(Free) Premium Resources for Remote Work

(Free) Premium Resources for Remote Work

(Free) Premium Resources for Remote Work

ITonDemand and KnowBe4 have partnered together to give you and your staff resources for remote cybersecurity.

KnowBe4 Home Course

New-School Cyber Security Awareness training designed to keep you secure while working exclusively from home.

Web Address: https://www.knowbe4.com/homecourse
Password: homecourse
(Don’t like to click on redirected URLs? Cut & paste this link into your browser)

10 Tips to Stay Safe Working from Home PDF

Secure your home wifi, Multi-factor authentication, phishing scams and more.

Download the PDF

Scam Alert: Coronavirus / Covid-19 PDF

Hackers are taking advantage of this unique situation in a variety of ways. Learn what to be on the lookout for. 

Download the PDF

PHISHING

Download our infographic and learn how to identify a phishing scam when you see one.

Founded in 1999, ITonDemand helps businesses and associations across the US achieve growth by guiding and supporting IT infrastructure and providing cybersecurity management. ITonDemand’s Core Solution and Security+ have been recognized among both Managed Services and Cybersecurity Providers as a member of the MSP Pioneer 250 and the Top 200 MSSPs.

1423 Powhatan St, Alexandria, VA 22314

233 SW 3rd St, Ocala, FL 34471

info@itondemand.com

800-297-8293

 

Hackers begin targeting VPNs as the world moves remote

Hackers begin targeting VPNs as the world moves remote

A few weeks ago, VPN use was limited, compared to today. Tens of thousands of businesses have moved exclusively to VPNs in the past week posing a unique security vulnerability and opportunity for hackers.

In an alert issued March 13, the Cybersecurity and Infrastructure Security Agency (CISA), a department of Homeland Security, encouraged organizations to adopt a heightened state of cybersecurity during this period.

Security Issues of VPNs

As organizations use VPNs for telework, more vulnerabilities are being found and targeted by malicious cyber actors. Virtual Private Networks or VPNs are a virtual “tunnel” that encrypts your data as it is sent from one point to another. Because VPNs act like a tunnel if one end is not secure (your home network), the other side (your business network) isn’t either. This presents potential vulnerabilities to networks that need to remain secure.

Maintain Your VPN Updates and Patches

Additionally, if VPNs are being used 24/7, organizations without managed services or dedicated IT personnel are less likely to keep them updated with the latest security updates and patches. Patches update known security vulnerabilities to maintain security. The longer your VPN goes without updates, the greater the risk for a breach.

Look Out for Phishing

Malicious cyber actors may increase phishing emails targeting teleworkers to steal their usernames and passwords. With log-in credentials, hackers are able to deploy the malware of their choosing or steal vital information.

The report also stated that organizations that do not use multi-factor authentication (MFA) for remote access are more susceptible to phishing attacks.

VPN Limitations

Organizations may have a limited number of VPN connections, after which point no other employee can telework. With decreased availability, critical business operations may suffer, including IT security personnel’s ability to perform cybersecurity tasks.

Alternative Options

If your staff has a desktop computer in the office, but they are at home and only have access to their personal computers and the internet, we recommend using ScreenConnect.

ScreenConnect provides secure remote access for your staff to work on their office computer, from any computer with an internet connection. Your staff can maintain the same desktop experience as if they were in the office, including line of business applications, filesharing, and most importantly security.

ITonDemand can add this service on a per-user/computer basis for only $5/mo. This service can easily be removed once life returns back to normal.

Fill out this form to get started using ScreenConnect

Other Articles You Might Be Interested In:

Office365 is not a Disaster Recovery Plan

Office365 is not a Disaster Recovery Plan

Disaster recovery plans are vital, not just important. Data becomes lost, deleted, purged, corrupted, all the time. Without that measure in place, data is truly lost. There does seem to be confusion on what constitutes a Disaster Recovery plan, however. While many...

read more
Data Backups and Disaster Recovery

Data Backups and Disaster Recovery

Data backup is a critical part of an organization’s overall disaster recovery plan. The concept of data backup is simple: you make copies of your data and store them in a different location in case data is lost or destroyed.

read more

Founded in 1999, ITonDemand helps businesses and associations across the US achieve growth by guiding and supporting IT infrastructure and providing cybersecurity management. ITonDemand’s Core Solution and Security+ have been recognized among both Managed Services and Cybersecurity Providers as a member of the MSP Pioneer 250 and the Top 200 MSSPs.

1423 Powhatan St, Alexandria, VA 22314

233 SW 3rd St, Ocala, FL 34471

info@itondemand.com

800-297-8293

 

Coronavirus Social Engineering Email Circulates

Coronavirus Social Engineering Email Circulates

Hackers will use any tool at their disposal, including health crises.

Public fervor over the coronavirus is impossible for someone not to take note of, which includes potential hackers. 

On Thursday, March 5th, Naked Security by Sophos issued a warning stating that malicious emails fraudulently claiming to be the World Health Organization are being used to lure victims to download a “statement” from the WHO.

The initial email was found in Italy, where Covid-19 is having a greater impact on public life. The email encourages users to download a Microsoft Word document containing macros that ultimately result in the infection of a well-known strain of Windows malware called Trickbot.

Be on the lookout for similar types of attacks.

If these attempted attacks in Italy prove successful, look for similar attacks and variations to grow in popularity in the United States. 

Social engineering is any tactic that a hacker uses to capitalize on a person’s laziness, fear, carelessness, trust, etc. After all, hacking a human is much easier than hacking a business.

What you can do

Beyond being personally aware of said attacks, there are multiple factors that decrease the probability of a social engineering attack on your business/organization. According to our partner, Knowbe4 the use of the following can prevent 90% of social engineering attacks:

  • Use of an Incident Response Team
  • Extensive use of Encryption
  • Employee Training
  • Business Continuity Management

If you have any further questions about implementing an Incident Response Team or Employee Threat Awareness and Education, please reach out.

 

PHISHING

Download our infographic and learn how to identify a phishing scam when you see one.

Other Articles You Might Be Interested In:

Office365 is not a Disaster Recovery Plan

Office365 is not a Disaster Recovery Plan

Disaster recovery plans are vital, not just important. Data becomes lost, deleted, purged, corrupted, all the time. Without that measure in place, data is truly lost. There does seem to be confusion on what constitutes a Disaster Recovery plan, however. While many...

read more
Data Backups and Disaster Recovery

Data Backups and Disaster Recovery

Data backup is a critical part of an organization’s overall disaster recovery plan. The concept of data backup is simple: you make copies of your data and store them in a different location in case data is lost or destroyed.

read more

Founded in 1999, ITonDemand helps businesses and associations across the US achieve growth by guiding and supporting IT infrastructure and providing cybersecurity management. ITonDemand’s Core Solution and Security+ have been recognized among both Managed Services and Cybersecurity Providers as a member of the MSP Pioneer 250 and the Top 200 MSSPs.

1423 Powhatan St, Alexandria, VA 22314

233 SW 3rd St, Ocala, FL 34471

info@itondemand.com

800-297-8293

 

Ransomware is a Threat for the Future of Education

Ransomware is a Threat for the Future of Education

Ransomware has been targeting governments, hospitals, and schools.

Why target those specifically? 

Because, if these institutions aren’t functioning at full capacity there are immediate consequences. 

Once ransomware is successfully deployed onto devices or servers, hackers demand heavy ransoms to release the encrypted systems. Because of the critical nature of these institutions, if no other option is present the only choice is to pay the ransom. This is hitting schools in particular especially hard.

Schools Hit by Ransomware

  • In July, Rockville Center School District paid $100,000 to hackers to have their data decrypted from a RYUK ransomware attack. 
  • 15 schools in Arizona had to be closed for two days following a ransomware attack on Flagstaff Unified School District affecting 9,600 students.
  • Email, Wi-Fi, and other “Tech-based Tools” were disabled for weeks following an attack on San Bernadino Unified Public School District in October.
  • On November 20th, Livingston Public Schools in New Jersey had classes delayed following a ransomware attack that took down several systems but most notably their VoIP phone systems remain down at this time. 

The list goes on.

(Article continues below)

PHISHING

Download our infographic and learn how to identify a phishing scam when you see one.

How does the Technology Supporting Education Need to Change for the Future?

Technology needs school districts have expanded beyond the expertise of a one-person IT department. 

There is both the teacher’s productivity needs on the front end and the network/data security and privacy on the back-end. As these both become increasingly more complex and hackers tactics become more refined, securing your school district becomes more difficult.

Along with expanding IT resources, establishing a threat education and awareness program at your school educates your staff on the distinguishing factors of malicious emails/attacks.

Learn more about how ITonDemand supports the Lynden Public School District in the video below!

Other Articles You Might Be Interested In:

Office365 is not a Disaster Recovery Plan

Office365 is not a Disaster Recovery Plan

Disaster recovery plans are vital, not just important. Data becomes lost, deleted, purged, corrupted, all the time. Without that measure in place, data is truly lost. There does seem to be confusion on what constitutes a Disaster Recovery plan, however. While many...

read more
Data Backups and Disaster Recovery

Data Backups and Disaster Recovery

Data backup is a critical part of an organization’s overall disaster recovery plan. The concept of data backup is simple: you make copies of your data and store them in a different location in case data is lost or destroyed.

read more

Founded in 1999, ITonDemand helps businesses and associations across the US achieve growth by guiding and supporting IT infrastructure and providing cybersecurity management. ITonDemand’s Core Solution and Security+ have been recognized among both Managed Services and Cybersecurity Providers as a member of the MSP Pioneer 250 and the Top 200 MSSPs.

1423 Powhatan St, Alexandria, VA 22314

233 SW 3rd St, Ocala, FL 34471

info@itondemand.com

800-297-8293

 

2019 Ransomware Report

2019 Ransomware Report

It’s been a busy year for Hackers

We are ¾ of the way through 2019. 

Nine months in, ransomware attacks have skyrocketed with attacks on at least 621 US government agencies, healthcare providers and schools. 

In the private sector, business detections of ransomware rose 365% from Q2 2018 to Q2 2019.

As hackers transition from targeting consumers to primarily businesses and organizations, their work has become significantly more lucrative.

Ransom demands have continued to increase in 2019. The cost of rebuilding systems is often significantly more than the cost of simply paying the ransom. And if one organization is willing to pay, the next may be willing to pay more. 

The Industries That Have Seen the Greatest Impact

Government

  • The attack on Baltimore left the city’s systems offline for over 3 weeks. By refusing to pay the ransom of $76,000, the city was forced to rebuild its digital systems. This left the city with a hefty $18.2 million estimate. Property transactions, tax, and water billing were all disrupted.
  • A trio Florida Cities paid over $1.2 million collectively after ransomware hit Key Biscayne, Lake City, and Riviera Beach in June. In this instance, the governments affected all agreed to pay the ransomware. In the months since the attacks, US mayors have all agreed to not pay ransoms.
  • This April, information boards and email were encrypted in an attack on Cleveland/John Hopkins Airport. Both the airport and the Mayor’s office were initially slow to give any details. The city claims to have managed the damage internally with conflicting reports that the FBI was involved. 

Healthcare Providers

Education

  • Similar to the DCH Health System attack, the Rockville Center School District in Long Island, NY was infected with RYUK Ransomware this August. The school district paid close to $100k to have their information decrypted.
  • Flagstaff United School District closed for two days following a ransomware attack in September. No details were released on the recovery from the incident.
  • In July, Monroe College based in New York City fell victim to an unknown strain of ransomware. The hackers later requested $2 million dollars to decrypt the infected hardware.

The Trends We Can See

Insurance is Encouraging Hackers

Hackers are receiving payment largely when businesses utilize cyber insurance. This is causing two noticeable trends. The volume of attacks is growing as the practice becomes more lucrative and the ransom amounts themselves are growing, quickly.

Hackers target MSPs

Hackers have also begun targeting managed service providers and IT firms. By doing this, they not only cripple the IT firm but also disable the provider’s clients. This is the case as evidenced by the PerCSoft attack above.

Email and Remote Desktop Protocol are Primary Vulnerabilities

It is well established that email is the most common vulnerability but any feature that adds access to internal systems is a potential vulnerability. Ransomware like SamSam, CryptON and CrySIS have all been spread through RDP attacks. Hackers can easily find and target organizations by scanning for open RDP connections. 

Statistics

  • By the end of 2019, ransomware will claim a new victim every 14 seconds.
  • Ransomware is expected to top $11.5 billion this year.
  • There were 204m ransomware attacks in 2018.
  • In 2018, there were 222 new families of ransomware created.
  • Ransomware induced downtime costs an average of $8,500 an hour.

PHISHING

Download our infographic and learn how to identify a phishing scam when you see one.

Other Articles You Might Be Interested In:

Office365 is not a Disaster Recovery Plan

Office365 is not a Disaster Recovery Plan

Disaster recovery plans are vital, not just important. Data becomes lost, deleted, purged, corrupted, all the time. Without that measure in place, data is truly lost. There does seem to be confusion on what constitutes a Disaster Recovery plan, however. While many...

read more
Data Backups and Disaster Recovery

Data Backups and Disaster Recovery

Data backup is a critical part of an organization’s overall disaster recovery plan. The concept of data backup is simple: you make copies of your data and store them in a different location in case data is lost or destroyed.

read more

Founded in 1999, ITonDemand helps businesses and associations across the US achieve growth by guiding and supporting IT infrastructure and providing cybersecurity management. ITonDemand’s Core Solution and Security+ have been recognized among both Managed Services and Cybersecurity Providers as a member of the MSP Pioneer 250 and the Top 200 MSSPs.

1423 Powhatan St, Alexandria, VA 22314

233 SW 3rd St, Ocala, FL 34471

info@itondemand.com

800-297-8293