Computer Keyboard with symbolic padlock key

Almost every business has a daily need to go online and interact with the internet, but to do this safely you need a little bit of browsing know-how.

Whilst most websites are relatively secure, it’s difficult to guarantee just how secure they are. And seeing as even government websites can be hacked, how do you know that, for example, that customer maintenance portal you have to log on to daily hasn’t been hacked for dubious means?

Avoiding this sort of scenario is crucial for your business to run smoothly, so I’ve prepared 6 tips to help you browse online safely and securely.

1. Use HTTPS Security

If a website is truly secure then its web URL should start “HTTPS:” and the “S” at the end stands for secure – provided by secure sockets layer (SSL) security. Conversely, if the web URL only starts “HTTP:” then the security behind it will be much less and can’t be taken for granted.

2. Avoid Public WiFi

NEW YORK, NY - JULY 11: A free Wi-Fi hotspot beams broadband internet from atop a public phone booth on July 11, 2012 in Manhattan, New York City. New York City launched a pilot program Wednesday to provide free public Wi-Fi at public phone booths around the five boroughs. The first ten booths were lit up with Wi-Fi routers attached to the top of existing phone booths, with six booths in Manhattan, two in Brooklyn, and one in Queens. Additional locations, including ones in the Bronx and Staten Island, are to be added soon. (Photo by John Moore/Getty Images)

Public WiFi may provide a fantastic service and serve many happy consumers, but unfortunately these networks have a less than amazing level of security protecting them. And hackers are able to easily infiltrate these networks with basic software to hijack the personal data of those accessing the public network.

3. Don’t Click on Phishing Websites

Phishing is a contemporary threat to your data and appears to be showing no signs of going away soon. This is why you need to be on your guard about phishing websites as they can be deceptive beasts at the best of times.

Links to these websites are usually emailed, but whilst the link may appear to seem innocent, it’s possible to engineer a link which reads www.amazon.com but redirects you to a different (and more dangerous) website.

This puts you at risk of infection and having your networks breached, so double check any suspicious links by hovering your mouse cursor over them to get a preview of the true web address.

4. Update Your Browser

Keeping your software up to date is vital to ensure that you’re well protected against hackers who have discovered vulnerabilities in that piece of software. And web browsers are no different, in fact, once support for out-dated web browsers is discontinued, hackers will discover vulnerabilities very quickly.

Therefore, it’s essential that you install all patches and updates as soon as possible to keep your browsing activity protected.

5. Disable Stored Passwords

Although activating the ‘store your passwords’ option may feel as though it’s going to make forgotten passwords a thing of the past, it can actually cause more trouble than it’s worth. You see, if your system becomes compromised by hackers, they can then access all your store passwords.

And the best way to avoid this is to work on a little bit of memory training to remember your passwords!

6. Have a Strong Arsenal

maxresdefault

Perhaps the best way to browse online safely and securely is to arm yourself with the best defenses possible. And the more defenses the better.

So, instead of just securing your network with a state of the art firewall, why not try adding in state of the art email filtering? And, you know what, if you also install web filtering software on top of that, you’re going to find your data becomes safer than ever before.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


_90722534_gettyimages-482017518

In order to avoid being detected and cause maximum damage, hackers are constantly enhancing their tools and the Project Sauron malware sets a new high.

An enigmatic piece of software, no one has been able to identify who designed Project Sauron and this underlines its sophistication. However, it’s such a complex piece of coding that researchers believe it must have originated from the hands of a top level organization.

The malware has been discovered on computers in locations such as Iran, Russia and China, so there are murmurings of the US government having an involvement and this wouldn’t be the first time. At present, however, the true creator is unknown.

Malware is ever evolving, though, and there’s no saying that Project Sauron won’t have its targets realigned at the US in the future, so let’s take a look at exactly what it does.

What is Project Sauron?

internet-explorer-zero-day

Referred to, in the trade, as an Advanced Persistent Threat, Project Sauron is an intricate piece of malware with a keen emphasis on espionage. And Project Sauron is so clever at disguising itself as an array of standard Microsoft files that it has gone undetected for up to five years.

Project Sauron is particularly sophisticated and effective as it utilizes the following features:

  • Targets PC’s memory without infecting the hard drive to aid its concealment
  • Unknown operating system functions help to facilitate persistent attack techniques
  • Project Sauron can spread through networks by exploiting legitimate software distribution channels

It’s these novel approaches to hacking that has allowed Project Sauron to infiltrate multiple government organizations around the world, but what exactly does it do?

Project Sauron’s Hidden Threat

022315-detect-malware-1-100569113-gallery.idge

Project Sauron is packed full of technical threats and carries these out on a maximum stealth setting. In particular, the malware focuses on the following areas:

  • Through the use of a back door exploit, Project Sauron allows the hackers to spy on password filter systems to harvest network passwords and gain widespread access
  • Once the infection has taken hold, Project Sauron can steal files and transmit them back to the source of the malware
  • Project Sauron can steal encryption keys to help ensure that a network is compromised to its maximum level
  • In extreme cases, Project Sauron can infect USB drives to help facilitate the infection of ‘air-gapped’ computers which are not connected to the network

Due to its ambitious nature and complex build, Project Sauron has been able to stealthily operate in the background for several years; it’s this long term nature of the attack which is particularly troubling as it means that huge swathes of data have been compromised in this time.

Final Thoughts

 Project Sauron sure is an advanced threat and one that even the experts are struggling to deal with. As ever, though, the best way to protect your business from malware attacks such as Project Sauron is to practice caution when dealing with data coming into your network.

However, when you consider the possible perpetrators behind Project Sauron, you do begin to wonder just how secure your data can be. By paying attention to the basics of good cyber security, though, you’re providing yourself with the best level of defense to protect your business.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


glassrat trojan

We all know that trojan viruses are the masters of stealth when infecting systems, but the GlassRAT Trojan may just be the stealthiest trojan yet.

We’re constantly advised to be on our guard against ‘zero day vulnerabilities’ which are brand new viruses that attack software before the vendor is aware of a breach. However, what many of us aren’t aware of is the threat of zero detection malware threats.

In the case of the GlassRAT Trojan, it’s been stealthily operating since 2012, so that’s over three years of security carnage it’s been able to quietly carry out. Obviously, this new form of security threat is something you need to be aware of, so let’s take a look at it.

What is GlassRAT?

The GlassRAT Trojan appears to be undetectable by most antivirus programs and this is due to it being signed with a seemingly legit digital certificate. However, the digital certificate is far from legit as it looks as though it’s been ‘borrowed’ from a separate Chinese software company.

The Trojan seems to have been targeting Chinese nationals working at multinational companies and infiltrates security systems with its digital certificate. The ‘dropper’, which delivers the Trojan via a fake Flash installation, erases itself from the system once it has installed its malware.

The malware is then clever enough to avoid detection by standard security scans and proceeds to carry out the following cybercrimes:

  • Transfer unauthorized files
  • Steal data
  • Transmit information about the victim’s system

Given that GlassRAT has been operating for three years without trace it represents a significant threat to data security.

Who’s Behind  the GlassRAT Trojan?

It’s suspected that GlassRAT originated in China due to its targeting of Chinese nationals and the stolen Chinese digital certificate, but this is purely speculation at present and, perhaps, seems a little too obvious.

From the limited information available, it may be possible to link the GlassRAT activities with previous malware attacks. Previous cyber-attacks on Mongolian and Philippine authorities used two domains which are also connected with GlassRAT, so investigations continue to look into this as a possibility.

However, at present, the creators of GlassRAT are still at large and it’s fair to say they have had plenty of time to cover their tracks.

How Do You Combat Threats Such as GlassRAT?

18312140_l

The enigmatic nature of the GlassRAT trojan certainly makes it a difficult beast to protect against. However, businesses can help their security efforts by ensuring they follow basic security procedures such as:

  • Monitoring all incoming files
  • Training staff on the dangers of unknown attachments.

Although GlassRAT is very difficult to detect, it’s not impossible. By arranging detailed network forensics to be carried out on your systems, zero detection malware threats can be uncovered. This approach will highlight any suspicious activity to identify any particularly deceptive malware.

The question, though, that remains is: just what else is stealthily lurking on our systems and putting vast quantities of data at risk?

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Google-Fiber

Google Fiber promises super fast broadband, but it remains out of reach for many people. However, it now looks as though it will shortly debut in San Jose.

The days of conducting business over a 56k dial up modem seem like a lifetime ago and in the last decade the speed offered by broadband has rapidly increased. It may seem as though it can’t get any quicker, but believe me it can! And it’s all thanks to ‘gigabit internet’ services.

Google, always at the forefront of internet technology, has been working on Google Fiber for the last 5 years and it promises a huge connection speed of 1,000 megabits per second. Despite first launching in 2011 expansion has been slow, but it’s strongly rumored that it’s debut in California will be in San Jose.

Let’s take a look at exactly what’s known about this launch and what it means for your business!

The Rumors Behind San Jose’s Launch

GoogleFiber

Despite there being no official announcement over Google Fiber’s expansion into San Jose there remains many indicators that it’s almost a done deal.

Perhaps the biggest shred of evidence is that Google has already got the ball rolling by applying for planning permission to construct two ‘Fiber Huts’ – these buildings house all the fiber optic equipment necessary to provide the regional network with gigabit access. And there are also proposals to build a further 8 in the city which would indicate a very strong drive to make Google Fiber a viable option.

Google has been discussing their plans for Google Fiber with city officials for some time now, but it had been difficult to reach a compromise. As a result, the discussions had broken down on at least two occasions leaving the move in jeopardy. However, it appears that progress has been made and the noises from City Hall point towards an announcement towards the end of November.

Why Will Google Fiber Be a Big Deal?

kQSlvYr

Google Fiber, then, seems to be on its way to San Jose, but what benefits is this going to bring to businesses in the city?

  • It will far outstrip the services currently provided in the area. At present the quickest internet service offered in San Jose is 250 megabits through Comcast.
  • The speed offered by Google Fiber will make cloud computing more viable due to the increases in accessibility and speed of available cloud services.
  • Video conferencing will become more accessible and will increase the potential for workers to work from home and connect with geographically separated colleagues like never before.

Google Fiber Is Only a Matter of Time

Google Fiber in San Jose feels as though it’s only a matter of time and I wouldn’t be surprised to see it launch in 2016. And if it does then it’s going to be incredibly exciting for the residents and businesses in the city. The potential to improve their digital lives is huge and promises to make dramatic changes to the way we do business.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


serveimage (4)

When your hard drive crashes you’re at risk of losing a lot of data, so learning why hard drives crash is vital for preventing this and recovery of data.

Hard drives, like almost any product containing electrical or mechanical devices, are prone to failure. And they always seem to pick the worst moment to fail e.g. in the middle of running a huge report!

Let’s take a look at exactly how hard drives can crash to get a better understanding of what’s happening to your hardware.

Hard Drive Head Crash

SAMSUNG

Hard drives store their data magnetically on a rotating platter and this data is transferred or extracted from the platter using a read-write head.

In normal operation this read-write head effortlessly glides along a surface of air just above the surface of the platter which is made up of two protective layers.

This confers protection to the fragile data held on the hard drive, but unfortunately read-write heads can easily scratch through these layers as a result of the following:

  • Wear and tear to the read-write head can cause it to drop
  • If the drive is dropped when running the read-write head can be forced into the drive
  • Debris entering the hard drive can damage the surface

The most obvious way to spot this fault is by the clicking noise the hard drive will create as it tries to run as well as visible scratches on the platter’s surface.

Spindle Motor Failures

serveimage (6)

Hard drives spin at remarkably high speeds (with an average RPM of 7,200), so it’s no surprise that the spindle motor which spins the hard drive undergoes excessive stress over its lifetime. This is why the spindle motor is prone to failing and why you’ll struggle to interact with the hard drive as a result.

This type of failure, again, will be characterized by clicking and whirring sounds as the hard drive struggles to operate in its normal fashion.

Electronic Failure

serveimage (7)

Hard drives, of course, aren’t 100% mechanical devices. Our old friend electricity is also pulsing through the veins of hard drives. And this sets up hard drives for a particularly heavy crash.

You see, there’s a printed circuit board (PCB) in between the hard drive and the rest of the computer. It helps send information to and from the hard drive so that you can use all the functions of your computer.

Electricity, though, is a powerful source of energy and can often damage the PCB due to power surges; this leads to a total breakdown in communication for your computer and is characterized by a non-responding hard drive and those clicking sounds as motors fail to startup.

Logical Hard Drive Crash

serveimage (8)

Finally, we have a type of hard drive crash caused by non-physical means which makes pinpointing the source of trouble very difficult.

Hard drives need data to run correctly, so if this data is slightly corrupted then you’re going to struggle to even boot up your system.

But how does data become corrupted?

Well, there are several ways that this can happen:

  • User error e.g. deleting essential system files
  • Viruses can cause hard drives to crash within seconds of turning on
  • Driver issues can cause hard drives to perform erratically
  • Software malfunction

Hard drives, therefore, can crash for a number of physical and non-physical reasons, but by looking for the signs and understanding your computer’s history you should be able to get closer to repairing the hard drive.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More