Author name: Megan Augustine

Hackers Target Email, Blogs, Social Networking Sites

In a report by security firm Websense , an alarming rise in the growth of malicious websites was identified in 2009 as compared to 2008 – almost 225 percent. The study also found an increased focus among hackers and spammers on targeting social media sites such as blogs and wikis. Social media or so-called Web 2.0 sites allow user-generated content , which can be a source of vulnerability. Researchers identified that up to 95 percent of user-generated comments to blogs, chat rooms, and message boards are spam or malicious – linking to data stealing sites or to downloads of malicious software . Email also continues to be a target for malicious activity with tens of thousands of Hotmail , Gmail and Yahoo! email accounts hacked and passwords stolen and posted online in 2009, which resulted in a marked increase in the number of spam emails. For our clients on our Managed Service plans, we work hard to ensure your systems are protected from harmful or malicious activity coming from the Internet. If you’re not under our Managed Service plans perhaps now is a good time to talk – let’s make sure your systems are safe in 2010. Related articles Top search results riddled with malware (v3.co.uk) Email phishing attack spreading say experts (telegraph.co.uk) Fraudsters Go Phishing For Victims’ Friends (news.sky.com)

Hackers Target Email, Blogs, Social Networking Sites Read More »

Beware the Kneber Botnet

A malicious piece of software making the rounds of news websites this week is believed to be behind the compromise of over 75,000 systems in over 2,500 international organizations – many of which are government agencies and large Fortune 500 companies. Called the Knebner botnet after the name in the email used to register the initial domain used in the campaign to propagate the malware , the software infects computers and captures user login access to online financial services such as Paypal and online banks, social networking websites such as Facebook, and email. Infected computers can be centrally controlled from a master computer, which presumably harvests the data captured for nefarious means. The Knebner botnet itself is not new. It’s based on the ZeuS botnet, and has gained prominence lately because it’s slipped under the radar of so many organizations. However, there are ways to prevent compromises from botnets – one of which is to have a proactive security system and policy in place. Our Managed Security customers have this assurance in place since we continuously protect their system from botnets and other malware. If you’re not sure that you’re protected, talk to us today. Related articles: Kneber botnet described as ‘massive’ and ‘worldwide’ (inquisitr.com) Kneber attack resurrects notorious Zeus Trojan, say experts (guardian.co.uk) Malicious Software Infects Corporate Computers (nytimes.com)

Beware the Kneber Botnet Read More »

Beware of Vulnerabilities in Windows and Office

Microsoft recently released a number of security bulletins and patches addressing vulnerabilities in Windows and Office that are of high risk to users. It’s widely believed that many will be exploited by hackers within the next 30 days. One of them could potentially allow hackers or malware authors to easily compromise systems by tricking users to download malicious AVI-formatted files. Others require nothing more than just visiting a website. Another specifically targets Powerpoint Viewer 2003, and opening a malicious .ppt file could affect your system. This latest round of patches and vulnerability updates is really nothing new – although the sheer number made public in one day is notable. This highlights the need for a comprehensive security policy, because vulnerabilities do exist in even the most mundane or old versions of software. Customers under our Managed Services plan can rest easy since we monitor and update their computers as soon as these patches and advisories are released. Find out more about what we do to make your systems safe and secure. Contact us today. Related links: Patch Tuesday: Microsoft plugs critical Windows worm holes (zdnet) Researchers warn of likely attacks against Windows, PowerPoint (computerworld) Microsoft delivers huge Windows security update (computerworld)

Beware of Vulnerabilities in Windows and Office Read More »

Mariposa Botnet Masters Arrested

Spanish authorities report that they have arrested the masterminds behind a string of online criminal activities using the botnet dubbed Mariposa. Mariposa is the original name of a commercially distributed Do-it-Yourself malware kit, sold online for 800/1000 EUR for “wannabe” hackers.  Along with the arrest, authorities seized sensitive data belonging to about 800,000 users in 190 countries, gathered from an estimated 12M+ infected host computers on the Internet. What’s particularly interesting is that the cybercriminals arrested were not themselves the author of the malware, nor were they any more techincally adept than many ordinary users. They simply had access to malware widely available on the Internet, and were able to conduct a crime of such a wide scale and reach. This illustrates that it’s become easier for many cybercriminals to conduct their nefarious deeds online, and highlights the need for more vigilance on the part of law-abiding netizens in keeping their network secure from hackers and malware. Is your network safe? Contact us to find out. Related articles: How FBI, police busted massive botnet (go.theregister.com) Botnet takedowns ‘don’t hurt crooks enough’ (go.theregister.com) Vodafone distributes Mariposa Bot, Conficker and Lineage in HTC Magic (techie-buzz.com)

Mariposa Botnet Masters Arrested Read More »

Beware of Ransomware!

Users beware of ransomware : malicious software that extorts money from users in exchange for freeing the user’s computer or data. One particularly nasty version was recently discovered by researchers at CA which came bundled with a software download called uFast Download Manager. The malware blocks Internet access for users until they pay the publisher a fee via SMS. Users who download the software are immediately infected, seeing a message posted in Russian demanding a ransom under the guise of activating the uFast Download Manager application. To keep your computer environment safe, always be wary of downloading suspicious free software on the Internet. If you need help or are unsure, please contact us first so we can help!

Beware of Ransomware! Read More »

How to Choose an IT Consultant

In business today the choice of a technology advisor can be a critical success factor in this article you’ll learn how to make the right choice. Maintaining your small company network in good shape is not an easy task, and you are probably perfectly aware that doing it on your own is not the best way to invest your time. When you want to hire somebody to maintain your company network for you, basically you have two choices – to employ somebody onsite (as a full-time or part-time employee) or to outsource the task to an external IT Consultant . After you have decided that your small company does not need onsite IT staff and you will need an IT Consultant, the next step is to choose one. Choosing an IT Consultant is not so different from choosing an onsite employee, but still there are specifics you need to be aware of. Sometimes this task is a very easy one when you can ask your business associates to recommend somebody. But if you want to choose the IT consultant on your own, here are some points to consider: 5 Key Steps in Choosing an IT Consultant Technical competencies . Needless to say, this is the most important factor because if you hire somebody whose technical competency is not satisfactory, this will certainly lead to a lot of trouble. If you are a non-technical person, you are hardly in a position to judge the technical skills of the candidates, but if you ask them about the certificates, degrees, diplomas, and other similar documents they possess, this will give you a clue if they are technically competent or not. For instance, IT Consultants with Microsoft Small Business Specialist certification have passed rigorous exams on small business technology. Ability to work with people . Sometimes technical people are not the best communicators. But IT Consultants are supposed to be half techies, half business consultants, so for them being technical is not an excuse for lacking basic business and communication skills. That is why it is key to choose someone who can communicate with you, explain things in a way you understand, answer all your questions, and not just talk in jargon — someone who can help you understand how technology matters to your business and can help it grow. Availability . Availability is a key factor for your decision because if you hire somebody who is not available when you need him or her most, what’s the point of having an IT Consultant if you can’t rely on him or her? Usually it’s best to hire locally, because when their office is near, they are more likely to be able to arrive quickly on your premises an emergency. Also, very often problems can quickly be solved remotely, so it is equally important that the IT Consultant you choose provides remote support as well. Recommendations from clients . It’s always good to know how the candidate has handled previous clients, so feel free to ask for recommendations from their clients. Can they handle all your IT needs? When you choose an IT Consultant, you would like him or her to be the single point of contact for all your IT needs. While it’s not always possible for your IT Consultant to necessarily complete all of your technical needs him or herself, he or she should be able to manage the process on your behalf. (For example, if you want a software application to be developed especially for you, you’d better contact a dedicated software development company, but your IT consultant could be the one to handle the process for you.) Therefore, it’s best if the consultant you choose can meet all (or at least most) of your IT needs – from purchasing new hardware, to maintaining the network, to providing support for the applications you use on a daily basis. Wrapping Up These are some of the points you need to have in mind when choosing an IT consultant. It is important to choose carefully. If you want to establish a long term “trusted advisor” relationship with your IT Consultant, just like with your attorney or accountant, you must choose the best — not necessarily the cheapest — IT Consultant. Remember, your IT Consultant is a key partner in the viability of your business and your success! What Next? Sit down with your team and become clear on your IT needs and goals. Ask associates or key advisors such as your accountant for recommendations Interview and select carefully. The best IT Consultant should be a trusted advisor just like your accountant or attorney. Take your time and find someone you can trust and work with for the long term

How to Choose an IT Consultant Read More »

Collaboration Technologies to the Rescue

Reading this article will give you an overview of tools and technologies that will help you and your teams collaborate effectively and productively. Collaboration and teamwork can make or break a company. Long gone are the days when your employees could work independent of each other. In today’s market, if you want to stay competitive you need to use collaboration to the fullest. Thanks to various tools and technologies, this task is simple. Which Basic Collaboration Technologies Are Right for Me? Every business needs to use some kind of collaboration technique. In fact, there is no business in today’s world that can survive without basic collaboration technologies such as a company Intranet , email server, a fax/print server, or a time management functionality (for instance, electronic calendars). These technologies are so fundamental that most likely you have been using them for ages. So, as you might be surprised to learn that you are actually already using collaboration technologies but you just didn’t know it! However, you may also be surprised to learn about additional tools that you may not be using today that will help improve your company’s collaboration efforts. In addition to the basic collaboration technologies you have used for years, new ones are emerging all the time. Below is a list some of the most popular groups of collaboration technologies you can use in your day-to-day operations. To learn more about each collaboration tool, just click on each link to read our related articles. Conferencing tools . Audio and video conferences become a daily necessity for many companies. No matter whether you use audio and video conferencing to communicate with your distributed team or with suppliers and clients from all over the world, these collaboration technologies can be very useful. Document and application sharing . When many people work with the same document at the same time, it is very inconvenient when you have to wait for your colleagues to finish his or her tasks with that document, so that you can proceed with your work. Document and application sharing make that inconvenience history since it’s now possible for many people to work simultaneously on the same document. Workflow and project management . Workflow and project management technologies will help you manage your business more effectively by minimizing downtime and increasing the performance of your employees through organizing tasks better. Online collaboration . Even if you don’t have many (or any) tele-workers and remote workers, online collaboration tools are great because you can access them from everywhere and you can work at any time you please. Additionally, you can share these tools with your suppliers and clients and further improve your sales and customer service process. Change management . Maintaining multiple versions of the same document is too much of a hassle, but not when change management technologies handle this for you. When you use these technologies, you can maintain as many versions of a document as you like, and all of them will be neatly organized and readily accessible. Knowledge management . Knowledge is power, and there is hardly a company that will not benefit from a company wiki or other form of knowledge management system. The collaboration technologies listed here are just a sampling of what’s available. There are literally hundreds of collaboration technologies and depending on your particular needs you may choose one or another. Of course, it is best if you can find an all-in-one solution, such as Windows Small Business Server (SBS), which includes many or all of the technologies you need.

Collaboration Technologies to the Rescue Read More »

Email Best Practices

Why you should care… Email is perhaps the most important productivity tool available – yet its potential as a time waster is well known. It’s essential that you master this critical business tool and make it work of you. Email is one of the most indispensable collaboration tools for any business. Email has become such an integral part of our lives that we can hardly imagine life without it. Using email is not difficult. Using it effectively, though, is not easy. Everybody has experienced spam and how unwanted emails clutter up our inbox. Likewise, many of us have overlooked an important message that has gotten lost in an overflowing inbox. However, these are not the only cases when people are using email ineffectively. Here are some tips that will help you use email more effectively: Keep several email accounts . Having only one account means that generally you will be receiving dozens of messages a day, much of which is spam or is otherwise unwanted or unimportant. But even if your spam filters are working properly, you still should have several accounts. For instance, you should have a business company domain and be careful of using this to register or subscribe to services, and you should have another account for personal use with Gmail, Yahoo, MSN or another similar email service. Answer emails quickly . Good communication etiquette requires that you don’t keep people waiting for your reply. While you can’t be expected to answer emails immediately (unless it is an urgent matter, but then you’re better off using the phone), answering within a reasonable timeframe –one business day or less – is acceptable and increasingly expected. Manage your inbox . Even if you have several accounts and each of them is for different kinds of emails, your inboxes still will get cluttered. Managing your inbox effectively is one of the greatest improvements you can make in email use, so you may want to check this article on using email rules for advanced tips on effective inbox use. Use Folders . There are many emails that you want to keep after you have read them. Create a system of folders that makes sense to you so that after you’ve read and responded to an email you can move it out of your Inbox where it will distract you, to a folder where you can find it later if necessary. Distribution lists rules . Spam wouldn’t exist if there were no people who sent it. So, give your contribution to having a world with less spam and do not send unsolicited mails in bulk. Make sure that you are sending your emails only to people who want to receive them. Even better, check that you comply with the provisions of the CAN-SPAM Act of 2003. Do virus checks . Actually, the place for this tip is not near the bottom of the list — but let’s hope that your corporate security policy takes care of this and that you are not solely responsible for protecting your email against viruses and other malware. It might sound obvious that you should do virus checks, but even though email is a primary channel for virus distribution, many people still forget about virus checks. Don’t be one of them. Use advanced email tools . Going beyond the basics is always a challenge and as your experience with email grows, you will discover that it can offer much more than just sending and receiving emails. For instance, many email programs have a calendar function, which you could also use to improve your scheduling and collaboration within your team. Or saving emails that you need to act on later as a Task with a reminder so you can move it out of your Inbox. Using email is simple, yet in some ways difficult. The more you learn, the more questions you have. However, it’s a business fact of life today that you can’t live without email and you need to master it.

Email Best Practices Read More »

Inbox Rules

Reading this article will help you take control of email by reducing unwanted email and making your email time more productive. If you’ve never experienced the feeling of drowning in emails, then you are an exception. If this has never happened to you, publish your email address in a couple of sites where spambots get emails for spamming from and you will see how it feels to get dozens of junk emails a day. However, even if you are not drowning in spam, you still can receive many other unwanted messages a day, and soon you will discover that if you don’t know how to manage your inbox, the information overflow can be enormous. Here are some tips on how to manage your inbox effectively: Create separate folders for separate projects/people . One of the ways to deal effectively with information overflow is to separate the different streams of information. If you keep all your messages in your Inbox folder, soon it will contain thousands of messages, and it will be more difficult to find the message you need. You can create separate folders for different projects/people and file the emails into these folders. Create rules . Rules are one more way to optimize the flow of emails. Different email programs have different rules available, so you may want to check with your particular program to see which it offers. Almost always you can at least set rules for automatically moving/copying messages to/from a certain person to a separate folder. Use new message alerts . Very often you can configure alerts for new messages. If your email program does not have this feature enabled by default, you should consider enabling it. Manage spam filters . Spam filters are also part of inbox management, and depending on the amount of spam you receive, managing spam filters could take a lot of time. However, one of the important issues you must have in mind is that if your spam filters are not properly set, they could cut legitimate messages as well. So, set your spam filters with care. Use flags . Flags are a really useful way to separate a message from the rest. As with many of the other advanced inbox tricks, different email clients offer different flag systems, but almost any program offers flags for marking incoming messages as important, urgent, etc. If you have never used flagging, you will be surprised how easy and effective it is. There are many more tips, all of which are good to know. Actually, we are just scratching the surface and we could add more ways to optimize your inbox use! But if you apply even the tips above, you will experience significant improvement in terms of effective email use. Isn’t it time you took charge of you email?

Inbox Rules Read More »

Why Do You Need an IT Consultant

Reading this article will help you understand the pros and cons of internal IT Staff or external IT Consultants. In today’s world you’d be hard pressed to find a company that does not use computers, the Internet, and other information technology on a daily basis. In fact, there is hardly a company that does not rely on computers and networks for its mere existence. Whether we like it or not, IT plays a significant role in every business, and if you don’t ensure that your information system is working properly, your business is at risk. Do You Really Need an IT Consultant? Since your information system is so crucial to your business, you can’t afford to compromise with its quality. Technology is a pretty complex field, and unless you are a tech guru you might not be able to handle it on your own. But even if you can, you most likely have better things to do. As a small business owner your time is spent more productively focusing on your core business activities than on desperately trying to keep your network up and running. Additionally, downtime is not cheap, and it costs far less to hire a good IT consultant to maintain your network for you than to experience the losses of downtime. You are lucky if you have not already learned the hard way that relying on amateurs in IT, medicine, law, and many other fields is very dangerous, so you will hardly want to experiment in your own company with trying to become a first-class IT expert. While there are small business owners who do have the skills (and time) to manage their network, the majority prefer to have somebody else do it for them. Keeping in mind the speed at which information technology develops, it is quite understandable that many small business owners, even if they are IT-proficient, aren’t able to keep up with this constantly changing field. Therefore, many small business owners agree that the best solution is to hire a specialist. Employ an IT Specialist Full Time — or Hire an External Consultant? After you have decided that you need to hire somebody to maintain your information system for you, the next step is to decide whether you need an in-house expert or an external consultant. Depending on your specific situation, both alternatives have their pros and cons. Hiring an in-house IT specialist — This is a good choice if you have 30-40 or more computers or use complex applications that require ongoing maintenance. However, generally speaking, hiring an in-house IT specialist is rarely the best option for small companies who don’t need the level of IT attention to justify a full-time IT expert on payroll. Having a part-time IT expert is also an option, but very often it’s difficult to find a good IT expert who is willing to work part time. Also, for many people, a part-time job is only a temporary solution until something more permanent comes along. Because of this, part-time employees often leave when you need them most. And even worse, they leave taking important information about your systems with them, so when you finally replace them, it takes the new person valuable time to become familiar with the configuration of your network and applications. Hiring an external IT consultant — This could be the better choice, and not only in terms of money. The advantage of hiring an external IT consultant is that you call them only when you need them, avoiding costly full-time salaries. Hiring an experienced and knowledgeable IT Consultant gives you the best of both worlds: part-time, highly specialized help, and the consistency and reliability of a full-time employee. However, In most cases, it’s best to have an IT Consultant on a monthly fee – and that’s certainly what our clients prefer. Companies that get out of the ”fix-it-when-it-breaks” mode of thinking benefit from relying on an experienced IT Consultant as a trusted advisor, performing preventative work and helping them plan for the future. This is known as Managed Services. What to Look for When Hiring an IT Consultant Hiring an IT consultant is not that different from hiring in-house employees, but it certainly has its advantages. To get an idea of what to look for when hiring an IT consultant, you may want to read this article . You don’t handle complex legal issues without your attorney – do you want to entrust the smooth functioning of your business to chance or unqualified hobbyists? What Next? Review your business plans, and determine if you are happy with your current IT capabilities and performance. Talk to other businesses and associates and learn how they are using IT to better manage their business. Get their recommendations for IT Consultants and interview a few until you find one that meets your needs and standards.

Why Do You Need an IT Consultant Read More »

Scroll to Top