The aim of most hackers is to be discreet, but there’s almost always a tell-tale sign they’re at work. You just have to know what you’re looking for.

Damage limitation is an essential part of cyber-security and, accordingly, the sooner you realize you’ve been hacked, the sooner you can get to work on rectifying the issue. Establishing that you’ve been hacked, however, isn’t always straightforward. Hackers are well known for their stealthy attack strategies, and, in many cases, you’re unlikely to realize that you’ve been hacked. You may, instead, simply think that your network is experiencing technical problems, and that’s why you can’t access your files, or why your PCs performance has ground to a halt. But you also need to consider that you may have been hacked.

How Do You Know You’ve Been Hacked?

There are several clear giveaways that your organization’s digital defenses have been breached, and here are five of the most sure-fire ways to know you’ve been hacked:

  1. Your Files are Encrypted: your day-to-day IT activity will likely center around the regular usage of files e.g. Word documents and Excel spreadsheets. But what happens when you can’t access these? Firstly, your organization’s productivity will plummet and, secondly, it could indicate that you’ve been the victim of ransomware. If your files are encrypted and a message is received demanding a ransom fee to decrypt them, then you’ve been hacked.
  2. Unusual Network Activity: regular traffic patterns should be easily identifiable on your network logs, but anything unusual should be closely scrutinized. Modern hacking methods often find malware communicating with remote locations to transmit information or download further malware. Therefore, any unknown locations that are delivering or receiving data from your organization need to be investigated.
  3. Persistent Pop-Ups: there’s nothing more irritating than a pop-up window when you’re trying to work on something. But when these are regularly popping up, when they shouldn’t be, there’s a good chance you’ve been hacked. Often, these pop-ups will try to convince you to perform an action, such as downloading an anti-malware app due to an infection on your PC. These, of course, are fake and are simply a devious strategy to get you to download further malware on to your PC.
  4. People Ask You If You’ve Been Hacked: one of the most obvious signs that you’ve been hacked is when people start asking you if you’ve been hacked. And this is because malware often hijacks email accounts to help spread spam. As a result, people you know – who are listed in your email address book – will be receiving spam messages direct from your email account. Naturally, these unusual messages will ring alarm bells with the recipients, and they are likely to check in with you to confirm if your email account has been hacked.
  5. Your Credentials are Available Online: hackers like to make money by harvesting valuable login credentials, these can then be sold to other hackers who want to breach security measures and gain quick, unauthorized access to private networks. Thankfully, applications such as Google’s Password Manager can warn you when these credentials turn up in password dumps, this is a good sign to immediately change all your passwords.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


2018 has been a year where malware, ransomware and data breaches have barely been out of the headlines, but what’s in store for cyber-security in 2019?

As long as there’s a digital landscape, hackers will continue to launch an array of attacks that take in numerous different techniques. And, most importantly, they will continue to evolve their methods to avoid detection and cause more damage to networks and the PCs on them. With this in mind, it’s perhaps the best time to take a look at the security trends which will be most important for your organizations defenses next year.

To help you get prepared for next year, we’re going take a look at some of the major security trends to look out for in 2019.

Backups will continue to be Crucial

With ransomware still remaining a prevalent and major threat to secure and essential data, backing up your data regularly and rigorously will be a vital task for all organizations. Backups may seem a costly affair in terms of budget and time, but it only takes one employee to fall victim to a ransomware scam for your entire network’s data to be compromised. And with new ransomware scams such as Zenis deleting backups, it’s essential that offsite and non-network backups are also held.

Coinminer Malware Remains a Threat

Cryptocurrency is still a lucrative business and mining for cryptocurrency continues to generate large amounts of cash. However, whilst this is perfectly legal and above board, the use of coinminer malware is far from legal or ethical. Due to the amount of processing power involved in mining for cryptocurrency, hackers are using malware to enslave PCs remotely and using their processor power to mine for cryptocurrencies. This form of malware has become harder to detect and more sophisticated throughout 2018, so expect it to evolve further in 2019.

The Hacking of IoT Devices will Increase

Close to 27 billion IoT devices will be connected in 2019 – an increase of nearly 3 billion compared to 2018 – so you can bet your bottom dollar that the number of attacks in this arena will increase accordingly. Unfortunately, many owners of IoT devices are still neglecting to change the default password to access these devices and this is giving hackers free rein to take control of them. Not only does the default password debacle remain an issue, but hackers are now designing malware to take advantage of vulnerabilities in IoT devices.

Security Training

Due to the threats already presented, security training will become paramount in 2019. As hackers evolve their methods of attack at a rapid pace, keeping your organization’s staff aware of these threats is one of the best forms of defense you can employ. Awareness training hammers home the basics of good security practices and you’ll find that these can also be used to combat the new threats which will no doubt go head to head with your security defenses.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Data backups are crucial when it comes to protecting your data; it’s even more important to ensure that your backups are kept secure and available.

For many people, having data backed up is enough. However, what they fail to understand is that a backup is not infallible. In fact, there are a whole range of issues that could affect the stability of a backup. And, if your organization is in the midst of a data disaster, the one factor above all else that you should be concentrating on is security. Your backup, after all, is your lifeline to resuming productivity, so it should be as secure as possible.

To get you started, we’re going to look at the five best ways to secure your backups:

  1. Password Protect Your Backups

At the very least, you have to make sure that your backups are password protected. While, yes, it’s possible for a password to be cracked, it still acts as a deterrent and guarantees some level of security. The stronger the password, of course, the more protection you provide to your backup, so make sure that it’s unique and contains a mixture of uppercase, lowercase characters and numbers.

  1. Restrict Backup Access Rights

The more people that have access to your backups, the more risk there is that they could be compromised or damaged. Therefore, you should only ever assign access rights to the backup software to those members of staff who genuinely need it. Nominating those with access in advance will help to not only protect your backups, but also ensure that restores are completed quickly if the need arises.

  1. Integrate Encryption

There’s every chance that your entire backup could be snatched in the case of a data disaster, so it’s vital that it’s protected. After all, your backup is likely to contain data pertaining to your customers/staff and this could be highly sensitive. However, by encrypting the data contained within your backup, you’re rendering it next to useless in the hands of external parties.  Along with password protection, it’s a simple yet highly effective layer of defense.

  1. Store Physical Backups in a Safe

Although we live in an age where cloud backups are grabbing all the headlines, it’s still important that physical backups are also maintained. These can include: DVDs, optical disks and data tapes. Naturally, due to the data contained on them, these storage methods represent a high security risk and can’t just be stored on a shelf. The best solution is to invest in a safe, but make sure it’s fireproof as high levels of heat can easily distort and damage physical storage devices.

  1. Log all Backups

Most backup software will log details of the backups carried out, but when it comes to working with physical backups it’s a little different. As your physical backups will be stored somewhere, there needs to be a logging process of what is going where. It’s very easy for a single DVD to go missing, but, with a logging system in place, you should discover this sooner rather than later.

For more ways to secure and optimize your business technology, contact your local IT professionals.

 

Read More