Ransomware and Your Business’ Digital Danger

Ransomware and Your Business’ Digital Danger

Does Your Business Need a Hardware Refresh?

Is it time to upgrade your businesses computer with a full hardware refresh, but you’re worried about getting the “latest and greatest” technology because you’re worried about potential bugs in the system? Were you burned (no pun intended) by the recall of the Samsung Note 7 – a recall that happened less than two weeks after the anticipated smartphone hit the shelves?

Ransomware’s Effect on 21st-century Business

In this day and age, it’s important to take internet security very seriously. There are multiple threats that can potentially bombard computer systems on a daily basis, including various viruses and malware.

One potentially deadly malware to safeguard against is ransomware. This type of malware is particularly nasty because it’s used to extort money from those it has infected. Essentially, ransomware locks up access to an infected computer and prevents anyone from logging in until a demanded payment is met.

With who-knows-what-kind-of-payment-demand on the line, it is important for businesses and individuals to protect themselves against this kind of malicious threat. Ransomware is a threat so serious that Herjavec Group, a cybersecurity company, has projected it could have a global cost of $1 billion this year, ZDNet reported.

Bitcoin Is Fueling Cybercrime

Ransomware has increased in notoriety alongside the increased use of digital currencies, like Bitcoin. One Bitcoin has a current exchange rate of $3,853.24. A price tag like that speaks to the unfortunate success of malware. And because of that success, the Herjavec Group predicts that ransomware attacks are likely to increase over the remainder of 2016 and into 2017.

PC Mag highlighted one terrifying ransomware incident when the 434-bed Hollywood Presbyterian Medical Center, was effectively shut down after hackers breached its security. The hospital was forced to pay $17,000 (or 40 bitcoins at the time) to regain control. That doesn’t seem like a lot of money for a hospital, but when one thinks of the frequency of successful attacks, those small ransoms add up in a hurry.

What To Do About It

If an email with an attachment is not from a known or trusted source, mark it as spam and delete it without opening. If unsure of the sender, Entrepreneur recommends using an online office viewer like an email preview that will allow you to read the document without “hidden macros or funny stuff” opening up.

“This type of system essentially eliminates a lot of costs for a business.”

Zachary Ellis
ITonDemand

Ransomware is able to infect computers in ways similar to other viruses – corrupt websites and attachments. That means the ways to protect yourself are similar. In its report on ransomware, PC Mag said businesses and individuals should invest in good security software, keep applications up to date and do not open attachments from unknown senders.

Hybrid Data Storage

Most everyone knows that the Nigerian prince email is a scam and laughs about it, but the more vicious attacks are cleverly disguised to appear as if it is coming from a legitimate source. Additionally, it is highly stressed that businesses and individuals back up their files on portable hard drives or other servers in order to prevent the loss of data should a breach occur.

These all seem like simple concepts to adopt, but with the rise in the notoriety of ransomware, it seems like these simple tools are either not being used correctly, or the ransomware black hats are getting around the safeguards.

From Our Experts…

“Businesses need to carefully plan and execute a comprehensive security plan to mitigate the risks ransomware presents. In order to combat against ransomware, a security plan should consist of next-generation firewalls, intrusion prevention, and malware detection systems and a strong backup strategy,” Ellis said. “Backups are key as certain strains of ransomware can infect systems but sit idle for a random period of time before locking the system. These types of ransomware are especially troublesome as they tend to search for attached backup systems to infect them as well. It is important that the backup systems are only active while backing the system up. The goal of ransomware is to prevent users from accessing their data until payment is made to the software is made to find all of the user’s data whether it is local, in the cloud or on a backup system.”

Thin Clients and Why They Rock

Thin Clients and Why They Rock

Finding ways to cut costs is important for any business. Becoming a streamlined operation is a goal that will please a businesses’ clients and stakeholders. One way to drastically reduce costs is to “think thin.” By thinking thin, management will be able to allow remote access to servers, (even if employees are “on site”) freeing up the need for fixed office space. It’s a remote world and adopting a thin client system will allow your business to take advantage of the concept all while saving money.

Having a thin client system reduces the necessary amount of server hardware a business needs. A reduction of hardware also means there is less time spent fixing any on-site computer issues.

Those sound good, but there are also numerous other benefits to adapting a thin client system. Certainly there are cost savings when it comes to IT. A thin client system can also simplify management. All software and hardware upgraded can be conducted in the main data center rather than each workstation. That saves a lot of time and money, especially since these upgrades can be done in off-peak hours, which means there is little or no interruption of daily business.

“This type of system essentially eliminates a lot of costs for a business.”

Zachary Ellis
ITonDemand

But one cost you may not have considered is how the use of a thin client system can enhance your company’s security. Thin client systems protect a company from the use of unauthorized software or the introduction of viruses. With everything centralized, data integrity is enhanced. The thin client system can also ensure data privacy and protect intellectual property – something that is becoming more necessary in the evolving technological landscape of business.

“This type of system essentially eliminates a lot of costs for a business. Imagine an employee needs a new computer, but instead of paying hundreds of dollars on a new machine, you could spend as little as the price of a RAM upgrade to get them working again,” ITonDemand’s Zachary Ellis said.

A thin client system sounds pretty good and it’s something that ITonDemand can help you set up in a timely manner – although setting up a thin client system for an established company can be time consuming. Ellis said that takes experts to configure everything properly, the kind of expertise that can be found at ITonDemand.

“Doing it your self could mean data loss, or possible security risks. Allowing experts like ITonDemand to do this eliminates that risk,” Ellis said.

Enterprise Wireless For Your Business

Enterprise Wireless For Your Business

Wireless access isn’t a luxury, but a necessity.

In this modern world of wireless electronic devices – laptops, phones, tablets and gaming consoles – having Internet access is a must. Being portable has become an essential part of our lifestyles and it’s key for businesses to meet the demands of the wireless lifestyle.

But becoming wireless for many businesses is easier said than done. There are serious considerations for a company to make when setting up a wireless network, especially if those businesses want a network to respond quickly to a plethora of users and now have things really s l o w d o w n s o m u c h y o u c a n t g e t a n y t h i n g d o n e. With that in mind, it’s important for a business to set up a network that is fast enough for the increased demand, but also one that is secure for users to log onto without concern.

There are a number of priorities to consider when setting up a secure Wi-Fi network at your business, including using business-grade access points that are designed for heavy use from multiple users at all hours of the day, including peak business times. When incorporating a larger number of access points, it’s important to remember how many wireless devices each employee uses in order to ensure you have the best access available for your employees or on-site clients.

Another consideration to make is selecting a proper frequency grade. Tech news site CIO notes there are two frequency bands “designed for 802.11 Wi-Fi networks: 2.4GHz and 5GHz.” A business will have to decide which frequency best supports its internal and external interests, particularly when taking personal wireless devices such as smart phones and tablets into consideration.

“With a large install base in most homes and business, wireless has become mainstay by which individuals access the data they need. Users have grown to expect wireless connectivity wherever they go. It has become so ubiquitous that many forget the potential pitfalls such connectivity presents,” said Chance Ellis, eResource’s director of systems engineering.

In this crazy world of identity theft and cyber-crimes, it’s also important to utilize strict security protocols when it comes to setting up a Wi-Fi network. Computer Weekly noted that a wireless network can be a problem for security-conscious IT workers primarily due to personal devices owned by employees. The publication said malware on those devices can get into the Wi-Fi system and cause issues for a company and its users.

Many of the new Wi-Fi systems that are most adequate include things like the ability to identify unauthorized users, defend against things like spoofing attacks. Other security forms that need to be considered when setting up a strong Wi-Fi network need to include security event management and reporting abilities. Another key is the establishment of Service Set Identifier, which is the network name that users see when connecting to a wireless network.

“Businesses need to have a comprehensive wireless security plan that protects them from unauthorized access and use. Unauthorized access can put business critical information at risk. Unauthorized use can make a business responsible for any malicious activity performed simply by providing the mechanism for the activity to occur,” Ellis said.