Tuesday, September 6, 2016

The Encrypto Virus

You may recently have heard of a new variant in ransomware, “The Encrypto Virus”. This is a particularly nasty piece of malware that, in addition to locking your computer, sets a time limit on “unlocking” it, and threatens to destroy all your information if you don’t pay. Once your computer has been infected the message displayed on the screen warns that your files have all been encrypted and if you don’t send a payment within a certain time frame, all your information will be lost forever—no one will ever be able to unlock your files without the hacker’s “key” to decryption.

How does the Encrypto virus spread? Typically, through email, the hackers hide the Encrypto virus in an attachment that looks like a PDF but is actually an executable, or .exe file. If you or someone on your staff opens the phony PDF, the virus encrypts the files on your computer and tells you that you can only get the key to unlock them if you pay.
It’s a scary possibility. An attorney in Oklahoma made the news recently when he went public about his law firm being attacked by the Encrypto virus, and his plans to pay the ransom.

So, what can you do to protect yourself and your small business network against the Encrypto virus and other types of malware that attack by encrypting your files?
First, we know you’ve heard this often but it’s well worth repeating—always be vigilantly careful about opening attachments to email! The fake PDFs containing the Encrypto virus will seem to come from a trusted source, like Xerox delivering a scanned image, or FedEx sending package tracking information. If you or your staff EVER receive emails with attachments, make sure you are actually expecting that email and its attached information from that particular source before opening the attachments. It’s easy to forget during a hectic work day, especially when you have an intimidating backlog of email to get through, but it’s vital to preventing these kinds of computer viruses from infecting your system.
If you’re using Windows, disabling hidden file extensions can help detect these attacks before your computer is infected.

If your computer does get infected by this type of encryption virus, manually disconnect it from your wireless or wired connection immediately in order to prevent it from spreading to other computers on your network.

Another reminder that almost can’t be repeated enough—make sure you have a separate backup system for all your most important files. If you lack such a system or just want some advice about your best options, Full Sky specializes in network services. We also offer consultation and planning for the best network security. Call or email us with any questions  info@fullskytech.com or 513 206 9971 

Wednesday, July 6, 2016

Is the Cloud the Right Place for Your Business?

 Whether it’s because of Apple’s iCloud, Dropbox or another platform, most people in Cincinnati are now familiar with the basic idea of what the cloud is and what it has to offer. While it’s fairly easy for individuals to get on board with this concept, businesses are often more resistant to making the transition.

The most common reason businesses are hesitant to transition to the cloud is because they have concerns about security. Given the various data breaches that happen to organizations of almost all sizes, it’s completely valid to have concerns about cloud security. That being said, it’s important to emphasize that when the proper security measures and policies are in place, cloud platforms can be just as secure as any other type of storage.

Because moving to the cloud can provide a Cincinnati business with numerous advantages, we want to touch on some of the key benefits, as well as look at the security issue in a little greater detail:

Enjoy Greater Flexibility

One of the big benefits that goes along with the transition from physical servers to virtual ones is the increased flexibility that becomes available. For example, if there’s a sudden spike in usage, there’s no need to worry about a crash. Instead, being on an optimized cloud platforms means that additional server resources can be spun up within minutes.

Save Money and Time

On the other side of the point touched on above, being in a virtual environment means that resources don’t need to run 100% of the time. If resources aren’t being used, they can be turned off for the time being, which means that your business won’t spend on things it’s not using. Having this level of control in a straightforward format also means notable savings of time.

Take Advantage of More Effective Project Monitoring

When any type of project is spread across numerous locations, it can be difficult to accurately monitor how well it is moving forward. The great thing about utilizing a cloud solution is the centralized structure of this type of system means that everyone involved will be able to accurately look at how well the project is progressing.

Dedicated Hardware Can Actually Increase Security

As mentioned earlier in this post, security is definitely an important consideration for any type of cloud platform. But even though security is something that needs to be carefully evaluated, the right cloud system can actually provide an optimal amount of security. As long as firewall, anti-virus and physical security rules are all utilized, a cloud solution can deliver all the benefits discussed above within a very secure system.

Want to learn more about transitioning your business to the cloud in an optimal and secure way? Call (513) 206 9971 to speak to a member of the Full Sky Technologies team about your specific cloud business needs.

Monday, March 7, 2016

WHAT IS RANSOMEWARE???????

What is Ransomware?  Let us define Malware first.  Malware is a term used to describe any type of software that’s designed to disrupt normal computer operations. Malware can also collect private information or take control of a computer system. The history of malware dates back several decades, with one of the most notable examples being the first Internet Worm. Although many early examples of malware were written as pranks or experiments, modern malware is generally created and distributed with very specific goals in mind.

Within the umbrella of malware is a specific type of software known as ransomware. The way that ransomware works is it stops someone from using their computer. The reason this type of software is called ransomware is once it blocks someone, it displays a message indicating that the only way to regain control of their computer is to send a payment.

Scare Tactics Used By Ransomware

While ransomware comes in many different forms, one of the most common examples is a web browser will suddenly display a message that is supposedly from the FBI or another government agency. The message will accuse the user of doing something illegal, and then inform them that they can avoid criminal charges by paying a fine. Money Pak is the most commonly requested form of payment.

Another example of ransomware that has become quite prevalent is known as FakeBsod. This malware program injects JavaScript code into a browser and displays a blue screen that mimics the look of a fatal Windows error screen. The screen includes a message to call a Microsoft technician. If someone calls the toll-free number that’s listed, they will be asked to send a payment to fix the issue.

Chimera Ransomware is Targeting Businesses

Ransomware has really taken off during the last couple of years. In most cases, ransomware has targeted people who are browsing the Internet on their personal computers. However, a new ransomware program known as Chimera is specifically targeting businesses. The way that this especially nasty form of ransomware works is it will send an email to an employee.

The email will include a link to what’s supposedly an internal job application or corporate deal. If an employee clicks the link, they will be taken to a Dropbox file that contains the malicious code. Opening the file will result in that computer being infected and all local files getting encrypted. Upon restarting the computer, the employee will see a message on their desktop that demands a Bitcoin payment of around $700. Although it’s possible to remove this ransomware without paying, a much better option is to prevent it from getting on a company network in the first place.

If you want to protect your business against ransomware and other forms of malware, be sure to learn about the different managed network services in Cincinnati that we offer. Call or e-mail for more information, or to schedule a network security Evaluation.

Full Sky Technologies: 513 206 9971 Email: Info@fullskytech.com