Information Technology News & Information

The Unsung Hero: Why a Strong IT Department is the REAL Hero

A company is only as strong as the foundation it is based on. In the fast-paced world of the 21st century, that means having top of the line technology. Without the best in technology, you immediately sacrifice interdepartmental communication, not to mention client communication, and business efficiency. This translates immediately to lost time and consequently, lost money. To keep your company running strong, you need a strong IT department. When it comes to corporate management, the IT support is the real superman. The thing is, not every company has a strong IT department built in from the start. As a small or even midsize business owner, your priorities have to be on your business goals. Whether your business is sales, customer service, transport, or any other variety of business that keeps the corporate world constantly on the move, the most important thing to your business’s success is your specialized expertise in the area that your business specializes. It makes sense for your growing business’s goals that you would focus your energy on the areas that are most specialized to your business’s needs. However, if you don’t have a strong IT department to support those goals, then you may find your business prematurely stifled. IT support does a lot more than work a computer. IT manages connection—that includes connection between your employees and business partners, as well as connection with your customer base. As a small business owner, your primary focus has to be your business goals. This means understanding how you want technology to support your endeavors, without the requirement of micro-managing everything from the computing side. Working with an IT company can provide small and midsize businesses with the same level IT support that the largest companies have, essentially evening the playing field with advanced technological options that open the doors to more opportunity for communication, faster services, and streamlined efficiency. You can spend all of your time focusing on what will make your business best. The reality is in the 21st century internet-driven world that we call home, without strong IT your dreams are not going to become a reality. This is why a strong IT department is the real Superman of your corporation. The unsung hero. The one who works endlessly behind the scenes to ensure that every bit of fancy planning, every employee need and every customer desire can be turned into reality. If you want your business to be successful in this fast-paced corporate world, then you need to have a strong IT company by your side to make your needs a quick reality. Ease of access to expert technicians, top of the line technology with state of the art security measures, the fastest and most capable computing techniques on the market—these are the advantages of working with a dedicated IT management company. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

The Potential Downside to an Increasingly Mobile Workforce

Humanity is rapidly hurtling forward at a breakneck speed toward a high-tech reality dominated by web-enabled mobile devices. The average worker’s typical workday has been revolutionized over the past couple of decades. For all the good that these improvements in technology have brought, there is still a downside that cannot be denied: Data security vulnerabilities. Mobile devices are highly susceptible to malware, hacks and other malicious attacks that often render hardware and software inoperable. Flexible Office Environments Aren’t Properly Prepared to Fend Off Digital Attacks The number of United States-based mobile employees will top the 105 million mark by 2020. We are collectively moving toward a new way of working in which employees telecommute from home, libraries or other off-site spaces. This improved mobility saves time and improves flexibility, but increased mobility also represents a legitimate digital security threat. The unfortunate truth is that businesses are not properly prepared to combat hacks, malware and other digital attacks targeted at web-enabled mobile devices. In a recent study by Shred-It, their Security Tracker Information Security Survey showed that United States business leaders have not put the necessary protocols in place to safeguard data stored on the cloud or web-enabled electronic devices like smartphones, USBs, tablets and laptops. Furthermore, the survey revealed that the vast majority of business leaders have failed to provide employees with adequate training to prevent digital breaches. A Look at the Numbers According to Shred-it’s survey, a whopping 92 percent of C-Suite Executives and nearly 60 percent of small business owners employ at least a couple employees who work from home or off-site. The problem is that just under one-third of those surveyed have implemented an information security policy for their flexible working spaces and off-premises work environments. In today’s age of web ubiquity, these percentages are frighteningly low. These businesses are facing unnecessary risks that could be easily mitigated with the adoption of comprehensive security protocols. Some of the largest corporations have implemented such protocols as a part of their comprehensive security efforts, but small to medium-sized businesses have plenty of work to do when it comes to safeguarding the storage, transmission and destruction of digital data. Nearly 40 percent of small business owners reported that they wipe electronic devices without the assistance of outside digital security aficionados. This is an unwise move because it puts private data at risk when the devices are eventually refurbished or recycled. Plenty of small to medium-sized businesses have legacy hardware stacked in back offices and other storage spaces. This might not seem like a critical security mistake to a layman, but any business owner who has suffered a break-in will explain the importance of moving everything with a hard drive off-site for a thorough wipe conducted by digital security professionals. A Proactive Defense A wipe is only half the battle against data breaches. The other half is a physical destruction of the hard drive to ensure that all important data is totally removed. It is time for business owners and managers to re-think their security policies with today’s unique threats in mind. Protocols should also be put in place for the destruction of confidential documents. Too many off-site employees trash such paperwork in a haphazard manner, assuming they won’t be targeted by a criminal just because they work away from the office. All phones and hard drives should be encrypted and password-protected. Perhaps most important is the ongoing training of employees in an effort to keep them abreast of the latest threats. {company} {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

How PoS Attacks Can Stifle a Business

t wasn’t long ago when business owners were primarily concerned about on-site break-ins, employee theft and damage stemming from natural disasters. Over the past couple of decades the focus of security efforts has shifted away from the tangible to the intangible. Digital attacks have become the top threat to a business’s general functionality. A malicious hack has the potential to absolutely cripple a business. Of particular importance are PoS attacks. The Growing Threat of PoS Attacks PoS is an acronym that stands for Point of Sale solutions. These nuanced systems contain an abundance of sensitive information pertaining to individuals as well as their personal finances. A PoS attack that steals this information can doom anyone who has done business with the afflicted company. It is a devastating hack that can ruin a business’s potential as well as its relationships with customers and business partners. Common PoS Targets Hackers do not target any old PoS system. These malicious individuals lack a moral compass yet they are quite intelligent when it comes to computers and modern day technology. Cyber thieves specifically target PoS systems that will require little work to crack. They act from a singular platform to pinpoint target-rich environments to maximize results. Fast food restaurants fit this profile due to their frequent customer flows. People will stop in for a couple of minutes to buy a hamburger, chicken sandwich or ice cream, swipe their credit card and be on their merry way. This is a golden opportunity for a hacker to sneak into the PoS system and access the credit card information of hundreds if not thousands of customers. Wendy’s franchise stores were recently hit with a PoS system attack that infected nearly 300 restaurants. Wendy’s in-house digital security team is still working to find the culprit(s). Though 300 restaurants is a mere fraction of the company’s total number of locations, the attack is a clear sign that today’s hackers are at least one step ahead of corporate digital security teams. Hackers have also infiltrated the PoS systems of hotels and other businesses that operate in the hospitality sector. Such attacks yield an incredible number of credit card customer names, numbers, expiration dates and security codes as hospitality-oriented businesses check plenty of guests in and out on a daily basis. An example of a successful PoS attack is the system breach suffered by Hilton Worldwide between November of 2014 and July of 2015. Guests who used credit cards to check in and out from Hilton hotels were put in harm’s way. Even those who used credit cards to purchase room service had their credit card data exposed. Hackers use this stolen data to purchase items under the victims’ names or directly steal those victims’ funds. Your Business is Not Completely Defenseless Against a PoS Attack Assuming that today’s uber-intelligent hackers are always one step ahead of the latest security safeguards and security experts is defeatist. Your business does not have to become the next victim of a PoS attack. It is critically important that you update your firm’s PoS software, seal off all vulnerabilities and promote the use of EMV chip cards. Digital security experts agree that EMV chip cards are vastly superior to the traditional cards that have a magnetic stripe on the back. Cards with EMV chips won’t store an individual’s banking information to complete transactions. EMV chip cards actually use special codes that are unique to each transaction. If a hacker gains access to the PoS system and all of the transactions have been conducted with cards that contain EMV chips, he won’t be able to steal anyone’s money. {company} {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Windows Shortcomings Highlight the Need for Improved Cybersecurity

Most of us use computers that run the Windows operating system. The ubiquity of Windows has certainly improved efficiency yet it also makes the operating system a convenient target for wrongdoers. As recent history has shown, hackers are setting their sights on Windows. The unfortunate truth is that this operating system is far from flawless, especially in the context of digital security. The Fallibility of Windows’ “God Mode” Windows devices have what is referred to as a “God Mode” that empowers those who are aware of its existence to tap into additional capabilities. This hack is lauded for the fact it provides direct access to an array of control panel menus that it subdivides into appropriate categories. Yet this time-saving mode also opens the door to the attacks of malicious “e-thugs”. Savvy hackers know how to use God Mode to access a computer user’s private data. A variation of this malware called Dynamer has also reared its ugly head. Dynamer nestles into a master control panel directory while remaining unseen within the folder dedicated to God Mode. This occurs due to the fact that the God mode folder is not always recognized by each and every application. As a result, security programs often fail to identify Dynamer’s presence. This covert malware accesses the Desktop Connections and RemoteApp applications on the control panel to conceal its activity. This nasty malware actually assigns itself the Windows command name of “com4” to prevent the system from pinpointing it as a threat. The fact that com4 is identified as a seemingly innocent Windows command precludes its deletion. Thankfully, it is possible to eliminate this malware by deleting it within the Task Manger and executing a command prompt. Powershell’s Vulnerability Malware also abuses system management tools through a code that specifically targets PowerShell. This Windows scripting program is a common target for hackers who aim to take advantage of Microsoft systems. PowerShell operates in the background, making it extremely difficult to identify potential threats. PowerShell can even be manipulated to pilfer system data including usernames and passwords even if an executable file does not exist. Trend Micro digital security aficionados report that PowerShell is also being abused to infiltrate computers with a highly nuanced malware that steals and/or manipulates tax return documents. The latest PowerShell exploitation involves a delivery of a FAREIT software that attempts to steal software along with computer users’ personal information. The FAREIT malware programs are generally employed in an attempt to download harmful code to systems and install programs to steal valuable or sensitive information. Examples of common FAREIT targets range from usernames to passwords, directory lists, server names and port numbers. Upper echelon hackers have even used this FAREIT variant to steal bitcoin currency. The newest version specifically targets Windows’ PowerShell with an infectious e-mail that contains a tainted Word or PDF file as an attachment. The hackers behind this malware have taken the time to disguise it as a legitimate business document such as a financial statement. The average employee often falls prey to this trap as he assumes that the attached file contains important information pertaining to his assigned responsibilities and/or the company in general. How to Fight Back Windows certainly has its fair share of shortcomings yet users are not powerless. Anyone who operates a Windows device should install security software to filter out spam messages and correspondence that includes potentially malicious files. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Why CEOs Should Care About IT

Most of today’s CEOs realize the importance of IT. They hire professionals to handle it. They may also ask questions now and then about security risks or improving functionality. However, most CEOs are focused on other parts of the business management process. Small and mid-sized businesses are even less likely to have a CEO that’s actually invested in the quality of the company’s IT. But, CEOs simply have to care about IT on a more in-depth level. Do You Own Your IT? Growing companies need to invest in IT, that much is easy to see. However, CEOs need to do more than just put IT in place. They need to own it. If you own it, you understand the workings of, and the complications of, information technology investments and systems within your company. While many of today’s CEOs delegate these tasks to their VP or even someone lower on the pole, it is still the responsibility of the company’s CEO and shareholders to ensure the company’s IT is at its highest possible level. You’re busy. You have a lot on your plate. Why should you put more effort in your day on IT? The Advantages of CEO Attention Your time is money and that’s exactly why you need to put time into managing your IT systems. There are numerous benefits that come from the CEO’s attention to this important component of the business. Those benefits include the following: High-level Risks Exist The stories of small and large companies facing incredible threats as the result of viruses and ransomware threats are growing. Cyber security risks can be very costly for today’s businesses, even those with significant liability policies. Lawsuits for customer data leaks are also expensive, even if they never lead to a financial implication for the business owner. CEOs need to continuously monitor their business operations to avoid these risks. IT is at the heart of this. Managed IT Holds Your Business Together Consider all of the ways managed IT services are holding your business together. It aids and impacts every sector including the performance of key operations, the amount of uptime and downtime your company has, and the revenue it generates. A computer problem can hamper your human resource department, your sales generation, your credit card processing, and much, much more. Because it is such an integral component of your business operations, having a watchful eye on IT is necessary. Otherwise, you could be positioning your business for high risks and costly losses. How to Care for Your IT The good news is that even CEOs do not have to invest a great deal of their time into their IT if they have the right professionals in place. To start, CEOs need to learn about IT and invest in it. They need to see the value it provides to the company. After this, it becomes necessary to focus on bringing in the right talent and professionals to manage IT effectively and efficiently. Once these pros are in place, CEOs shouldn’t step off the gas, though. They need to continue to keep the lines of communication open, listen to their IT teams about needs and areas of concern, and constantly monitor the industry for changes and threats. It may sound like a great deal of work, and it is, but it is at the heart of keeping your business structure safe and your profits in line with your goals. {company} is the trusted choice in IT solutions when it comes to staying ahead of the industry and the importance of implementing an IT policy from the top down. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Are You FB Friends With Your Hacker?

Social Media Spying By Cyber Criminals Is On The Rise   You know those random friend requests that you get from people you’ve never met? They may not be entirely accidental or random at all — in fact, many cybercriminals deploy fake profiles in hopes of a friend request slipping through the cracks … and it’s working. In addition to social media spying, hackers regularly employ social engineering, malware-based phishing, old hardware hacking, and voice phishing (aka “Vishing”) to compromise user’s privacy and steal his or her information. Some of these methods may be unscrupulous, but they aren’t technically illegal — which makes it even more important for users to stay vigilant in their online activity and security efforts. Top Five Hacker Favorites: Data Collection Methods That Can Make Your Information Vulnerable Keep your information secure and mitigate your risk of a stolen identity by being aware of these most common methods — and take action when necessary to protect yourself against them: Social Media Spying With the advent of social media and the somewhat viral dependency many people have on it, it’s no wonder that cybercriminals are turning to social as a way to triage potential victims. A public forum on which soon-to-be victims spend hours sharing their personal information, social media is low-hanging fruit — a true hacker’s dreamscape. You can never be 100 percent certain that your information is secure on any of the most popular social media platforms: Security settings reset themselves; platform updates cause private profiles to become public; and unsuspecting users make connections with total strangers either by accident or because of sheer laziness. All of these instances open up a vault of private information that’s free for the hacker’s taking. Some of the more obvious details users should avoid revealing on their social media pages include personal information such as maiden names, birth dates and phone numbers. Of course, vacation status should never be advertised either — it can give thieves a perfect opportunity to track down your residence and take advantage of your absence. Social Engineering Hackers often create traps to generate the exposure of personal information. Known as “social engineering,” this method depends on social interaction, trust, and human empathy to be effective. When it’s done successfully, social engineering can reap great rewards for the hacker in terms of useful personal data — and it requires a lot less guesswork than traditional methods. In social engineering hacks, cybercriminals portray themselves as a legitimate company or individual to gain a victim’s trust and exploit his or her need for a product or service. Industry experts recommend being especially cautious of urgent emails that request confirmation of payments, login details and social media updates. Old Hardware Restoration Experts recommend being extra-vigilant when throwing away or trading in old smartphones, tablets and computer hardware. Never get rid of these devices without being absolutely sure you have wiped them clean of personal data. If you are tossing an old hard drive, be sure to completely destroy the data before you part ways with it. If you neglect this all-important step, you could be handing over your identity to a savvy cybercriminal that makes his or her living by restoring old user data. Malware-Based Phishing These days, malware has become one of the hacker’s most prolific tools of corruption. By making victims feel they need to subscribe to a security fix or patch to avoid losing valuable computer files, hackers are able to take over your computer hardware. In some cases, these cybercriminals take things a step further by making expensive ransomware demands in exchange for the release of personal information and files — and they won’t return your data until you pay up. Even worse, in some cases, they take the money and demand more before turning over a victim’s files. Vishing (aka voice phishing) Beware of cybercriminals that pose as government agencies via phone and voicemail. These hackers will often appeal to your sense of trust by offering urgent, confidential information, but before you can access it, you must first confirm it with sensitive personal data. {company} is the trusted choice when it comes to staying ahead of the latest information technology security safeguards, innovations, and news. If you are concerned that you may be the victim of a cyberattack, contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Is Your Organization Prepared for a Ransomware Attack?

Imagine arriving at work, attempting to log onto your computer, and being unable to access your files. Instead, you’re greeted with a message instructing you to pay a fine or lose all of your data forever. Unfortunately, this exact scenario — in which cybercriminals use “ransomware,” a type of malware, to hold the contents of users’ computers hostage — is increasingly prevalent at workplaces all over the country. Just how widespread is the problem? Approximately 5,700 computers are infected every day, according to Norton by Symantec. But your company doesn’t have to become a statistic. As legislators work feverishly to counter this new threat to the American workplace, business owners can also do their part to prevent ransomware attacks. Let’s take a closer look at this troubling issue, along with steps you can take to safeguard your organization. The Ramping Up of Ransomware Ransomware is an equal opportunity attacker. From increased incidences among House of Representatives staff last month resulting in blocked access to YahooMail to a crippling assault earlier this year on Hollywood Presbyterian Medical Center’s during which the organization was forced to pay $17,000 for restored use of its computer systems, ransomware can and does impact organizations of all shapes and sizes. The potential fallout of ransomware is not lost on government officials. Nor is the fact that many organizations are woefully unprepared to fend off ransomware attacks. In an attempt to deter cybercriminals from preying on computer users, a bill outlawing ransomware only recently passed the Senate Committee yet still has far to go in the legislative process before becoming law. Preventing Ransomware Attacks According to FBI statistics, ransomware attacks cost victims more than $209 million in the first three months of 2016 alone. The worst part? Even if you could solve the problem by simply paying up, the truth is that most data is never returned or restored. Rather than take that risk, shore up your defenses through proactive planning aimed at keeping cybercriminals out, including the following five steps: 1. Back Up An effective backup policy can mean the difference between recovering infected systems and losing them forever. Serialized backups ensure that older files are available should new ones become inaccessible, while offline storage prevents ransomware from spreading. 2. Have a Layered Defense Installing an external firewall is important, but what happens if malware gets through this first line of defense? Additional monitoring and detection technologies, including internal firewalls and web, email and content filters, further strengthen your system from hackers. 3. Keep Current Cybercriminals are nothing if not persistent. In other words, they’re constantly on the lookout for both known and new system vulnerabilities. Remaining up to date with the latest patches and other security measures helps you stay ahead of their untrustworthy tactics. 4. Inform and Educate Ransomware works by targeting individual computers and users. Educating employees about best practices for preventing ransomware, such as alerting IT upon receipt of a suspicious email or attachment and refraining from using personal email on work computers, is an important part of the process. 5. Reduce User Privileges But why leave the welfare of your company and its invaluable data in the hands of employees? Restricting user access gives business owners critical control by limiting the extent to which a malware infection can spread if it does penetrate your initial protective measures. Dealing with ransomware is at best an unwelcome distraction and at worst a threat to survival for organizations in today’s fast-paced, ultra-competitive business landscape. But you don’t have to go it alone. {Company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

The Darknet is the Internet’s Hangout for Outlaws

You run a reputable business. Your online presence is a nicely designed website with a cache of great keywords and agile ad words. When the web crawler spider comes crawling, you get a high position on the results page inviting anyone to click and visit. However, what if your product was pirated films or pornography that mainstream porno sites wouldn’t touch with a…you know? There actually was a website that sold illegal drugs. Until the FBI shut it down and arrested its founder, it had raked in over $1.2 billion. The site name is Silk Road, but don’t bother trying to gain entry with your current browser. Silk Road traveled in the Darknet– and you can’t get there from here without a browsing tool known as ToR or through password-protected forums. What is the Darknet? The Internet your business uses every day is but a fraction of the entire worldwide web. The Darknet is where people go to interact—buy, sell, plot—in total anonymity. The Darknet, according to BatBlue, a cloud security company, has anywhere from 200,000 to 400,000 sites. Those sites are at hidden locations, further protected by encryption and virtual private networks. What is ToR? ToR is the abbreviation for The Onion Router. It is a technology that gives Darknet surfers the anonymity (and security from detection) they seek. The technology, like the Internet itself, is the brain child of the military—the U.S. Navy in the instant case—which, in the mid-1990s, developed its encryption to hide military communications. Using a ToR web-based browser, the user’s communications bounce off multiple ToR servers before they reach their destination. That makes it pretty much impossible for anyone to trace Darknet traffic. Also, ToR hides websites and applications using strings of random characters, followed by the “.onion” domain name. What is on the Darknet? As mentioned previously, the Darknet is the marketplace for a lot of illegal substances, services, and private communications by people with sinister or violent intentions. A virtual black market, with the tools available today, Darknet remains highly resistant to government regulation or law enforcement. The Bright Side of the Darknet While the Darknet is a haven for hanky-panky, it does offer a protection for free speech, especially in countries that don’t operate under their version of the First Amendment. The Darknet is also home to many services providing secure messaging and file sharing. Should You Go Slumming on the Darknet? The Darknet is the equivalent of the Wild West, and its preferred currency is Bitcoins—also anonymous and irretrievable in case of theft. Considering the types that skulk there—scammers, hackers, weapons dealers, etc.—it’s best to steer clear. The mainstream surface web has all the services any reputable person needs. On the other hand, if you’re looking for absolute security in communications and guaranteed anonymity, a trip to the Darknet with due consideration and care might be in order. Looking for the best advice in staying away from the dark side of security threats or optimizing your online presence so that the web crawler won’t pass you by? {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.

Information Technology News & Information

Why Apple’s Time Machine Is Perfect for Business Backup

The inability to access information, or the total loss due to malfunctioning hardware, can cause a total shutdown in activity. To a business owner, this can grind operations to a halt, and the lost time equates to lost dollars because of decreased productivity, or, worse, the inability to simply pick up where he or she left off. Web-based tools in the software-as-a-service model are highly sought-after for their reliability and ease of access, but what about the documents that don’t live in the cloud? To business owners, a reliable backup system is part of any business continuity plan and can be the difference between a critical shutdown and a speedy recovery, allowing the company to recover in minutes without skipping a beat. While countless off-the-shelf options are available, Apple’s Time Machine is perhaps the perfect tool for the job based on its effectiveness and ease of use, but here are the most common events that can lead to data loss in the first place: Damage to the hardware, ranging from natural disasters to spilled coffee Hard drive failure stemming from the “shelf life” of the internal disc Theft or loss of the computer itself Corrupted files from malware or viruses With any good backup regiment, the most important factor is not merely backing up data frequently, but automatically. Enabling your system to accomplish this task behind the scenes not only saves time, but also ensures that human error won’t come into play as a cause for blame. The setup couldn’t be simpler, as the only requirement is that Time Machine is enabled from the Systems menu, which will prompt the user to select an external hard drive via USB or Firewire. Upon completion, Time Machine not only runs on its own, but it can store different versions of the same file, allowing the user to return to a particular period in time to regain access to a document as it once existed. This futuristic feature not only works for individual files but for the entire system, even allowing users to restore settings as they once were. The initial backup can take some time, since it’s duplicating every single byte of storage on the hard drive, but the regular backups that occur thereafter are quick and seamless as the system needs to only reflect the changes that have occurred in the meantime. In instances in which users also use additional external drives or USB flash drives, one even has the option to choose that these too are on the radar of Time Machine, mirroring their content as well. Above all, it’s essential that data is not only backed up, but secure in its new destination. File encryption, available through Time Machine, helps ensure that the documents you’ve set aside for safekeeping are password protected and won’t fall into the wrong hands. While I prefer Time Machine, no matter the techniques you choose, it’s vital that business owners have a solution to back up data early and often. Having the right tools in place ensures that, should the worst occur, regaining access to a single file or the entire system can be resolved with a seamless restoration process. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information on data security or business continuity solutions.

Information Technology News & Information

The Growing Problem of Apple Malware and How To Protect Yourself Against It

For many years now, one of the primary reasons for using an Apple Mac computer was the dearth of viruses and malware that affect Apple’s OS X systems. While malware that targets Apple computers is still rarely encountered in the wild, there are a few notable examples that users should protect themselves against. Ransomware is one of the newest types to enter the fray and, for the first time, an Apple variant is propagating through the World Wide Web at an alarming pace. What is Ransomware? Malware comes in all shapes and forms, but perhaps the type users fear most is ransomware. These types of applications effectively encrypt the your hard drive and hold its contents ransom for a sum of money. Once you pay, your drive is decrypted—until the attacker decides to strike again. This type of malware is a well-known problem for PC owners, who have developed a wide array of defenses against it. In the world of OS X, however, it was virtually unknown until KeRanger showed up in 2016. This software hitches a ride into your system on a popular BitTorrent download application called Transmission. If you regularly use this application, immediately verify that you’re not using version 2.90, which is the update the software snuck into. How To Protect Yourself Against Malware One of the most problematic things about Apple malware is that some types masquerade as the very application you would want to use to get rid of malware. Avoid downloading pop-up malware protection applications like MacDefender, MacProtector or MacSecurity. The best way to protect yourself against malware is by keeping your Mac up to date. Use the latest versions of all your applications—especially those that accept and process incoming network connections (like Transmission does). Additionally, make sure you’re running the latest version of Mac OS X and keep your firewall on. Apple’s operating systems feature a built-in malware scanning tool named XProtect. The company regularly updates its database with newly encountered malware variants, which is why keeping your system updated is so important. Third-party malware protection applications are also useful, but should always come from trusted sources. Download free software from recognized brands such as Sophos and Norton. Other free malware protection applications include ClamXav and BitDefender. With highly reputable brand names such as these offering free malware protection, you should be suspicious of any malware protection application that costs money. The Future of Apple Malware Experts predict that Apple malware will become a more prevalent issue over time. The year 2016, in particular, is cited as a year in which Apple system security will be particularly tested. The introduction of Apple Pay into new OS X systems provides a clear incentive for attackers to pry open the security of Apple’s systems, according to FireEye, a specialty security firm. This is especially true of Apple computers used in corporate environments, where business espionage is an increasingly troubling trend. Whether you use a MacBook or the powerhouse Mac Pro, keep yourself safe by installing the latest updates and a reputable malware protection program. You’ll be glad you did. {company} is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks, and news. Contact us at {phone} or send us an email at {email} for more information.