Category Archives: Anti-virus

Backup Disaster Recovery and Dealing with Computer Viruses

20161118

A backup disaster recovery plan can ensure that, if you’re affected by a computer virus, your information will remain safe.

When you’re in the workplace, you always need to have a plan for combating viruses. Hackers are becoming tricker in their tactics, and it’s imperative that you’re outwitting them. In fact, viruses and other malicious software, should always be a cause for concern in the workplace. While it’s true that those aren’t the only disasters which may occur, they certainly leave the most lasting impact. For example, let’s say there was an unexpected power failure, or liquid spilled onto your keyboard. While these are damaging, at worst, you might simply lose any unsaved files.

With computer viruses however, some of these erase all the data on your hard drive, and make your device completely inaccessible. What is the best way to deal with these attacks? First of all, you need to have a disaster recovery plan. That way, even if your device does become infected, all your files are easily recoverable. However, just because you have a backup disaster recovery plan, that doesn’t mean you should seek out computer viruses, or be laid back about your security. We’ll get back to this discussion, but in the meantime, let’s look at the best way to actually combat these attacks from cybercriminals. After all, a recovery action plan is one thing, but you want to deal with these threats directly as well.

Anti-Virus Software

Even the most inexperienced businesses know that anti-virus software is the most common way to deal with…well, viruses. Whether you’re using McAfee or Kasperky Security, network protection is great for preventing your computer from getting infected. Without security on your computer, the Internet is a dangerous minefield. One wrong move, and you could be taken out.

However, having anti-virus software for your company isn’t enough; you need to have the right security as well. For example, have you installed the most recent software available, or have you been using the same program for years? Many hackers look for security holes and vulnerabilities in outdated software. If you’re not using the latest anti-virus software, for example, it might be easier for them to attack you.

One thing that makes these programs great isn’t just the network protection, but it secures you while you’re on the Internet as well. Many programs now have safe features which block malicious pop-ups on websites, and even warns you of sites that are dangerous. If you make a careless mistake and go to the wrong site, for example, you’ll be prevented from going any further. Overall, anti-virus software is one of the most important and basic tools for protecting your business.

Now that we’ve discussed the basics for protecting your business, let’s get back to having a disaster recovery plan. It may not combat viruses directly, but how is it effective when your business is under attack?

The Effectiveness of a Backup Disaster Recovery Plan

First of all, it’s effective because it makes the cybercriminal’s attack, completely ineffective. They lose all sense of power, and no longer accomplish their goal. In fact, let’s look at it this way. Let’s say you had multiple backup methods, storing your data via a flash and cloud computing. If a hacker infected your computer with a virus that erased the files on your hard drive, you’d have nothing to lose. You might need a new computer, and you’d still have to get the virus off, but your data is safe and sound. All files are still stored on your portable device, and even accessible via cloud (the Internet).

Overall, you can’t have one without the other. Combating viruses directly is important, but what if you need to recover your data, and don’t have a recovery plan? On the other hand, don’t completely rely on a backup plan, without having programs to combat these viruses, either.

For more information about the importance of having a backup disaster recovery plan, especially when dealing with malicious software, feel free to contact us today at SystemsNet. We look forward to hearing from you, and assisting you in the best way possible.

Why should you install Webroot Antivirus?

20160722

Webroot Antivirus is an award-winning antivirus software that is effective and affordable.

Antivirus programs are a critical cyber security defense. A high-quality program will have the capacity to block a wide variety of attacks launched from different sources.

Cyber criminals are constantly coming up with malware to infect your computing devices. Depending on the kind of malware they use, your device may stop working. You could get locked out of programs and files. Your personal information, including passwords, could end up exposed and stolen, resulting in potential financial losses and identity theft. Cyber criminals can also turn your computing devices into bots that launch attacks on other computers, even without you knowing it.

Your antivirus software is a critical line of defense against cyber attacks. Although you can’t rely on an antivirus program alone to combat cyber crime, you need a high-quality program installed on your devices.

Why choose Webroot?

As with any other software, antivirus programs vary in quality. It’s important to buy a program that meets high performance standards and offers you efficient, cost-effective service.

Webroot Antivirus, which works for PCs and Macs, is a highly rated, award-winning program. The following are several reasons you should look into Webroot for your cyber security needs:

  • Real-time, cloud-based protection. Antivirus programs generally maintain a database containing known malware and rely on it to identify and block attacks. Instead of storing their database on your local devices, and requiring you to update it periodically, Webroot maintains its database in the cloud. The database gets updated in real-time and contains a gigantic list of all known malicious programs. When new threats come along, Webroot immediately performs sophisticated analyses on them. If the program is unknown, Webroot takes steps to find out more about it before allowing it to do certain things on your computing device.
  • Less interference with your device. You can successfully install Webroot in less than a minute. The program takes up very little space on your device, leaving much more computer memory at your disposal. Furthermore, it usually performs scans in only a few minutes at most. Other antivirus programs typically take at least 10 times longer to complete a scan of your device. Even though Webroot’s scan is significantly shorter, the program is still thorough. Once it detects and deals with a virus, it performs additional scans until the results come up clean.
  • A plethora of services. You can choose among different Webroot plans, and even the most basic one contains a variety of important services. These include a firewall, ransomware protection, and the detection of fake or malicious websites that trick people into disclosing personal information or downloading infected files. Webroot also offers enhanced identity protection, keeping your passwords and other user information more secure as you browse the Internet.
  • Available for multiple devices. These days, you need antivirus programs for phones and tablets, and not just for desktop computers or laptops. Many people use their smartphones for both personal reasons and work-related tasks. Their phones are full of sensitive information. With phones, people are also more likely to use public Wi-Fi, which remains unprotected and exposes their device to unauthorized users. Webroot offers versions of its program for multiple devices, including tablets and phones. For basic protection, there are free apps available for both iPhone and Android devices.

Please contact us to further discuss picking the best antivirus program for your computing devices. We recommend Webroot for its high standards, powerful performance, and ease of use. If you’re having difficulty deciding which Webroot plan to pick, we can review them with you and make sure you’re getting the most out of whatever plan you invest in. A high-quality antivirus program is essential for keeping your computing devices and online identity safe against cyber attacks.

Are You Updating Your Anti-Virus Software Regularly?

20160422

By regularly updating your anti-virus software, you can better protect your systems from security threats.

Whether you own a small or large business, one your top priorities should be to have anti-virus software installed. After all, you never know what dangerous programs are being developed on a regular basis, especially ones which may even go undetected. Of course, though, it’s not just enough that you have security, but that you also keep it updated on a regular basis. Many people don’t realize this significance until their information gets compromised. Not keeping your security up-to-date, can be the difference between a secure network, and one that becomes susceptible to hackers. Overall, here are a few reasons why you should regularly update your anti-virus software.

#1. New Viruses On The Rise

As was briefly mentioned before, one of the main reasons to keep your anti-virus software updated, is to combat new viruses which are constantly emerging. Even with the latest updates, hackers are always looking for ways around your protection, especially when the software becomes outdated. For example, let’s say that you recently downloaded Kaspersky Anti-Virus 2015. While there’s no doubt that it will protect you from even the more recent threats, why not use Kaspersky Internet Security 2016? After all, not only will your current protection eventually become outdated, but as new viruses start emerging as the year 2016 moves forward, hackers will be able to find vulnerabilities in older software, and you’ll be more susceptible to attacks.

#2. Securing Important Information

With new viruses on the rise, not only is it easier to become susceptible if you don’t keep your software updated, but more importantly, this can also lead to sensitive information being stolen. For example, let’s say that your computer had some important files which not only included your social security number, but your bank account information as well. If a hacker got their hands on this info, there could be serious consequences for you and your business. Keeping your security up to date doesn’t just protect you from vulnerabilities, but any valuable information you have, is kept secure as well.

#3. Viruses Impact Everyone In Your Business

While it’s true that security vulnerabilities affect you, they can also have an impact on everyone in your workplace. For example, let’s say that you received a suspicious looking email from what appears to be one of your coworkers. Upon opening it, though, you realize it’s a virus that’s meant to target everyone in your network. If you and your coworkers are all connected to the same network, the virus will end up spreading throughout. Aside from your coworkers becoming vulnerable, this could also cause significant financial losses. When keeping your anti-virus software up to date, don’t just consider the impact viruses will have on you, but those you work with as well.

#4. Viruses Affect Your Business Reputation

First of all, customers are what keep a business going, and it’s important you have a strong reputation to boot. However, if your company became susceptible to an attack, what if word got out to any potential customers about the issue? Not only would they see your company as one that can’t be trusted, but even more so, they may look for business elsewhere, one where they feel safe. This could lead to a huge loss of customers, since they certainly won’t risk becoming vulnerable to attacks and/or having their information stolen. Viruses don’t just have an impact on you or even your coworkers, but the customers and your business reputation as a whole.

Protecting your company is a top priority in the business world, and it’s not just enough that you have anti-virus software, either. By keeping it updated on a regular basis, not only will your company be protected against even the most recent threats, but hackers will have a difficult time finding vulnerabilities, and your business reputation will also be secured. For more information regarding your protection, as well as ways we can further assist you, contact us today at SystemsNet.

Here come the Thingbots!

20160324

As the Internet of Things continues to become more common in our daily lives, the vulnerabilities of these devices will become more apparent and more in need of protection

Information technology experts have been dealing with malware for years now. First, worms, then viruses, then ransomware. Malware re-invented itself as the internet expanded and hackers found new ways to make money through criminal enterprises on the net. That was then; this is now: get ready for the rise of the thingbots.

The Internet of Things

Last year, the internet was awash with stories about the rise of the Internet of Things (IOT). In the new digital world all our smart devices would be able to talk to each other and connect to the smart grid. Our toasters, coffeemakers, baby monitors and our internet-connected cars will communicate with each other and with our smart houses to make our lives so much simpler, organized and automated. The IOT would learn our preferences and our habits and adjust programming based on what they learn about our wants and needs. Some experts estimate that by 2020, a mere four years from now, between 25-50 billion devices will connect to the Internet and, potentially, to each other.

When that happens, IOT will not only take in data about our lives but will send data to other external machines. For example, the smart refrigerator not only keeps tabs on the food in your refrigerator and knows when you need to order particular items. It can send the list of foods you need to order to your smart phone, and then externally to the shopping delivery network that you use.

How do botnets form?

Botnets form when malware takes command over large numbers of computers (the term “bots”, derived from robots) and organizes them into systems (nets). A botnet, then, is a system of computers infected by malware. Botnets are the reason we have most of the hacking, spamming, and malware that we face each year.

As a rule, most of us haven’t worried too much about botnets attacking our computers. They seemed to mostly target the data of Fortune 500 companies or cause denial of service issues. When you hear the numbers of computers infected and controlled by botnets, however, the scale is nothing short of amazing. Just as an example, hackers created one botnet called ZeroAccess. At its height, this botnet reportedly controlled 1.9 million computers around the world in its efforts to commit cyber crimes.

Botnets are a threat to both businesses and personal users. We all use smart devices now. We bring our smart phones, notebooks and tablets to work. Any infection in the business network will spread easily to your personal devices. Similarly, an infected personal device linking to the business network can spread the infection to the network.

Of course, corporate networks usually have more sophisticated anti-malware protections and cyber-security systems than we do at home simply because they have more secret and proprietary information that hackers want to steal. Since there are various types of malware, though, any computer user is at risk. Some botnets send spam, some collect credentials or steal intellectual property, and still others send internet users to malicious websites. Once individual devices are voluntarily connected to each other, who knows what evil hackers will accomplish on a worldwide scale.

So, What are Thingbots?

Thingbots are botnets made of infected devices from the internet of things. Controlled by the owner of the botnet, they have the same capacity for malicious activities as traditional botnet malware.

Wireless routers and modems are the most likely targets for thingbots because they are directly connected to the internet. As our home appliances and workplace machines become fully automated, cyber-security will need to protect data at each segment of connection. The more data points connect, the more companies will need to employ security checkpoints.

To read more about thingbots, read the October 2014 article “Botnet malware: What it is and how to fight it,” on welivesecurity.com.

To talk more about botnets, thingbots, and what it means for your cyber-security, please contact us. We want to help your business stay cyber-secure.