Cloud storage continues to grab the headlines with all manner of head turning statistics, but this doesn’t mean that offline storage is now redundant.

Ease of access, scalability and high levels of security are just three of the many reasons why cloud storage has become the go to solution for data storage. As a result, in many people’s eyes, offline storage appears clunky and outdated in comparison. However, offline storage solutions – no matter how old fashioned – remain relevant to businesses in 2023. It’s simply a case of understanding why you should implement them into your storage schedules and the best ways to achieve this.

What is Offline Storage?

In its simplest terms, offline storage is data which is not connected to your network or accessible by the internet. Cloud storage solutions – including mainstream services such as Google Drive – all require one key element to grant access to their users: an internet connection. Therefore, a storage solution which isn’t accessible by the internet is classed as offline storage. Examples of offline storage options include:

  • External hard drives
  • USB flash drives
  • Optical media such as Blu-Ray and DVD
  • Magnetic tapes (still in use, but less popular compared to more modern solutions)

Why Do You Still Need Offline Storage?

The wonders of cloud storage may be cutting edge and deal with an old problem in a new way, but offline storage remains crucial for the following reasons:

  • Multiple backups are critical: relying on a single data storage solution is a recipe for disaster. Say, for example, your cloud storage provider is hacked and all your data is encrypted or, worse yet, wiped from the servers, this is going to cause you major continuity issues if this is your only backup. However, with offline storage options in the background, you are significantly reducing the risk of your productivity dropping to zero. The 3-2-1 backup method is the best approach to adopt and could save your organization.

Final Thoughts

Cloud storage is clearly an exciting and effective option when it comes to data storage in 2023, but it should not be considered the only option. Instead, it’s vital that businesses understand that a multiple backup approach, which utilizes both online and offline storage, is the surest way to keep data safe.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


There’s a lot of money to be made in hacking and threat actors are now turning it into a business with Ransomware as a Service (RaaS).

Ransomware, of course, is well known to anyone who steps online in the digital age. With the ability to encrypt your data and demand a ransom fee, it has not only generated headlines, but also caused significant headaches for business owners. And, with ransomware attacks increasing by 41% in 2022, it’s a strategy which is showing no signs of slowing up. Therefore, not only do you need to be aware of ransomware, but you also need to keep up with associated developments such as RaaS.

As RaaS has the potential to create attacks which are both wider ranging and easier than before, it’s crucial you understand how it operates

The Basics of Ransomware as a Service

We’re all aware of what ransomware is, but what is RaaS? After all, surely ransomware is the opposite of a service? Unfortunately, for PC owners, ransomware software and attacks are now available for hire in the form of RaaS. Similar to Software as a Service (Saas) – examples of which include Gmail and Netflix – RaaS allows threat actors to harness the power of hacking tools without having to design them. If, for example, a threat actor doesn’t have the time (or skills) to build a ransomware tool, what do they do? They purchase one.

Typically, RaaS kits are found on the dark web, so don’t expect to find them taking up space on Amazon. Depending on the sophistication of the RaaS, the cost of purchasing them can range between $30 – $5,000. Threat actors looking to purchase RaaS are also presented with several different purchasing options such as one-time fees, subscription tiers or even affiliate models. It’s estimated that over $10 billion exchanges hands each year – mostly in cryptocurrency – for RaaS kits.

Examples of RaaS include Black Basta, LockBit and DarkSide, with more available for those looking to unleash ransomware easily and quickly. These RaaS kits are also much more than just hacking software, they also offer user forums and dedicated support teams to help customers get the most out of their ransomware. Again, this is very similar to the way in which successful SaaS developers provide extra value for their product. However, whereas SaaS is provided by legitimate developers, RaaS tends to be created by criminal gangs with the sole intent of generating illegal funds.

Staying Safe from Ransomware as a Service

The end result of an RaaS attack is the same as a standard ransomware attack, so there’s nothing specific you need to do if an attack comes through RaaS. Instead, you just need to stick to good old fashioned ransomware security practices:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


What exactly happened when LastPass, a password manager service, found itself at the center of a data breach? And what does this mean for your passwords?

Password managers provide a convenient service, one where complex passwords can be generated instantly and then, going forward, auto-fills when requested. LastPass is a successful example of what a password manager can do, but it’s a role which comes with great responsibility. Login credentials, after all, are often the difference between gaining access and being denied access to a user account. Therefore, password managers need to be sure the credentials they hold are highly secure.

However, as LastPass users are now finding out, password managers are highly tempting to threat actors, and far from 100% secure.

How LastPass was Hacked

Used by millions of users all over the world, LastPass has established itself as one of the leading password managers. Unfortunately, this credibility has been rocked by revelations that the service’s encrypted password vaults have been stolen by hackers. The attack – which took place in August 2022 – was ambitious, and its success even more so.

LastPass’ backup copies of their users’ password vaults were stored, apparently securely, on a third-party cloud storage platform. This, in itself, is nothing unusual; storing backup copies of secure data in remote locations is good practice. Nonetheless, once third parties become involved in storing your data, you relinquish control of this data’s security. And this is exactly where LastPass has fallen victim to threat actors.

While the mechanics of the breach remain under wraps, LastPass has had to admit that personal identifiers – including addresses, phone numbers, credit card details and IP addresses – are among the stolen data. The password vaults – which are encrypted – have also been stolen, so this means the threat actors are closer to knowing your password. And, given they now have access to your personal identifiers, it makes brute force attacks easier.

What to Do if You’re a LastPass User

LastPass has been keen to stress that, although stolen, the password vaults are secure due to the encryption protecting them. However, these encrypted passwords are now in the hands of an unauthorized party and means they are seriously compromised. Therefore, it’s crucial all LastPass users take the following decisive actions:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Despite experiencing a major obstacle a year ago, in the form of Google’s anti-malware efforts, the Glupteba malware is back.

First discovered in 2011, Glupteba is a veteran of the malware scene, although one which goes through periods of intense activity before disappearing for years at a time. A classic botnet, Glupteba has always focused on stealing data, but it has also made sure it has a backup plan in the form of targeting router exploits. Therefore, the news of its re-emergence is troubling for your IT infrastructure. And, given that Glupteba has been updated to be even stronger than ever before, you’re going to need to be on high alert.

Thankfully, we’re on hand to look at this malware and provide some critical advice on how to protect your organization.

Glupteba’s Latest Campaign

Following Google’s disruption of Glupteba’s botnet, which operated on the blockchain, Glupteba went quiet for several months. However, in June 2022 it was discovered that a new campaign had been launched, one which remains active as of this time of writing. Glupteba’s latest strategy targets Windows devices and has set its sights on harvesting data, using infected devices to mine cryptocurrency and setting up unauthorized proxies.

Glupteba is transmitted via traditional infection methods which include malicious installers (typically promoting themselves as free software installers) and through malvertising campaigns. As Glupteba is blockchain enabled, this gives it the ability to constantly change the command and control servers it uses. And, as it uses blockchain transaction data (which cannot be erased) to facilitate its attack, it’s very difficult to make a dent in the power of Glupteba’s botnet. These attacks often employ TOR services as well, a move which makes tracing the attacks next to impossible.

Staying Safe from Glupteba

One word in particular keeps being used when discussing Glupteba’s latest campaign: resilient. The source of its resilience comes from its design, one that uses deception and stealth to protect its operators and ensure it continues to spread. But this doesn’t mean you need to fall victim to Glupteba. If you make sure you follow good cybersecurity practices, you should be able to keep your IT infrastructure safe. All you have to do is:

  • Understand the threat of malvertising: the internet is full of malicious adverts, but there are ways you can make your PC safer. The simplest way to do this is by installing an ad-blocker, these will block both irritating and malicious adverts, so it’s a win-win situation. Malvertising is also known to use exploits to spread its payload, so you need to make sure your browsers are fully patched and up to date.
  • Monitor network activity: as Glupteba is a botnet, its operations are likely to lead to a spike in network traffic. And, if unauthorized proxies have been set up, this network activity is likely to go stratospheric. Therefore, you need to keep your network activity monitored to help you analyze any anomalies which may act as an early warning system.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Boxcryptor, which adds local encryption to files, is the perfect solution for ramping up file security. But now it’s being retired, where should you turn?

Starting its journey in 2011, Boxcryptor has spent over a decade providing enhanced security to cloud-based storage systems. And, for many organizations, it has proved to be a godsend in terms of file security. If, for example, you store files on a Google Drive account, they are secure to a certain degree. However, the problem is that Google still has access to the files. But this is where Boxcryptor has proved so useful, users are able to encrypt files stored in the cloud and prevent unauthorized access.

Unfortunately, since Boxcryptor was acquired by Dropbox, it has been announced that the Boxcryptor service will be discontinued. Accordingly, this has left its users scrambling for an alternative solution.

The Alternatives to Boxcryptor

It’s crucial that you retain control over the security of your files, especially those that are stored in the cloud with a third-party provider. Therefore, if you are currently using Boxcryptor, we would recommend looking into these alternatives: · Sync: Providing storage plans ranging from 1TB to unlimited storage, Sync represents a fantastic solution when it comes to storing files online. Users are able to store and share files securely thanks to the strong privacy put in place by Sync’s encryption methods. Not only can access be controlled on a granular level and expiry dates applied to specific files, but users of Sync are able to access these files from any location and on any internet compatible device.

  • IBM Security Guardium Data Encryption: IBM’s Security Guardium represents a useful alternative to Boxcryptor and comes packed full of security features. Capable of being used in databases including Microsoft SharePoint, SQL Server, Unix and NAS, Security Guardium offers high level encryption alongside multi-specific access privileges to meet the needs of your organization’s infrastructure. Security Guardium also prides itself on its real-time activity monitoring, a function which ensures that any unusual activity is instantly identified.
  • ESET Endpoint Encryption: a data security suite which promises to “protect your data, both at rest and in transit” Endpoint Encryption is an amazing option for replacing Boxcryptor. Endpoint Encryption has the capacity to encrypt not only individual files, but also entire drives to help maximize your file security. As well as encrypting files, Endpoint Encryption can also create virtual drives which are encrypted and the application’s server takes care of controlling access privileges.
  • Dell Encryption Enterprise: already known for having a reputable background in IT solutions, Dell bring their Encryption Enterprise application to the table as a viable alternative to Boxcryptor. Boasting military grade protection, Encryption Enterprise delivers a premier level of encryption through its Full Volume Encryption technology. This solution can be applied to both system drives as well as external drive, a situation which ensures your data is protected no matter where it’s located.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More