Monthly Archives: November 2018

Removing SAVEfiles Virus and Others with Webroot

Hands on a keyboard removing SAVEfiles virus with Webroot

Protecting workstations and servers is critical in preventing downtime

SAVEfiles is a recent high-profile web virus making its rounds on the internet. It is attacking Windows based computers, workstations and servers with the goal of locking out the user and encrypting key files through AES and RSA algorithms. The hackers demand a ransom (in the form of Bitcoin) in order to restore full service. Like the WannaCry virus before it, this is a dangerous malware that should be avoided at all costs. In the case that it has infiltrated your system, there are a few things to know.

Response

First and foremost, users should not under any circumstances actually send the funds to the hackers. Most likely the scammers will not send the encryption key and the victim will simply be out his or her money with no result.

Secondly, even if the hackers send the encryption key, it will most likely be located on another malicious server location. Accessing that server may allow your computer to download or access additional malware. That malware could spread to other people in your network or simply lock additional files on your computer. So it is ideal to avoid this result.

Next, use reimage repair to start over from the beginning with your Windows system. That detects the ransomware and helps to restart and avoid the malware. Finally, use a high quality anti virus tool like Webroot to eliminate the malicious software and free yourself of the damage.

Anti-Virus Tools

In order to solve this dilemma, the best thing to do is apply a Webroot Anti-virus tool. It is an evolution of the well-known Spy Sweeper product. It has a handy “fix it now” feature that does not require the user to do anything but click the button to resolve the problem. At that point, the software will search the entire system for foreign, unauthorized files and eliminate them.

Webroot has a vast library of potential viruses that it can knock out with ease. Additionally, it can detect new files that enter the system if they are not authorized. It will then eliminate those after the user authorizes it.

Webroot has one the Virus Bulletin certification for excellence four times. ICSA labs has also certified it as a dependable anti virus solution for computers and servers. For this reason, many people are willing to rely on it to fix their systems.

The Webroot version 7.0 is the most impressive release yet. This version has much better user interface design. It also divides messages into “Green”, “Yellow” and “Red” so that it is very simple to prioritize. Green means that the system is clear, yellow messages are warnings and red messages indicate a virus must be removed. It also offers automatic periodic scans that are either Quick Sweeps or Full Sweeps.

Other Actions

In the future, there several additional security steps you may take. Firstly, you can purchase a USB stick and keep sensitive files in this device offline. Additionally, you may keep redundant files in different locations on the cloud. That way, if your device is compromised you still can access the important files from another device.

Of course, don’t click on suspicious links or download software from unverified sources. These are the most common sources of viruses online.

Make sure to change passwords every so often so that if the device is compromised once, it won’t continue to be compromised.  Network admins should make sure to have different passwords and authentications for different levels of the network as well.

Get Started

Webroot Antivirus is a leading provider of antivirus tools. They have helped large and small companies attack malicious software and prevent it from infecting an entire network. For more information, please contact us.

IT Help Desk Support: The Knowledge Base

IT Help Desk Support - woman on a phone at her desk

IT Help Desk Support

One of the most important tools that your business’s IT help desk will need is a knowledge base. When your business does not have a knowledge base, your organization will increase the chances of providing support that is inconsistent, as well as customers who are unhappy and long telephone calls.

An effective knowledge base will also hold information that will help your customers and your end users to resolve some issues on their own, a long list of frequently asked questions, and additional documents that everyone in your support staff can access at any time. There are multiple ways that your IT help desk and IT management systems can benefit from using a knowledge base.

Obtaining More Knowledge

There will be many organizations that will have one person who knows a significant amount of information about IT and technical issues. While these people are always great to have around, sometimes others in the organization will direct all the hard questions to the IT help desk expert without taking the time to learn what needs to be done. Many people in the workplace will feel that documentation can be placed on hold because there is already someone who knows what to do. What will happen if that IT expert leaves the workplace? All of the knowledge that was once there is gone now and where will that leave everyone else? You will not have to worry about this happening with a knowledge base because the knowledge will always be there.

Reduction in Call Volume

Since your IT help desk agents will have the knowledge they need to find answers to their questions, the length of time they will spend on the telephone speaking to customers and end users will decrease. Instead of your customers and end users being placed on hold while IT help desk agents are asking questions, the help desk agents will be able to find the document they need, resolve the problem, and take the next customer’s phone call. When you can resolve problems quickly, customers will now spend less time waiting to receive assistance.

Reduction in Ticket Volume

When customers use your IT help desk’s knowledge base to find answers to their own problems, there will not be a need to constantly create support tickets with the IT help desk. Your IT Help Desk’s knowledge base can be used in the portal, the customer will be able to access the knowledge base area to create a ticket. When a customer finds information that helps them, they will be able to return to their job task with a solution.

Reduction in Costs

When you are able to save time by reducing call volume, tickets, and the length of phone calls, it is very likely that a knowledge base will help your organization save money on all support costs. While you are saving money by lowering costs, you should feel confident in knowing that you will not reduce the level of quality when it comes to the support you provide. You will actually be improving the quality of support because you will be providing support that is effective, efficient, fast, and consistent.

An IT help desk that has a knowledge base that is available at all times of the day will give everyone the opportunity to research a problem and find a resolution even when the help desk is closed. Not only can a knowledge base help you save money when it comes to operational costs, but you will also improve your chances of providing high-quality support that will remain consistent.

How efficient is your IT help desk? Does your help desk have a knowledge base that provides quality support? For more information on our IT help desk services, please do not hesitate to contact us today.

Why Businesses are Adopting VoIP Phone Service

Smiling Delivery Driver using VoIP

Can customers get a hold of you?

A company’s phone service is a crucial part of operations. All customers expect to be able to call in if they want to, even if they usually use other methods of communication. Phones are also essential for communication between employees, to suppliers, and other key people. Yet, more and more companies are telling their traditional phone services to go ahead and cancel their accounts.

VoIP: The Modern Telephone Option

VoIP, or Voice over Internet Protocol, is behind the shift in the way companies handle their telephony needs. This service, also known as “hosted PBX” or “internet phones,” provides all of the benefits of local PBX systems and more. It is often cheaper as well. When the factors are combined, they provide distinct benefits over standard landline phones.

  • VoIP phone systems can be accessed in many ways. You no longer need separate numbers for cell phones, office phones, and home phones. You and your employees can log into a company VoIP system from any location; all they need is the password to their accounts. This makes it so that someone like a salesperson can sit at home to make calls without losing any of the benefits of the office phone. The system will show the office’s number for his call, allowing the privacy of his home phone number to remain uncompromised. It works the same way for calling from mobile phones and even hotels.
  • VoIP phones offer all of the benefits of PBX systems. This is why they are sometimes referred to as “hosted PBX” systems. You get standard office phone system features like hold music, 3-way calling, call blocking, unlimited voicemail, unlimited local calling, international calling, caller ID, and much more.
  • VoIP surpasses landline PBX systems in many ways. You don’t have to fuss with complicated equipment, install dedicated phone lines, buy expensive hardware, or buy new hardware when you expand. Instead, everything is administered through an easy online interface. The physical connections are done using your cable internet lines, so if you already have those at all of the necessary workstations, you’re all set when it comes to connectivity.
  • Scalability is no problem. Our VoIP services can handle anywhere from one to 500 lines.
  • Our software updates are free. You won’t be hit with surprise costs just to keep your system secure and functional.
  • You can keep your current phone number. There is no need to have a landline to enjoy the benefits of number portability.
  • In almost all cases, VoIP systems sound as good as their landline equivalents. All it takes to enjoy excellent sound clarity is a good, hardwired broadband internet connection (cable or better). This sort of connection allows voice data to be transmitted with no lag, dropped packets, or other problems. As long as you have cable, customers will never know you’re using VoIP unless you choose to tell them.

With all of these benefits, it’s no wonder that businesses are switching to VoIP more and more. There is no need to pay high landline costs or deal with expensive phone packages that are padded with useless features. Instead, VoIP offers reasonable costs, the freedom of being able to use the company phone system away from your desk, and freedom from the expense and hassle of dealing with an on-site PBX box. You also don’t need to lease an expensive T1 or other high-end line – standard cable internet will do the trick in all but the most congested markets.

To learn more about our VoIP offering or VoIP in general, just contact us here at SystemsNet. We’ll be glad to discuss your needs and get you set up with the most modern telephony option that will do everything you want.

5 Ways to Prevent Malware From Sneaking Onto Your Business Network

Prevent Malware - computer security concept

Malware is ever changing and always finding new ways into your device

The single biggest challenge of business cybersecurity is the fact that malware is built to be sneaky. It would be one thing if a hacker attack always triggered alarms and your IT team could fight them off like a castle siege. Or if you could always know what kind of malware would attack and prepare to defend against it. But that’s not how hackers and their automated malicious software work.

Instead, it is their goal to find gaps in your security, slip onto the system, and lurk until there is a way to do damage or otherwise exploit your company. Whether it is spyware, spamware, or ransomware, these malicious programs find ways to sneak into your business network in a wide variety of underhanded and unseen ways. Many businesses today are currently infected and have no idea that their data is being gathered, their IP address is being used for spam, or there is a ransomware attack waiting to strike.

We’ve put together five simple ways that your company can use to prevent malware from sneaking onto your business network in the first place. While hackers are always looking for a new angle, a comprehensive defense can significantly reduce your chances of getting a dangerous malware infection.

1) Fine-Tune Your Firewall

The first step is to make sure that your existing cybersecurity measures are not only strong, but detailed. A firewall is only as effective as it’s settings, and most default firewall settings are not sufficient to block cleverly designed malware. Open ports and generalized policies leave security gaps that malware, disguised as normal business network activity, can slip through.

Masking malware invasions is the primary way that hackers sneak through a firewall. The programs look and act like something firewall default settings will allow and then download themselves right onto your network. Work with your IT team and managed service provider to fine-tune your firewall so that only very specific work activity with key identifiers can make it through.

2) Employee Cybersecurity Training

Human error is actually the leading cause of business malware infections because employees must interact with outside sources like websites, downloads, and client communications in order to do their jobs. This is why hackers have long-since targeted employees with tactics like infected websites and phishing emails.

Your team can be trained to recognize dangerous websites, suspicious “client” interactions, potentially infected downloads, and phishing email attempts so that these are no longer an avenue for business malware infection.

3) Regular Virus Detection Scanning

It’s also safe to assume that at some point, malware will find it’s way onto your network. In fact, there might be some lurking right now from a time before you increased your cybersecurity procedures. This is why virus scanning is so important for both individual workstations and the network as a whole.

There are a variety of virus scanning solutions. There are programs that scan email attachments, computer hard drives, database servers, and complex networks. Make sure to perform comprehensive scans regularly to ensure that particularly sneaky malware does not stay for long.

4) Audit Employee Mobile Devices

Another dangerous avenue for malware infection are employee phones, tablets, and laptops. The more personal a device, the more likely it is that an employee has used it without a business-level of cybersecurity caution while at home or on vacation. The problem is that when these devices come into the workplace and connect to your office wifi, they might be bringing malware riders along with them.

It’s best to make a company policy that requires monthly virus scans of employee mobile devices, particularly if these devices are provided by the company. If employees are uncomfortable with having their personal devices checked for malware, ask them to refrain from connecting to the central company network with unsecured devices.

5) Work-Only USB Drives

Finally, watch out for USB drives. These incredibly useful little devices are great for transferring data from one computer and location to the next, but they can also be carrying infectious malware programs without the knowledge of the user. Once again, this is an especially serious risk when employees are using USBs they have brought from home.

If your workplace uses or permits the use of USB drives for file storage and transfer, make sure the drives are scanned and fully wiped regularly and consider limiting employees to only using work-provided USBs (that you can regularly secure) for plugging into work computers.

Malware is designed to be slippery, to hide on infected devices and to spread to new devices and networks when possible. Protect your business network from sneaky malware infection by covering all your bases, scanning for viruses regularly, and limiting employee’s ability to accidentally bring viruses to work from less careful personal online activities.

For more expert cybersecurity advice, a consultation on the health of your network, or a new MSP partnership for your business, contact us today!