Ransomware Doesn’t Stop with a Payment

If you think paying off a ransom demand to get back files is the end of your experience, you’re wrong. Getting to cough up a few bucks…well, Bitcoin…is just the start. Ransomware pirates are finding ways besides email to get access to your computer and all of your data – and they’re looking for long-term relationships, too. One tech columnist has sardonically suggested they need good customer service plans. You need a good protection plan.

Let’s start with some basics, which we’ve discussed many times before:

  • Be extremely careful about clicking on links in an email, even if it looks like it comes from someone or an organization you know and trust.
    • Personal email addresses get stolen and spoofed all the time.
    • It’s very easy for someone to recreate a corporate look – such as for your bank – that looks realistic at first glance. (Seriously, does your bank use a Hotmail account?)
  • Install and use anti-virus and anti-malware protection. Make sure update it, and make sure you update it from a legitimate site (see above).
  • Install all updates from application software provider (but make sure it’s legit). Most patches and updates cover security issues.
  • Back up your data files to an off-site server or, better yet, store them in the cloud. For an extra precaution, you can store files to portable hard drives, and keep them disconnected when you’re not backing up data.

One of the problems with storing data on a laptop computer, which many people do, is that when it’s stolen, your data can be accessed before any kind of Internet-based program kicks in to wipe your drive clean. All somebody needs to do it remove your hard drive and hook it up to a computer to see what’s on there.

If you have covered all the basics, you now face some new concerns, especially if you store confidential personal, financial or medical information as part of your business. You face additional risks because there is no way for you to control the security steps your customers or clients take. If they leave vulnerabilities, a hacker can use one person’s log-in credentials to see a lot more data than would ever care to expose.

You can protect your business and data in a number of ways – in addition to the steps listed above:

  • Insist visitors to your website use newer versions of all browsers. As browsers age, publishers stop supporting them. You don’t want to expose yourself to their vulnerabilities.
  • Encrypt your data and your emails. If you do a lot of email marketing or communicate confidential information, this is a no-brainer. Email services, such as Constant Contact, which we use, build in a number of security measures. Spend the money to take advantage of them; it’s cheaper than taking a financial hit (see below).
  • Check with your insurance agent or carrier to see if E&O covers you for cybersecurity breaches. It may be an extra cost, but remember that insurance companies like to collect premiums, not pay claims. They are motivated to minimize your risk and should work with you.

The back story on these tips starts with a client who has two offices. In the “main” office, nobody uses the Internet. But in the other office, people used a remote desktop to access the system in the main office, and the security was weak. The link was not secure, and the passwords were simple. I was able to hack in using an iPad that still had a SIM card from another country, and the client could not detect that I was in there.

That should be a wake-up call for every small business to install and maintain security systems throughout their information management system. Ransomware pirates are getting more sophisticated in ways they can get into your systems and stay there – which brings up the “customer service” observation from Glenn Fleishman in PC World. Our point is not to scare anyone away from technology. Every advance – from the bicycle to space travel – has a risk-reward component, and we all know the rewards are great when we follow the proper precautions.

We’d like to leave you with three steps to take right now:

  1. Encrypt all data
  2. Never send passwords in an open email
  3. Look before you click – disguises are getting better and more numerous

Sterling Rose can help you design, install and maintain a cybersecurity program. Contact us by phone – 973-433-6676 – or email us to make an appointment to discuss your needs.

Preventing Viral Infections

Early shopping season reports showed online purchasing way up over in-store shopping this year. If you know what you want and what you want to pay for presents, online shopping is convenient and efficient. We’ve written a lot over the years about being safe online, but you’d be surprised who could be infectious.

One culprit, for example, could be an electrical contractor or video-surveillance-system contractor who does work at several locations for a national or regional retailer. That contractor may use some sort of billing app to invoice the retailer – let’s say it’s Target or Walmart, but it could be anybody; we’re talking about the size of the company. That invoice goes somewhere in the retailer’s massive data management program.

Now, let’s say that contractor hasn’t had the time to keep all of their security software update – or they’re using some free antivirus program that has more holes than a slice of Swiss cheese – or they’re using easily cracked passwords.

Do you see where this is going? A hacker gets into the contractor’s computer system, simply because it’s open. Once inside the system, the hacker sees that the contractor has done business with the large retailer and is able to find all the information the contractor uses to get into the system. Once hackers are in, they have the opportunity to explore other parts of the system, and that’s where it’s possible for them to get all sorts of personal data about the retailer’s customers.

It could only be email addresses, but that may be enough to help them launch a scam – which we’ll get into later in this article. They could also get into credit card information, which leads to financial consequences.

As a business or consumer, what can you do to keep from being infectious? First of all, make sure all of your antivirus and malware software and firewalls are up to date and activated. We always advise going beyond free versions of all of this software. The paid versions are stronger and better supported.

Second, make sure you have strong passwords and change them. Yes, it’s an inconvenience, but that’s the tradeoff you need to make to protect your security. We also recommend using additional security measures such as two-factor authentication or requiring a text notification being sent to your cell phone when you change a password. The text notification will tip you off if someone is impersonating you online.

Third, be VERY, VERY CAREFUL at this time of year. Holiday season is scam season. When you buy online, it’s common to receive an email from a retailer or shipper with a link to track your packages. With thefts of packages commonplace, it’s useful to know when a package will arrive to make sure you or a neighbor can take it in. With everyone rushing to complete shopping and get work done, it’s all too easy to click on a link, and that’s the opening for scammers to get into your system.

Another scam is in the travel industry, such as a special offer purportedly from a hotel or airline. Again, you invited to click a link to take advantage of a “great opportunity.”

You should do your best to verify the authenticity of any link before clicking it. One effective way to check is to hover your mouse over the link. You should see the link’s origin. If it looks funny, avoid it. Even better, open your browser and go to the company’s website to see if you can find the information contained in the email. If it’s legit and available, you should be able to access it. Your other option is to pick a phone and call the company – using a number provided on its website, not from the email.

The sad truth is that no person, business or government is safe from hacking. The question is not if you will be hacked, it’s when you will be hacked. And the consequences can be even more widespread than they used to be. Some of the viruses now get into your computer’s firmware. That means that even if you wipe your hard drive clean and reinstall your operating system and all your other software, the virus is still there.

If you think you’ve been hacked or have a virus in your computer, call us or your IT specialist immediately. We know where to look and have the tools to discover your breach and mitigate the virus if it’s all possible. Call us – 973-433-6676 – immediately if you have a security concern or contact us by email if you have any questions about your online security.

Connected Cars Have Blind Spots

As computers and connectivity become prevalent in the automotive industry, we’re finding more ways in which your “electronic tires” can be slashed. It goes beyond leaving your personal information footprints in a rental car – or even having a hacker stop you cold on an interstate highway – as we discussed earlier this year.

Technology is lapping the car companies’ capability to keep up with the latest developments. With Internet connectivity just about anywhere in the US, it’s easy for any automotive service provider to “talk” to your car. In fact, Tesla has made a point about that. Because their system is so software-driven, they can make repairs directly through an Internet connection while the car sits in a garage.

The manufacturers of more mainstream cars, though, are still increasing their use of the Internet to avoid you having to return to the dealer just for a software update. While your first thought is probably getting updated maps or upgrades for your factory-installed navigation system, it can go much farther than that.

According to an article in Auto Connected Car News by Brian Jonston, over-the-air (OTA) software updates can reduce warranty costs, potentially increase overall completion rates for software-related recalls, improve customer satisfaction by eliminating trips to the dealership for software upgrades or fixes, and provide the ability to upgrade functionality and add features to automotive infotainment systems over a vehicle’s lifetime. He cites a report from IHS Automotive that estimates auto manufacturers worldwide could save $35 billion in recall and update costs by 2022, mostly for telematics and infotainment system updates.

“Japanese OEMs have been pioneers in navigation map updates in Japan via their telematics systems. BMW, VW and Tesla have all recently announced OTA procedures for updating navigation maps,” Jonston writes. “Hyundai and Ford both have proof of concept systems for OTA map updates, and will also likely deploy such systems in the near term. Total vehicles in operations that are enabled with map OTA updates are projected to grow from approximately 1.2 million units in 2015 to nearly 32 million units by 2022, according to IHS forecasts.”

Jonston adds that Infotainment software OTA updates are much larger and more complex than software app updates and need to use Wi-Fi rather than LTE 4G service because of mobile network limitations. This category is emerging and will be a growth segment in the next five years, with players like Ford, Chrysler and GM expected to adopt these systems. Infotainment software updates, such as updates to the infotainment OS and user interface, will grow quickly over the next six years to more than 96.4 million enabled vehicles by 2022.

The OEMs that use software platforms most effectively will be able to save costs and improve sales and customer retention. But they need to get into the fast lane on the information superhighway. My car lease, for example, is up in the very near future, and the level of technology is stopping me from getting a new model. I’ve experienced numerous problems, especially with Bluetooth compatibility with my cell phones and infotainment systems.

It all makes me wonder if the auto manufacturers can catch up to companies such as Apple and Google, who seem to be able to do a much better job of integrating their systems. With the new model year for cars generating excitement (and generating deals for clearing out last year’s models), you might be thinking about a new car. We can help you look at the infotainment features of the cars you are considering and help you integrate your devices with the car – avoiding multiple trips to the dealer or an aftermarket systems provider. Knowing how you use technology, we can help you buy and install the technology you need to get full benefits and enjoyment from your system. Call us – 973-433-6676 – or email us to answer your questions and get you on the road.

Virus and Malware Protection Requires Vigilance

The numbers are grim when it comes to the ability of antivirus and malware software to protect your computer from an invasion. Keeping a close eye on your computer is a huge help.

Let’s start with the bad news. I was astonished to learn that the four major antivirus engines used to combat viruses combine can only detect 40% of the viruses floating around. If you want to take some consolation, it’s a higher success rate than this past year’s flu vaccine, but it’s not comforting. It’s the same with antimalware protection. Quite simply, the antivirus and antimalware software developers can’t keep up with the volume of viruses and malware that’s produced every day.

If you know or believe your computer is infected by a virus or malware, disconnect it from your network or the Internet or shut down the computer and call us – 973-433-6676. IT professionals know which tools to use and where to use them to find and remove them. The tools are Microsoft tools, and they are free, but, again, it’s a matter knowing how to use them and being able to verify that a computer is totally disinfected.

If you have an infected server and no back-up in place, we’ll try to clean the server. With a computer, it’s easier to isolate the infection and – if needed – rebuild it, which means wipe it clean and reinstall the operating system, application software and data files. If you are using cloud-based applications and data files, the chances of an infection are greatly reduced because the hosting companies constantly update the software.

While the numbers may seem to be stacked against you, you can take steps to protect yourself. First, install, update and use your antivirus and antimalware software. Those programs will pick off the more numerous “easy-to-detect” viruses and malware.

Second, be very careful about the websites you visit and the networks you allow to connect to your computer. Only go to trusted sites and only connect with trusted networks. Of course, there’s a caveat here. Sometimes, your antivirus software may flag a network or computer trying to connect, and it may be a false positive. If it looks like something that’s OK, it’s most likely a network driver update.

Contact us – 973-433-6676 or email – if you have any questions about anything having to do with viruses or malware on your computer or server. It’s a dangerous world out there, but it’s more than survivable with good judgment and common sense.

Steps to Take – Mitigate Fallout from Russian Hacking Incident

If you haven’t seen or heard the news, a Russian group has hacked user names and passwords for some 1.2 Billion accounts worldwide.

We urge you to run a virus scan and malware scan as quickly as possible on all of your computers to determine if your system has been infected. This post from The New York Times, which first reported the incident, covers some basic steps you can take. We’ve discussed them before, and they are now very much worth repeating. If you want to learn more, you can read reports from PC Magazine and The New York Times.

 

As always, if you have any questions or concerns, contact us immediately by phone (973-433-6676) or email.