Information Technology News & Information

Why You Should Consider Outsourcing IT

Startups and small or medium-sized businesses often find that they cannot afford to create and staff an in-house IT department. Yet, with increasing reliance on all types of IT functions from running an entire enterprise network to applying patches when received, the need for IT has never been greater. A great alternative to a company-based IT department is subscription-based IT managed services. Benefits of Managed IT Services There are many excellent advantages surrounding managed IT services, but almost always the issue of affordability is at or near the top of an interested company’s list of concerns. So, let’s tackle the cost issues first. Controlling IT Costs Typically, IT has three costs: Hardware Software Personnel Hardware and software costs are considered fixed costs, and almost always the expenses for either are enough to require amortization rather than expensing. But, if you contract your IT out through managed services, most hardware and software costs are included in your monthly subscription fee converting these hard costs to expense, allowing you to deduct them in the year they occurred. Your IT budgeting becomes much easier and you only pay for what you use. Personnel costs become very limited with perhaps only a few people (depending on size) in your organization working within the IT unit. They work with users and business units for handling machines that are balky, setting up email accounts, and general daily troubleshooting that needs an on-premise person to handle. Getting Expertise Many entrepreneurs and managing executives hire IT people but have little if any IT background. How can they be expected to know how to hire an IT person? Relying on qualifying certifications is not the best idea, as they may lack experience. More experienced people tend to solve IT problems and do IT related tasks faster than certificate holders without experience. Managed service providers have a deep bench of specialists who have seen almost every problem related to IT there is and can respond and repair it fast. Implement New Technology One of the biggest problems with in-house IT is that departments within an organization are slow to approve new technology and have long lags between approval and implementation. A managed services IT organization has the resources to help you evaluate new technology specifically for your business and once your company approves a new technology, the managed services company can quickly deploy it for you. You Stay Focused On Running Your Business IT is a complex unit of any business. Small and medium-sized businesses usually don’t have the resources needed to identify and solve IT issues – forcing management personnel to devote precious time working on making complicated IT decisions. You need these people to continue focusing on your product development, product launches, marketing, client contacts, and all back office functions. When IT is outsourced your firm will no longer get in over their heads concerning IT and can work on things that help grow your business and are in each individual executive’s wheelhouse. Compliance and Safety Issues Computer systems are necessary to run a modern business, even if the system is nothing more than a laptop connected to the internet. Many businesses such as financial services, healthcare, and more must comply with privacy laws, including HIPAA. Non-compliance brings with it fines and plans of corrective action with a government agency looking over your shoulder. Managed IT service providers keep your data and system secure helping to alleviate this problem. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

The Cloud Is Not a Magic Bullet

How You’re Screwing Up Data Security in the Cloud Many people, particularly businesses owners, don’t seem to realize that “cloud security” and “cloud data security” are two completely different things and should always be treated as such. Just because you’ve taken steps to guard access to your cloud-based storage service doesn’t mean the files themselves are free from prying eyes — it just means the files are harder to access. You’re likely screwing up data security in terms of the cloud that you would do well to address as quickly as possible. 1. You Don’t Understand Which Data Needs Protecting To put it into the simplest terms possible, the type of data security you use should be directly proportional to the type of data you’re protecting. If you think that using a single security model on all types of data will increase your chances of success through consistency (as many do when they take a blanket approach to cloud security), you’re only leaving yourself vulnerable and under-protected. You are also likely going to be spending more money than you need to in order to achieve far fewer results, all while violating regulatory compliance at the same time. 2. Never Forget That Data Moves Around When people think about encryption, they usually think of it in two different contexts. Files are encrypted in your cloud-based storage provider, and then they’re also separately encrypted on your computer’s hard drive when you download or access them. But what happens while those files are in transit? If they’re being transmitted over the air completely unprotected, all the encryption in the world won’t matter if you’re facing someone with the right piece of software who knows how to use it. Protecting your data while it is in motion through in-transit encryption is the only way to make sure you have complete, end-to-end protection for your data at all times. This is especially important when you’re talking about the cloud, as your data is more or less in constant motion. 3. You Put All of Your Eggs in the Data Security Basket Data security in terms of the cloud cannot be the only technique you use to stay protected in today’s digital age; instead, it should be one of many. It should be an integrated part of your entire security strategy that rests alongside how you protect your internet connection, how you protect your intranet and other network equipment, etc. The moment that you fail to link your data security to the overall security strategy that your business is using is the minute that you start creating vulnerabilities. Rest assured; vulnerabilities can and often will be exploited. Always remember that in terms of security, you need to take both a holistic and a proactive approach. Never assume that you’ve “done enough” to keep your files secure, even if you’re using one of the most secure cloud-based providers around, because if you do, you’re about to lose a game that you never truly understood in the first place. Remember that an intrusion attempt or another cybersecurity situation is no longer a question of “if,” but very much a question of “when.” {company} is incredibly proud to be your trusted choice when it comes to staying ahead of the game on all of the latest technology tips, tricks and news you can use. To find out more information about this or any of our related topics, please feel free to contact us at {phone} or send us an email at {email} at your convenience.

Information Technology News & Information

HIPAA Breaches Prove Costly

Healthcare providers and business partners are undergoing Phase II audits starting in the summer of 2016. The Department of Health and Human Services (HHS) is the agency charged with the enforcement of HIPAA; this function is carried out by the HHS Office for Civil Rights (OCR). Data breaches in the healthcare industry are becoming ubiquitous. In response, OCR is cracking down on the party(ies) responsible for the breach. OCR has settled a number of breach incidents, and the fines after a settlement is still, in fact, high enough to threaten some organization’s existence. OCR Enforcement Actions While fines can be costly, not all violations are treated equally. The OCR settles many cases of HIPAA violations without any direct settlement costs, although the offending entities may incur costs caused by coming into compliance. Two Hefty Fines Announced in July 2016 The US HHS announced in July 2016 two large fines for HIPAA violations. Portland-based Oregon Health & Science University (OHSU) paid a settlement of $2.7 million to HHS, and the University of Mississippi Medical Center (UMMC) paid a similar fine in the amount of $2.75 million. Oregon Health & Science University Oregon Health & Science University is a major provider of healthcare in the Portland, Oregon region. It is made up of many general and specialty clinics as well as two hospitals. It operates as a public, not-for-profit organization. The problem that caught the attention of the OCR was the lack of follow-up on prior breaches involving HIPAA and specifically for failure to have a compliant business associate agreement with a vendor to the system. This alone would not have created a situation warranting such a costly settlement. But their failure to act responsibly following earlier breaches was a contributing factor. Following is what OCR Director Jocelyn Samuels had to say about the OHSU settlement. “From well-publicized large-scale breaches and findings in their own risk analysis, OHSU had every opportunity to address security management processes that were insufficient. Furthermore, OHSU should have addressed the lack of a business associate agreement before allowing a vendor to store ePHI.This settlement underscores the importance of leadership engagement and why it is so critical for the C-suite to take HIPAA compliance seriously.” University of Mississippi Medical Center In 2013, UMMC had an unencrypted laptop stolen that was used on a certain unit of the hospital to access patient data. But no evidence exists that any patient information was accessed or disclosed from entry to hospital databases. The breach had information about 10,000 patients on it; however, no harm was done to any of them, so why the high fine? The fine was steep simply because, as with OHSU, UMMC had prior knowledge of the potential for breaches since 2005, but they had failed to make appropriate changes in the manner that HIPAA protected information was treated. In a press release from HSS, the public learned the following: “U.S. Department of Health and Human Services, Office for Civil Rights (OCR). OCR’s investigation of UMMC was triggered by a breach of unsecured electronic protected health information (“ePHI”) affecting approximately 10,000 individuals. During the investigation, OCR determined that UMMC was aware of risks and vulnerabilities to its systems as far back as April 2005, yet no significant risk management activity occurred until after the breach, due largely to organizational deficiencies and insufficient institutional oversight. UMMC will pay a penalty of $2,750,000 and adopt a corrective action plan to help assure future compliance with HIPAA Privacy, Security, and Breach Notification Rules.” The large settlements and others like them give credence to HHS’s announcing that Phase II HIPAA audits will begin in the summer of 2016, and it will include vendors and hospital partners that share patient information. The purpose of these audits is to inform and educate. Organizations that have been aware of the potential and executed threats against their ePHI (electronic Personal Health Information) and have not taken corrective action may further serve as examples of provider behavior that is out of compliance with HIPAA rules and regulations. {company} is the trusted choice when it comes to staying ahead of the latest information technology, tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

New Mac Malware Is a Reminder That All Computer Users Must Take Security Seriously

A piece of malware targeting Mac computers named Backdoor.MAC.Eleanor is making the rounds. While it may still come as news to some users that Macs can get infected, Mac OS X — Apple’s flagship operating system — is just as vulnerable as Microsoft Windows. And as Apple’s share of the personal computing market grows, so too does its appeal to hackers. Eleanor Gives Hackers Total Control The Eleanor “backdoor” malware was discovered by security analysts earlier this month, but they believe it has been in the wildsince at least April. It was found hidden in a fake application named EasyDoc Converter on legitimate websites that host Mac app downloads. It has since been removed. The Eleanor program inside EasyDoc Converter installs a hidden Command & Control (C&C) portal on a Mac that gives hackers the ability to edit and delete files, download programs, and stop your Mac’s core services. It even allows hackers to record audio and video from your Mac’s microphone and webcam. Given this level of control, the consequences of catching the Eleanor backdoor are serious. Your Mac could become part of a remotely controlled botnet and used to attack outside businesses. Or the hackers could attack you by holding your files for ransom. Macs Are Just as Vulnerable as PCs The common computing myth persists that Macs do not get viruses, but security vulnerabilities exist in all software applications and operating systems. The more complex a piece of software is, the greater the risk for a vulnerability. In fact, OS X has the most publicly disclosed security vulnerabilities of any software product on the market today, surpassing Microsoft Windows and other popular operating systems. This is not an indictment of OS X — not every single vulnerability on every platform is a critical risk — but it is a warning for business users not to assume that Apple’s history of fewer compromises is proof that they’re more secure. Currently, Macs make up just under 5 percent of the desktop computing market, but that market share is growing. That means their appeal to hackers is growing as well. Best Practices for Securing Your Business’s Macs Given this increasing risk of compromise, Mac users should make sure to follow the established best practices for securing any personal computer. Apply Regular Security Updates. Usually, as soon as a vulnerability is found, developers start fixing it. Installing security updates as soon as possible can help keep you ahead of the hackers. Limit Use of Administrator Accounts. Most day-to-day business operations will not require a computer account that has full administrator access. Disable Automatic Login. For PCs in public areas or where you’re concerned about physical security, this feature is a liability. Configure OS X’s Time Machine Backup. The best defense against ransomware or file corruption from other malware is to have a backup available. Use Reputable Endpoint Protection Software. Most of the major endpoint protection vendors have security software for Macs. Speak to your trusted IT expert about which application makes sense for your business. If you suspect you have an infected Mac, speak to an IT security expert for servicing. While many security applications clean simple infections, more complex infections like the Eleanor malware can leave behind hidden components that could still damage your computer. Get Further Advice on Business IT Security Do you want further advice on how to handle the Eleanor malware or other IT security matters? Our team has years of experience to offer you. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

An Inside Look at a Ransom Note

Satana Demands Payout and Warns Against Recovery Attempts With ransomware attacks making headlines nearly every day in 2016, it seems that IT security professionals and the cybercriminals that try to outsmart them are in a constant battle for lead position—and lately, it seems that the cybercriminals are winning. Recently, yet another strain of ransomware was discovered in its early sample form. Satana, (“Satan” in Italian) is a Trojan that encrypts files and corrupts the Windows’ Master Boot Record (MBR), which halts the Windows boot process and injects its own code into the MBR. Unlike sister-malware Petya which relies on help from tagalong Trojan Mischa, Satana doesn’t mess around with the Master File Table (MFT), it goes straight for the jugular—and manages to conduct both processes of injecting code and encrypting PC files all by itself. So, Satana seems to be an evolved version of Petya in that it doesn’t need anyone’s help—except for the human on the other end of the reboot function—in order to infect and encrypt a user’s computer. Once Satana has successfully installed itself on its victim’s computer, it will launch its ransom note, which reads, in part: “You had bad luck. There was crypting of all your files in a FS bootkit virus<!SATANA!> To decrypt you need to send on this E-mail: orjovaja@mail.com your private code: C98F4DEC6A….” …and so on. Eventually, the ransom note gets to the point where it instructs victims to pay a bitcoin equivalent to $340. The note, which blasts itself in bright red text against a sinister black background, ends with a call to action that tells users where to enter their decryption code to regain access to their files. The malware signs off with, “Good luck! May God help you! <!SATANA!>” Kaspersky Lab has dubbed the Russian-linked Satana the “ransomware from hell.” According to Kaspersky Lab, researchers have identified six email addresses that serve as contact information for Satana’s victims, who must request payment and other instructions in order to receive the decryption key to unlock their files. In order to fulfill the ransom and unlock encrypted files, the cybercriminals behind Satana demand that victims pay around 0.5 bitcoins, or approximately $340. For the advanced and technically apt victims of Satana, there may be a light at the end of the tunnel. Experts have revealed that there is a way to at least partly bypass the MBR to gain access to the infected operating system and restore it—but be forewarned, this solution is only meant for experienced victims with very advanced technical skills. Problematically, while you may be able to restore your OS, researchers have yet to figure out a solution that will give Satana victims access to their encrypted files. It seems that, at least for now, victims have only one option in order to decrypt their stolen files—and that is to pay up. The good news, for the time being, is that Satana is currently in its infancy stages; it is not widespread, and researchers have uncovered errors and weaknesses in its code. On the flip side, it appears that Satana is positioned to evolve over time, and with its comprehensive method of attack, it has the potential to become the next major threat in the ransomware world. To stay vigilant against ransomware threats, remember to always: Backup your data on a regular basis. Don’t open suspicious email attachments. Use trustworthy anti-virus software and keep it updated. Consult a professional if you need to bolster your security or you suspect you’ve been compromised. {company} your local IT security solutions provider, keeping your business’ IT assets safe from ransomware, hackers, and other cybersecurity threats. For the most advanced IT security solutions in business, contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

The Looming Threat of New Malware for Macs

The ecosystem of Apple’s Mac OS has long been heralded as a safe haven from the world of digital threats, and while its users were never immune to common phishing scams, they were largely in the clear from infiltration by most malware. In reality, the supposed invulnerability in Macs had less to do with anything unique about their software than their relative rarity on the market. When hackers or malware experts seek to infect computers and allow their code to spread from machine to machine, they focus their efforts on the operating systems with the widest reach. In the early 2000s, when Apple put renewed vigor into their marketing and advertising campaigns, their computers had such a fractionally small percentage of worldwide market share that they simply weren’t an attractive target. Even today, with all the emphasis on Microsoft losing market share to Apple, 2016 data still indicates that Apple has sold only 7.4 percent of the computers in 2016. As such, they historically haven’t been an especially lucrative target for hackers and are still a bit away from the mainstream. Recently, that immunity may have begun changing as a new bit of malware was discovered. Named “Backdoor.MAC.Eleanor,” it’s installed while hidden within the seemingly innocuous Easy Doc Converter program that helps change Microsoft Office documents into other file formats. While it’s not uncommon for friendly software to have an unannounced stowaway, this file converter is available through otherwise reputable sites, allowing its creators to prey on unsuspecting individuals who let their guard down while browsing. Once installed, Eleanor exploits a tool called “wacaw,” which grants access to the computer’s webcam, allowing it to capture images and videos of users and their surroundings without their knowledge. What the hackers plan to do with these images is largely unknown. But it’s safe to assume that the results would be similar to other blackmail-esque ransomeware scams, in which the hackers wait for a compromising photo to be taken and threaten to release it — or other private information — in exchange for money. While this isn’t the first time Mac users have been exposed to potential threats, the relative simplicity of this sort of exploit is what makes it so effective. Rather than scanning drives or logging keyboard entries for financial information, the real danger here is in what the camera captures. While many computer owners have opted to proactively cover their camera when not in use, those with Apple’s Gatekeeper security package should remain unscathed as well, as the file converter program doesn’t possess a digitally signed certificate from Apple. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

5 Tips for Making Your Business a “Best Place to Work” With Cost-Effective IT Upgrades

There’s no question that employees in today’s workforce are more technically literate than the generations before them. They use technology regularly to do their banking, get the news, network with colleagues, search for information, and stay connected to families and friends. Using a cellphone and texting have become second nature for many individuals, so it is understandable that they expect more out of their technology than their predecessors. Employers need to supply their employees with the technology to keep them connected at work so they feel productive and efficient. By having the most up-to-date software and IT infrastructure and a reliable, fast network, you can keep employee downtime to a minimum. Employees want to be challenged at work. They want tasks that make them feel valued and passionate about their job, improve their skill sets, and allow them to reach their full potential. Employees who are held back by unproductive tasks and tedious IT work environments tend to be unhappy at work, but this is an easy fix well within the business owner’s control. Leverage Technology With IT Stability and Innovation to Improve Your Employees’ Lives When your employees feel that they are solving problems and providing value, they will naturally be happier at what they do — and more productive. If you want your employees to be driven to a level of productivity that includes a high-quality, inspired work product, it is important to provide them with the tools and technology required for them to get the job done. This is where having a lightning-fast, well-maintained network can make all the difference. Providing a reliable, stable IT environment that has little downtime means employees aren’t standing around while the network gets worked on for the third time in a month. When employees are faced with repeated interruptions and downtime during the workday, they not only waste valuable paid time — they lose their focus. It can take twice as long to get back into the groove of a project when it’s been interrupted once or twice, so the network guy can crawl under the desk to check connections. A reliable IT provider will make sure your company is set up with as much connectivity — and limited downtime — as it needs to run daily operations fully and consistently. Your managed IT services provider will offer support 24/7/365 depending on the package you sign up for. When employees need immediate assistance, your IT provider should have them set up with pre-approved helpdesk support options, so they aren’t left without a solution for longer than necessary. When your employees have the resources they need to get back up and running as quickly as possible, they can return to accomplishing great things. IT Business Continuity Services Provide a Stable Work Environment Your employees want to feel that their employer takes disaster planning seriously, so they can feel comfortable that their jobs will be there when unexpected incidents arise. You should expect your IT service partner to include a comprehensive assessment and consultation of your current infrastructure, network and business continuity status. When you sign up for a managed service provider, part of their package should include keeping your business operational during a security incident or data breach. After all, employees aren’t the only part of your business that you want to keep fully functional during any potential downtime. An effective business continuity strategy will include a targeted assessment of your business’s most sensitive data and critical operations — so that your IT provider can create a customized business continuity plan that meets your business’s specific needs for optimal business success in the years to come. {company} is your local trusted IT business productivity and business continuity expert. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Can Antivirus Software Be Trusted?

The Project Zero team at Google looks for defects in various software products. A researcher named Tavis Ormandy takes part in this effort. He recently identified serious security weaknesses in an assortment of Symantec and Norton utilities. The company quickly corrected these vulnerabilities after he reported them. Problems Ormandy has found security flaws in antivirus programs from several developers, such as McAfee and Trend Micro. Nonetheless, he was particularly critical of Symantec. The researcher noted that its utilities allowed links and files to infect PCs even if users didn’t open them. This made computers especially vulnerable to “worm” viruses. He went on to accuse Symantec of failing to adequately examine its software for weaknesses. Ormandy pointed out that the company used open-source code that wasn’t updated for seven years. Back in 2014, a vice president at Symantec termed antivirus utilities “dead” and called them “no longer… a money-maker in any way.” Repairs The above-mentioned quote might explain why some security companies need help from other organizations to secure their software. Google’s researcher developed an exploit that fixed the problems in affected Symantec and Norton products. Ormandy described it as “100 percent reliable.” Users can activate it via the Web or email. The fix patches vulnerabilities in Symantec Endpoint, Norton Antivirus and various other utilities. It works on Windows and Macintosh systems. In some cases, administrators may need to activate updates before the problem is corrected. The good news is that most of these programs install patches automatically. Prevention This situation highlights an important fact: Antivirus software doesn’t always succeed in protecting your PC. When programming flaws exist, it could even create additional risks. Businesses may maximize security by taking steps to completely avoid viruses. They can accomplish this by regularly installing software updates and securing any Wi-Fi networks. Prohibit unnecessary activities Promote virus and phishing awareness Password-protect wireless Internet When employees needlessly use torrents, instant messaging or social media, they put the entire office at risk. Businesses may minimize such problems by configuring firewalls to block unnecessary ports. They can also establish clear policies regarding appropriate use of the Internet. “Phishing” attacks often compromise passwords and other credentials, making it possible for criminals to hack into company systems. Staff members need training to avoid this type of deception. TechTarget notes that numerous phishing attacks may be prevented if employees simply never click on email, blog or chat links. Criminals can more easily gain access to passwords when they learn specific details about important staff members. Hackers might trick these individuals with personalized “spear phishing” campaigns. Companies should discourage key employees from sharing too much information about themselves on public webpages, such as blogs and personal websites. Downloads Malware frequently infects business computers when staff members use software from little-known developers. Companies ought to create policies that only permit employees to download and install vital programs. Such applications should always come from reputable software firms via major websites or professionally manufactured CDs. Employees must know the signs of a malware infection. When all websites load slowly or programs repeatedly malfunction, they should report the problem to IT personnel and avoid entering sensitive data. It’s crucial to inspect a potentially infected computer and take action as soon as possible. Otherwise, malware could steal passwords and inflict much greater harm. It’s not realistic to believe that you can successfully prevent or remove every virus. Regular backups will make it feasible to eliminate any malware by reinstalling the operating system and safely restoring data. Businesses depend on {company} to keep them up-to-date on today’s IT news and tips. Please dial {phone} or contact {email} for further details.

Information Technology News & Information

Is the Government Spying on You?

Judge Rules No Warrant Needed for FBI to Hack Private Computers   In taking the epidemic of hacking to a whole new level, a judge for the federal court for the Eastern District of Virginia has ruled that private citizens have no expectation of privacy on their home computer systems. His reason? The simple fact that computers connected to the Internet are not sufficiently immune from invasion by outside forces. In elaborating on his opinion of the matter, the judge declared that users connected to the Internet shouldn’t expect privacy because computer security is ineffective at stopping hackers from gaining access. Talk about a slap in the face, and a veritable compliment for the hacking community at large. The hacker’s underground habit of infiltrating every cybersecurity defense they are confronted with has now afforded a court the basis upon which to refocus these attacks on our own helplessness, and indirectly, our freedom. Hacking has officially become mainstream. Even law enforcement has been working the dark web, it seems. FBI Uses Dark Web to Monitor Alleged Criminal Activity The ruling above came in after one of the many FBI cases involving the infiltration of PlayPen, a hidden child pornography service on the Tor network. The investigation resulted in the prosecution of hundreds of individuals. To uncover suspects’ identities, the FBI hacked into PlayPen for two weeks using NIT, or “network investigative techniques.” The NIT used by the FBI ran on a visitor’s computer and identified the visitor’s IP address, so they looked nothing like law enforcement when they interacted on the platform. It worked, but apparently the warrant was unnecessary. Judge Says Warrant Is Basically Unnecessary for Government to Hack Into User’s Computers This procedure basically amounts to mass hacking on a single warrant, which has obvious privacy implications in an age where the Internet is in everyone’s back pocket. Though digital rights and privacy advocates have protested the practice, the judge upheld the warrant process in this case and stated that the warrant was completely unnecessary, partly because the charges involved child pornography—and because users really shouldn’t have any expectations of privacy when it comes to their home computer activities. The judge went on to clarify in his ruling that even a user who has gone to great lengths to hide his activities on the dark web by way of the Tor network does not mean that he should expect his activities or location to remain private. In these situations, the judge explained, a user’s subjective expectation of privacy in and of itself is “not objectively reasonable.” So, because hacking and cyber attacks are out of control in the current Internet climate, the judge has basically said that a mere expectation of privacy while online is no longer a reasonable one. Law Enforcement May Now Feel It’s “Open Season” On User’s Networks The digital rights group Electronic Frontier Foundation (EFF) has warned that the judge’s ruling is particularly dangerous because potentially unauthorized parties—including law enforcement without a warrant—may now feel that any computer connected to the Internet is fair game and open for exposure and investigation. Though the public has little sympathy for the defendant’s plight (the man allegedly participated in child pornography and downloaded thousands of images from PlayPen), the verdict could set a precedent that affects the general public at large. Attorneys for EFF are concerned that law enforcement, in particular, will interpret the court’s ruling to mean that they no longer need warrants to spy on suspected online criminal behavior. It’s a dangerous precedent, and we only have the relentless persistence—and consistent, nearly unstoppable success—of hackers and other cyber criminals to thank for it. {company} is your trusted IT servicer when it comes to staying at the forefront of the latest IT security issues, news, and innovation. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

A Dangerous Loophole: Lenovo’s Security Mishap

Why Lenovo is telling users to remove an application because of a dangerous loophole. Lenovo has been urging its users to remove one of its applications after the discovery of a serious vulnerability. Let’s look at the definition of the vulnerability and what it does and how it works. Here’s why Lenovo is advising users to remove a certain application. The Security Flaw in Question The Chinese Multinational Technology Company discovered a serious RCE vulnerability in Lenovo, which resulted in a publication of a security advisory covering the flaw. The flaw identified was found in the Lenovo Accelerator Application software, which made it possible to exploit a user with “man-in-the-middle” tactics. The reasons why the Accelerator application is used is because it speeds up Lenovo applications for launch. This application is installed on some desktops and notebooks using the Windows 10 operating system, but it does not affect ThinkStation or ThinkPad devices since it was never installed on these products. Why Man-in-the-Middle Attacks Are an Issue A man-in-the-middle attack can pose a serious threat to anyone who values his personal information. These attacks often occur on vulnerable web browsers with an infected server or a malware variant (on an infected machine) that has surveillance capabilities. Man-in-the-middle attack campaigns are utilized on an individual to steal and intercept personal information, financial data and their login credentials. Sadly, many users don’t even realize that they’re being attacked until it’s too late. How to Avoid a Man-in-the-Middle Attack A good way to avoid a man-in-the-middle attack is to look into the programs pre-installed on your computer after you initially purchased the machine. Many computers (whether desktop or laptop) come with installed “bloatware,” which are programs that claim to add value but actually do little when helping a computer initially boot up. Free software trials, vendor support, applications or vendor hardware — and many more — all add a shortcut that launches your browser to a specific website. The end result is that these shortcuts leave opportunities for hackers, so removing the links may be the best way to prevent an attack. It’s important for a business to understand the applications and programs it works with. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at {phone} or send us an email at {email} for more information.