Posts

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

Read more

IT Services in Miami Can Help Prevent Non-Malware Attacks

Security from Many Different Angles

IT services in Miami must deal with multiple kinds of security in order to present clients with the most effective, reliable, and trustworthy IT. There must be physical security in the form of passwords and password protections. Additionally, there must be digital security in the form of anti-viral and anti-malware programming. From there, you’ve got to have proactive monitoring, which keeps an eye on software usage over a network and can help determine that which is malicious and that which is normal.

Anything beyond the normal is flagged, and from there security protocols are invoked. A final category that MSPs must watch for is the non-malware attack, which can hide inside operations that look otherwise normal. Your business must understand what non-malware attacks look like and how to offset them.

An Example of Non-Malware Hacking

In a nutshell, a non-malware attack is a hacker using tools to cleverly manipulate a system’s built-in hardware protocols for the means of cybercrime. It often looks something like this:

  • An employee sees a message that prompts them to go to a certain website on a third-party browser like Firefox. Usually, this is spam that has been disguised.
  • Once on the cyber criminal’s page, Flash loads – a program with near-endless vulnerabilities.
  • Through Flash, cyber criminals contact an OS tool programmed into all Windows devices called PowerShell, then feeds instructions to that tool.
  • PowerShell connects to a server of the ‘command-and-control’ variety, and then a script that is designed to steal information is downloaded and the information is sent to the cybercriminal.

This is only one example. As it turns out, there are many other non-malware attack strategies, and they are on the rise. IT services in Miami cannot afford to ignore non-malware attacks for this reason, so they are more likely to be up-to-date on the kinds of attacks that are developing.

The Social Engineering Approach

For example, one sneaky way non-malware attacks are conducted is through simple personable interactions over the phone. Check out this video. In it, a woman at Def Con, an annual convention of hackers in Las Vegas, uses simple social engineering techniques to hack into a man’s cellphone account. She acts like a mother with kids who just “can’t remember” her information. She puts the sound of a baby in the background, and through personable conversation manages to acquire intimate account details.

This is technically a hacking attack without malware— or a non-malware attack. The truth is there are a thousand different ways to hack a business without even using a line of malicious code. In order to overcome that kind of thing, you need the assistance of an MSP who understands what’s going on, what to look for, and how to protect against it. For example, you could use multi-phase security, wherein a password must be sent to a cellphone in order to access an account. You’ve got to think ahead of the hackers, and MSPs can help you do that.

Securing Your Business

IT services in Miami through Michell Consulting Group can help you protect your business from multiple angles. Contact us to secure your business against not just malicious programming, but malicious hacking techniques which otherwise go entirely unnoticed.

Here is How Antivirus Keeps a Business Safe

A lot is made about antivirus as a part of a comprehensive network security platform, but how does the system really work to eliminate threats? Today, we will take a look at an antivirus solution to show you how it goes about removing unwanted files and other code.

Read more

Is Malware Ruining Your Business? IT Support in Miami Can Help!

Viruses and other types of malicious software are a growing problem for businesses, as hackers are always developing new programs and finding inventive ways to infect vulnerable machines. Malicious software can be used to gain access to sensitive data, such as passwords, financial details and other personal information, which can then be used to take money from your bank accounts, gain access to your email accounts, and even steal your identity. If your business’ computers are infected with malware, it’s important to seek the help of a reliable IT support firm in Miami.

Disconnect from All Networks

Malware can quickly spread to other computers, devices, and smartphones that are using the same network as an infected computer. Disconnect your computer from the Internet, as well as any shared networks, and turn off all connectivity options, such as Bluetooth, Wi-Fi, and some other connection types may try to connect automatically to any available networks, so it’s a good idea to disable these as soon as possible. Remove any external devices connected through USB ports or other wired connectors.

Identify the Malware

If you know the name or type of program that has infected your system, you should be able to find plenty of information and advice online about its removal. Social media, forums, and dedicated security websites are often used to share information about common viruses and other infections. If you don’t know the source or type of infection, you can scan your system with a malware detector to find the problem. Enlisting the help of an IT support firm in Miami can be very effective in these situations.

There are several security websites that provide free online tools for scanning your computer. However, it’s usually best to avoid connecting to the Internet, so consider using a downloadable program to identify the infection.

Remove the Infection

Minor viruses and simple malicious code can often be removed easily by using tools bundled with your operating system, security software or malware scanner. However, you may need to manually delete or use a special removal tool to get rid of the offending program. If a virus has made changes to the registry or other essential systems, you may need to talk to technical support or a security expert.

Unfortunately, it’s not always possible to completely remove malware or reverse the damage caused by malicious code. Wiping your hard drive and reinstalling the operating system may be the only option for serious problems. If your computer or security program has made backups of your files, it may be possible to restore some of your data after reinstalling the operating system. Malware can cause serious problems for computer users, as infected systems can be used to steal sensitive data, including bank account details, passwords, and other information that can be used for financial gain. Acting quickly to disconnect the affected device from all networks reduces the risk of infecting other devices. Regularly updating your antivirus and other software will help to protect you from further problems.

Hackers are constantly finding new ways to access personal and business email accounts. If a hacker gains access to your email account, they can steal sensitive information, financial details, and use your account to send malicious or spam emails. You can help keep your email account secure by choosing the maximum-security settings and asking a professional IT support expert in Miami for assistance. At Michell Consulting Group, we can help you protect your business from malware and all kinds of cyberattacks. Contact us today for more information.

Looking Back at This Year’s Cybersecurity Issues

Every business in operation today needs to have some kind of comprehensive network security. Simply put, there are too many threats that can come in through an Internet connection for them to continue doing otherwise. The past year provides plenty of anecdotal proof of this fact, as a quick glance back can show.

Read more