Category Archives: Anti-virus

Addressing the Cybersecurity Risks of Working from Home

Risks of Working from Home

A remote workforce has become the norm since the pandemic. Even now that we consider it safe to return to office work, many businesses have maintained the remote work setup because of the advantages. However, the risks of working from home also bring issues that need attention so as not to risk the company’s network and data.

What Are the Cybersecurity Risks That Come with Working from Home?

There are risks when working from home. Workers lack the usual protective measures used in an office network. Many workers use their home networks and may also use the same device for both work and personal things. Because of this, there are a lot of security issues that can arise and possibly cause damage to the company.

The Risks of Vulnerable Personal Networks When Working From Home

You can keep your home network protected by regularly updating your antivirus software. However, most people do not realize there is also a need to update their router software. Without doing this, you will make your home network, and sadly your work data, open to the prying eyes of online criminals. Which can risk your company data when working from home. 

Greater Reliance on Technology

Now more than ever, we rely heavily on online tools for doing all kinds of business. Besides the basic emailing and sending of files, Almost everything else gets done using digital technology, from video calling to banking to fulfilling orders. This widespread use of online tools gives higher risk when working from home. As a result, hackers have more opportunities to hack company records.

Lack of Cybersecurity Awareness

In the office setting, IT people take care of any cyber security issues. Thus, employees do not take such matters too seriously as it is not their primary work, although they are still liable. You must train them in cybersecurity and be sure they are aware of potential issues when working at home. But, this is not the case since most employees still lack adequate skills and knowledge to avoid these cybersecurity threats.

Fatigue and Lack of Focus

Human error is still the most common cause of data breaches, and this is especially true in a remote work setting. Studies have shown that almost 40% of work-from-home employees feel really tired in the remote work setup. In addition, they also need to juggle home chores, which reduces their focus on applying cybersecurity protocols and makes them lax in their judgment. All these things combined can greatly increase the chance of remote employees exposing the company’s confidential files to hackers by accident.

Risks of Weak Passwords When Working From Home

In trying to bypass company networks through remote workers, hackers will try to crack the user’s passwords. It is the easiest method, and it just so happens that many people still use weak passwords, even for sensitive accounts.

The Risks of Using Personal Devices When Working From Home

In the typical office environment, employees will use computers sent by the company with current malware protection. When working at home, however, people use their laptops or smartphones. These are likely to have less than adequate IT security measures installed, like data encryption.

Making Remote Work Safer From Cybersecurity Risks

There are many benefits to working from home. If you feel this is the best strategy for your company, go for it. However, make sure that all remote processes are completely secure. This step is where we can help!

Since we are focusing on cybersecurity this quarter, we have developed a little Quiz for you and your employees to take. Not only is the Quiz fun, but it counts toward your Employee Cybersecurity Training! Access the Quiz Here!

Our cybersecurity experts can equip your company and your remote workers with the skills and technology to stay protected from malware attacks and other online threats. Contact us to learn more about our comprehensive and fully customizable cybersecurity services today!

Telltale Signs of a Phishing Attack

The main reason phishing has become such a prevalent problem is that it works. And hackers keep finding new ways to increase the success rate even further. What used to be easily distinguishable attempts at stealing information have now become brilliant scams that look valid at first glance.

However, this doesn’t mean that phishing attacks always work. All that’s needed is for everyone to stay vigilant with online communications and ensure they know what to look for to identify a phishing scam. Here are some of the most important signs you should look out for.

Fake Email Address

Very few people stop to look at the sender’s address when they get an email. Most of the time, employees will glance at the subject line and check the message. If the recipient checked the validity of an email address, it might prevent most phishing attacks.

Amateur cybercriminals might use free email accounts like Gmail or Yahoo to send a phishing scam. Major players, however, use email domains just like real email. For instance, if you get an email from someone@amazonprime.az rather than someone@amazonprime.com, you’d better be wary.

Inconsistencies in Writing Style

If the style of writing is suspiciously different from what you have been getting from what appears to be the same sender, this can be a sign of a phishing hook. Also, some countries use different date formats. If date formats are not what you are used to, that’s also one sign.

Errors in Grammar and Spelling

Official emails get checked for grammar and spelling mistakes or go through basic spellcheck. A few minor typos and one or two misspellings are forgivable, but email with blatant errors, especially if it is supposed to be from a reputable company, is a good sign of a phishing scam. It’s likely because the hacker used an automated language translator to mass produce the message for potential victims.

Suspicious Attachments

You should never open attachments unless you are expecting them or if you can confirm with the actual sender that they indeed intended them for you. Otherwise, don’t open it, no matter how legitimate looking the filename might be. It’s likely they loaded these attachments with malware that will unleash themselves on your system once you click on them.

Fake Links

No one would knowingly click on a fake link, but these phishing emails are made to look so real. To check whether they are valid or not, hover over them and read the URL, particularly the domain name. If it seems questionable, that’s because it probably is. Delete the email and don’t give it a second look.

There is no 100% guarantee of protection against phishing attacks but looking out for these telltale signs is an excellent first step. As a business owner, be sure that all your employees know these signs and that you have properly trained them on the critical security measures against online threats. For more about these threats and what you can do to protect your business, start your new Employee Training today and have everyone in your office watch our Free Cybersecurity Webinar.

It’s time to take cybersecurity seriously. Call us and let’s protect your business today.

4 Signs that There’s Malware Hiding on Your Work Computer

Portrait of shocked and surprised IT manager realizing there is malware hiding on the work computer

Having a proactive plan to deal with malware can minimize the impact

Malware comes from everywhere. You can pick it up from files, websites, interesting PDFs and so much more. Everyone is subject to a little malware and it’s understood that professionals who must access the internet for work will inevitably get some kind of malware on their work computers. That’s just the world we live in now, and businesses have long since adapted to the idea of Backup Recovery when cybersecurity is never 100%.

But as a professional living your day-to-day, it’s also important to know how to identify malware when you pick it up. Unlike when the trend started back in the 90s, modern malware is pretty darn sneaky. It doesn’t cover your screen in ads anymore or obviously open and close programs. Instead, it eats your processor speed and steals your data in the background. Sometimes for months before you realize.

Today, we’re here to share four of the most tell-tale signs that there’s malware hiding on your work computer and it’s time to do a little BDR with a fresh operating system.

 

Unusually Slow Performance with Offline Programs

Internet speed ebbs and flows, even in the most high-speed office or the quietest residential neighborhood. You may expect the occasional slow performance due to internet speeds (or you may not) but slow offline programs are a completely different story.

You know your computer. You know how fast it can handle the offline programs you use regularly. Things that don’t need the internet like a simple calculator, word processor, or image editor. If you’re getting serious lag and latency when you should have your computer’s whole processing power to yourself, this can indicate that you’re sharing power with malware.

A malware program may be able to hide its install location or running processes. But it can’t hide the resources it uses up.

 

Unseen Programs that “Refuse to Close” When You Reboot

When you reboot your computer, Windows will tell you if there’s a program that didn’t close out smoothly with the ShutDown command. Often, this is just a Chrome browser you didn’t fully close. But sometimes, it’s a surprise. Your computer may tell you that Internet Explorer or Microsoft Edge are still running when you never use those programs. It might tell you something called xvb55t is running and won’t close, and that is a definite tip-off.

If something is opening programs invisibly on your computer and won’t close when you shut down… that’s malware. No two ways about it. And it’s time to fully wipe your system, because it’s hidden deep.

 

Your Web Extensions Aren’t Working as Expected

So often, web extensions are the cause or target of a malware attack. Most modern professionals run with some kind of ad blocker on. If you use Adblock plus, for example, it tends to pop open an extra tab nearly every time you open a new browser window. Especially from a new or recently cache-cleared device. If that browser window stops popping open, or if any of your other extensions start acting in an unusual or suspicious fashion, malware is often the cause.

You may want to clear your caches, prune your unused extensions, and possibly recover the entire computer to make sure no malware files have been hidden on your computer.

 

After a Scan/Clean/Reboot, You Still Scan Trackers

If you have a manual scanning program like CCleaner or something similar and you suspect there’s malware on your computer, there’s one sure way to check just how virulent that malware really is.

Start with a scan-clean cycle. Scan for trackers and junk and clear them. These could be anything and are often just clearing your temp files of web-junk that could be slowing you down. Reboot your computer, then do another scan. Find new trackers? Find new junk? There’s malware adding malicious crud to your computer as soon as it gets a chance. Also, watch your scanned-for and threat-eliminated results. If the scanner says 1 tracker was found, but it eliminated 3 trackers by the end-report, those trackers were added while the sweep-and-clear was ongoing.

You not only have malware, you have seriously aggressive malware and BDR is the best option.

Find malware on your computer? Have a really intense suspicion that there’s malware lurking? Now is the time to use your company’s backup recovery plan or get in touch with your IT help desk for guidance on how to fully wipe and safely restore your work computer. For more cybersecurity, backup recovery, and malware protection insights, contact us today!

Removing SAVEfiles Virus and Others with Webroot

Hands on a keyboard removing SAVEfiles virus with Webroot

Protecting workstations and servers is critical in preventing downtime

SAVEfiles is a recent high-profile web virus making its rounds on the internet. It is attacking Windows based computers, workstations and servers with the goal of locking out the user and encrypting key files through AES and RSA algorithms. The hackers demand a ransom (in the form of Bitcoin) in order to restore full service. Like the WannaCry virus before it, this is a dangerous malware that should be avoided at all costs. In the case that it has infiltrated your system, there are a few things to know.

Response

First and foremost, users should not under any circumstances actually send the funds to the hackers. Most likely the scammers will not send the encryption key and the victim will simply be out his or her money with no result.

Secondly, even if the hackers send the encryption key, it will most likely be located on another malicious server location. Accessing that server may allow your computer to download or access additional malware. That malware could spread to other people in your network or simply lock additional files on your computer. So it is ideal to avoid this result.

Next, use reimage repair to start over from the beginning with your Windows system. That detects the ransomware and helps to restart and avoid the malware. Finally, use a high quality anti virus tool like Webroot to eliminate the malicious software and free yourself of the damage.

Anti-Virus Tools

In order to solve this dilemma, the best thing to do is apply a Webroot Anti-virus tool. It is an evolution of the well-known Spy Sweeper product. It has a handy “fix it now” feature that does not require the user to do anything but click the button to resolve the problem. At that point, the software will search the entire system for foreign, unauthorized files and eliminate them.

Webroot has a vast library of potential viruses that it can knock out with ease. Additionally, it can detect new files that enter the system if they are not authorized. It will then eliminate those after the user authorizes it.

Webroot has one the Virus Bulletin certification for excellence four times. ICSA labs has also certified it as a dependable anti virus solution for computers and servers. For this reason, many people are willing to rely on it to fix their systems.

The Webroot version 7.0 is the most impressive release yet. This version has much better user interface design. It also divides messages into “Green”, “Yellow” and “Red” so that it is very simple to prioritize. Green means that the system is clear, yellow messages are warnings and red messages indicate a virus must be removed. It also offers automatic periodic scans that are either Quick Sweeps or Full Sweeps.

Other Actions

In the future, there several additional security steps you may take. Firstly, you can purchase a USB stick and keep sensitive files in this device offline. Additionally, you may keep redundant files in different locations on the cloud. That way, if your device is compromised you still can access the important files from another device.

Of course, don’t click on suspicious links or download software from unverified sources. These are the most common sources of viruses online.

Make sure to change passwords every so often so that if the device is compromised once, it won’t continue to be compromised.  Network admins should make sure to have different passwords and authentications for different levels of the network as well.

Get Started

Webroot Antivirus is a leading provider of antivirus tools. They have helped large and small companies attack malicious software and prevent it from infecting an entire network. For more information, please contact us.