pushing slightly more than 3.6 percent of spam globally. The list doesn’t explain where the spam originates, only how it gets relayed from spammers to their victims. Systems that are infected with malware are often turned into spam relay systems as part of a global botnet operated by a cybercriminal abroad.

Ukraine is a new entrant on the Dirty Dozen list. The eastern European country peddled 5.5 percent of spam globally, earning it the fourth spot on the list. Ukraine is believed to be the home of a long-running pharmacy spam operation. The spammer behind the operation, known for sending 10 million or more messages daily, uses Chinese Web hosting for the operations and botnets to spread the messages,

China earned third place on the Dirty Dozen list for relaying 5.9 percent of spam globally. China is home to the Vincent Chan gang, an organization ofChinese partners that have been sending spam for years.The Vincent Chan gang, which mainly spreads messages touting online pharmacies, is listed at the top of the list of worst spammers, according to a list maintained by spam-fighting organizations.

The eastern European country of Belarus earned second place on the Dirty Dozen ist. The country has pushed 11.7 percent of spam globally. The country has been at the top of similar lists in the past. The country is responsible for relaying more than 3 million spam messages per day.

The United States retained the spamming crown on the Dirty Dozen list, sending 13.8 percent of spam globally. The U.S. population and its robust Internet connectivity help it retain the leadership position. Three spammers that are on the worst spammer list: Quick Cart Pro, Yair Shalev and iMedia Networks. Quick Cart Pro, an operation with ties to Russia and Canada, promotes fake pharmaceuticals. Yair Shalev, a high-volume spammer, uses the showshoe method to send messages, spreading out spam across many IPs and domains, in order to dilute reputation metrics and evade filters, and iMedia Networks, operated by Michael Lindsay, is a spam-hosting operation serving bulletproof hosting at high premiums to well-known spam gangs.

If you want to protect your network from Spam please contact The Computer Company at

800 418 2358

To learn more please go to our website

http://www.computercompany.net/Networking_Security.htm

 

 

By Robert Westervelt, CRN

Quad Backup the Total Solution

April 18th, 2013

Quad Backup the Total Solution

On-Site Backup
for all your PCs, Servers and Network Devices using the Quad Backup
Solution. We provide all the software, hardware and storage you will need for
your company’s data on your local network. Any or all of your local data can be
restored in seconds.

Off-Site Backup
Once your company’s data (including bare metal server and pc backups) is stored
on your local network, Quad Backup will automatically move a continuous stream
of data to a triple redundant cloud storage facility. In the event of a local
natural disaster (fire, tornado, hurricane, etc.) your company’s data will be
safely stored in our secure data centers restored in seconds.

Free US Based Technical Support
Once your Quad Backup System is configured you can obtain unlimited US based
technical support by calling our help desk support line at 800-418-2358 We
pledge to help and assist you with the Quad Backup so that you can setup,
configure and recover data anyplace in the world. 95% of the time we connect to
your Quad Backup System with remote assistance

3-Year Hardware Warranty
If anything goes wrong with your Quad Backup System we will provide you
hardware for free! We have replacement systems on hand and we are ready to
re-configure your system on a moment’s notice.

No Recovery Fees
With the Quad Backup System your company’s information will be backed up
locally and globally in multiple locations. There is no fee for recovery of
your data using the array of recovery tools available through Quad Backup!

Data Deduplication & Local Compression
Compression Data deduplication and compression occurs prior to data storage and
transmit using state-of-the-art technology. This ensures that backups are
completed in a shorter timeframe; less storage space is used on the on-site NAS
and at the off-site data centers, and needed bandwidth to transfer data
off-site remains manageable

Bare MetalRestoration Locally or Globally
Quad Backup Provide your company Virtual Machines that allow you to quick spin
up stored bare metal backups and restore them to a Virtual Machine.

Virtual Server Snapshot Storage and Recovery
The Quad Backup Service allows for full virtual machine (VM) storage and serves
as a “Hot Hypervisor” in the event your production environment is not working.
This allows your organization to easily spin a full snapshot of your server to
a live environment. Quad Backup provides full data continuity for your company!

Message-Level Exchange Recovery
Quad Backup saves your email messages at the “Message Level” allowing you to
fully backup and restore your Exchange Server on a local basis. Quad Backup
fully backs up your email server and ensures your company is fully compliant
with most email archiving laws.

Application and Database Recovery
Quad Backup conducts “Full Metal Backups” of your servers including your
applications and databases. These backups can be restored in full or can be
partially restored including files, databases, applications, etc. This approach
to system restoration provides your company with maximum flexibility

Instant On-site and Off-site Virtualization
The Quad Backup Devices serves as an instant virtualized server! The latest
copy of your backup can be spun up to act as a virtual server allowing your
company to continue working even though your production environment is down. In
the event of a major catastrophe, you can call the Quad Backup Support Team who
can provide you remote access to your data through remote desktop access! No
matter what the situation, Quad Backup has you covered!

Buy Back Policy
If you purchase a Quad Backup Device and the system reaches capacity (too much
data, your business grows, etc.) within one year of your purchase, we will buy
back that device and give you the next model up for ½ the cost. You must
purchase the next level (model) device but this guarantee assures that we have
your interest at heart.

Want to learn more. Please contact us or become a Dealer. Want  a live demo. Quad Backup the Total Solution

25% of Americans Were Victims of Security Breaches in Past Year

October 1st, 2012

25% of Americans Were Victims of Security Breaches in Past Year

This is re-posted from:
October 1, 2012 by Samantha Murphy

One in four consumers in the United States had personal
identification lost or stolen due to a data breach in the
past year, a new study suggests. Twenty-five percent of
Americans have received a notification by a business, online
service provider or organization that personal information such
as passwords or credit card numbers were subject to a data
breach, according to the study conducted by National Cyber
Security Alliance and security firm McAfee for National Cyber
Security Awareness month.

The news comes as various companies from LinkedIn, eHarmony,
Internet radio platform Last.fm and Dropbox have had data
compromised in recent months.

With this in mind, about 90% of Americans said they do not
feel completely safe from hackers, viruses and malware on the
Internet. Consumers feel far more secure on smartphones — in
fact, about 63% said they believe their mobile devices are
protected against hackers. But since 57% said they never back
up their devices by storing information or data elsewhere and
63% don’t use security software or apps to protect against
viruses or malware, there is a disconnect on feeling secure
and being secure, McAfee said.

“Similar to keeping ourselves healthy, Americans are aware
that they need safe and secure Internet-connected devices,
but they aren’t keeping up with the required actions to stay
safe online,” the company said on its blog.

 

 

 


			

Go Daddy-serviced Web sites go down; hacker takes credit

September 11th, 2012

According to Cnet.com,

Web sites serviced by DNS and hosting provider Go Daddy were down for most of today, but were back up later this afternoon. A hacker using the “Anonymous Own3r” Twitter account claimed credit for the outage.

“Things are restored,” Go Daddy spokeswoman Elizabeth Driscoll told CNET just before 5 p.m. PT today. She said she did not have many details and was hoping to be able to give an update with more information in the next 24 hours.

In an interview this afternoon, Driscoll reiterated that she could not say what the cause of the outage was, and that she could neither confirm nor deny claims made by the owner of a Twitter account affiliated with the Anonymous online activist collective who has boasted of causing the outage with a distributed denial-of-service (DDoS). She also said she could not say how many sites were affected, whether it was thousands or millions, or whether the outage had affected just sites hosted by Go Daddy or those who use its DNS services as well. She did say the outage started just after 10 a.m. PT today.  Read article here.

In The News: Possible massive data breach of Visa-MasterCard accounts under investigation

March 30th, 2012

A massive data breach of a payment-card processor’s network could involve more than 10 million compromised card numbers, according to security news writer Brian Krebs in his online posting today.

The name of the payment processor is not disclosed, but Krebs writes that Visa and MasterCard began alerting banks across the country and warning that specific payment cards may have suffered fraud because of the alleged breach. MasterCard today did confirm that it is in the midst of an investigation regarding a potential breach. Visa indicated it would shortly release its own statement on the matter.

MasterCard issued a comment, saying it’s “currently investigating a potential account data compromise event of a U.S.-based entity and, as a result, we have alerted payment-card issuers regarding certain MasterCard accounts that are potentially at risk. MasterCard is concerned whenever there is any possibility that cardholders could be inconvenienced and we continue to both monitor this event and take steps to safeguard account information. If cardholders have any concerns about their individual accounts, they should contact their issuing financial institutions. Law enforcement has been notified of this matter and the incident is currently the subject of an ongoing forensic review by an independent data security organization. It is important to note that MasterCard’s own systems have not been compromised in any manner.”

Full Article can be read at: Network World