Locky – another easily preventable virus doing plenty of damage already…

Here we go again.  Social engineering at it’s finest.  This time it’s a Word document, and like the early versions of CryptoLocker, it needs more interaction by the user then just opening it.  Early CryptoLocker needed a password entered to open the ZIP file.  Locky needs Macro’s to be enabled in Word.  And will prompt the user!  Unless they are already enabled and set to trust all.

If I were to write another warning for end users.  And I may have to.  It might be a little more aggressive and a little less polite:

  • You are going to receive a virus in your email
  • The email containing the virus will be designed to trick you
  • It has the potential to encrypt all of your companies data
  • The spam filter will not catch it
  • The antivirus will not catch it
  • The firewall will not catch it
  • Don’t assume that all your data is backed up
  • Make sure it is, your desktop too

http://www.bizjournals.com/sanantonio/news/2016/03/24/ransomware-virus-that-hit-a-kentucky-hospital.htmlhttp://www.bizjournals.com/sanantonio/news/2016/03/24/ransomware-virus-that-hit-a-kentucky-hospital.html

https://krebsonsecurity.com/2016/03/hospital-declares-internet-state-of-emergency-after-ransomware-infection/

www.passkeyinc.com

Posted in Uncategorized | Leave a comment

Ransomware not slowing down

Great article with a couple good resources.

My take:

* Backup any data
Make a list of where it resides
Include how it is backed up
Make sure it is off-site as well
Consider using two methods
* Keep up with your security patches
Microsoft
Adobe
Java
Those are the big three, but keep all up to date
* If you run a business, Employee Training is your #1 defense

You can have the safest car ever made.  The brakes, the steering, the airbags, the frame, but it doesn’t mean you can stop the driver from steering into a tree…

https://blog.knowbe4.com/deadly-dridex-cybercrime-gang-has-just-moved-into-ransomware

www.passkeyinc.com

Posted in Uncategorized | Leave a comment

Force feeding Windows 10

Time will tell what Microsoft is up to and why they are pushing Windows 10 so hard.  They have made it free, easy to chose to upgrade, and now making it a “recommend” upgrade in Windows Updates, that many users are complaining they did not have a chance to say no.  Great article in PCWorld.

http://www.pcworld.com/article/3043464/windows/windows-7-users-complain-of-unprovoked-windows-10-auto-upgrades.html

 

Posted in Uncategorized | Leave a comment

IT Security Policies

Found this great article on SANS.  Super important to at least have an eye on you security on a regular basis.  The last thing you want is to be in court, whether for real, or the court of public opinion, after a breach, admitting you had no formal plan.  The article has a link to security policy resources at the bottom.

https://isc.sans.edu/diary/Your+Security+Policy+Is+So+Lame/19991

Posted in Uncategorized | Leave a comment

Sony, the more things change…

The more they stay the same.  Yes the landscape just changed.  Forever.  But the way we protect ourselves.  Our companies.  Our data.  Doesn’t change.  Sure there are some new threat definitions.  Some new rules and filters that will be added or changed by security vendors.  But so many best practices remain.  You still shouldn’t be sharing C-Level password credentials.  And you certainly shouldn’t emailing them around, with no encryption.  Role based security is still key. And keep it to as few levels as possible.  “The secret sauce”, say an unreleased movie, should be behind sharks and laser beams.  The important stuff, payroll, financials,  private conversations, should all be protected, audited and reviewed.  And stuff that doesn’t matter.  Leave it.  Spend your time guarding what’s sensitive.

Who has access to your data?  Would you know if they took it?  Do you pay attention to your security?  Spend money on it?  Do you have a plan?  A written plan?  Does someone audit it?  What would happen if you had a breach?  Customer data was made public.  Who would be the fall guy?  Would it be the IT department?  Or the department that funds or chooses not to fund the IT department’s recommendations.  Being secure is expensive.  Being “locked-down” secure is really expensive and time-consuming.

So why don’t we outsource it all?  Put our data in the cloud.  Office 365.  SalesForce.  Hosted medical systems / accounting / insurance.  Let them handle the security.  That will save you a ton of money.  They have the expertise, the time, the budget.  True.  But I can’t help but fear they have the same challenges.  Budget constraints.  Lack of attention from the decision makers.  And they have an issue most of us small businesses don’t.  Amount of records.  The size of the treasure.  A small business may have 10,000 records, where a cloud provider that houses hundreds or thousands of businesses could have millions.  Billions even.  I don’t know if I trust that anyone can do cyber security air-tight anymore.  Not unless you have a monster budget, a real commitment from the top and a talented team.

So what do I want to focus on?  The secret sauce.  Our employees data.  Their private details.  And of course, customer data.  We are constantly be watching for better ways to review logs on our firewall and other valuable systems.  And new methodologies, technologies.   Example: I’m hoping there becomes a more efficient and economical way to monitor all file activity.  Moves, copies, deletions and modifications.  For the small business budget.

Most important, keep building our checklist.  Our security checklist.  And review it again and again.

Last year my New Years Resolution was documentation.  This year.  Security.

If you think it’s locked down, review it again.

Written by Bret Erickson
Passkey Computer Services
www.passkeyinc.com

Posted in Uncategorized | Leave a comment

The top causes of downtime explored

Great article by www.quorum.net.  I’m actually surprised the natural disaster percentage is that high.

http://www.continuitycentral.com/news06645.html

Bret Erickson

Passkey Computer Services – http://www.passkeyinc.com

Posted in Uncategorized | Leave a comment

How do the FBI and Secret Service know your network has been breached before you do?

Fantastic article by Ellen Messmer for Network World.

How do the FBI and Secret Service know your network has been breached before you do?

Posted in Uncategorized | Leave a comment

Largest collection of FREE Microsoft eBooks ever!

Wow!  Talk about tons of free resources.  If only I had the time to read all these!!!

http://blogs.msdn.com/b/mssmallbiz/archive/2014/07/07/largest-collection-of-free-microsoft-ebooks-ever-including-windows-8-1-windows-8-windows-7-office-2013-office-365-office-2010-sharepoint-2013-dynamics-crm-powershell-exchange-server-lync-2013-system-center-azure-cloud-sql.aspx

Posted in Uncategorized | Leave a comment

Amazon Zocalo rocks Box, socks DropBox, clocks Google Docs

Looks promising.  Active Directory integration.  Still look for something to emulate the server share.  Everything in one place with permissions, rather than users sharing their content only.  That said this is priced low.

http://www.theregister.co.uk/2014/07/10/amazon_zocalo/

Posted in Uncategorized | Leave a comment

CEO Nadella promises to shake-up Microsoft’s culture: ‘Nothing is off the table’

Great article!  Love the picture of the only 3 CEOs to rule Microsoft.  Big shoes to fill!

http://www.pcworld.com/article/2452820/nadella-on-microsofts-culture-change-nothing-is-off-the-table.html

 

Posted in Uncategorized | Leave a comment