Posts

Data Security

What is the Wi-Fi hack and how does it affect Miami Business IT Solutions?

On October 16, 2017, the United States Computer Emergency Readiness Team sent out an alert regarding vulnerabilities of Wi-Fi Protected Access II. This is also known as WPA2. This news will impact all businesses on perhaps every scale. However, with the right education and precautions, your Business IT Solutions will remain intact. Our IT Support Miami experts will help you stay steps ahead of your competition. Below, you can find out everything you need to know about the attack.

What is WPA2?

WPA2 is a type of technology that provides network security to Wi-Fi networks. The software, WPA2, is a shorter name for Wi-Fi Protected Access II. All hardware has had this technology since 2006 and has become the standard for fighting data encryption. In it’s creation, WPA2 became a replacement of the original WPA technology. During it’s time, the technology had the most up-to-date encryption standards. Since then, the technology has received regular updates.

On October 16, the US-CERT issued and alert that says if you have a router with WPA2 security, your devices are hackable. This means your device is in trouble if you have Wi-Fi Protected access. In addition, hackers can see your personal information and do anything they want to it.  Marty Vanhoef, a Belgian security researcher exposed the vulnerability. He will be discussing KRack attacks more in depth later this year.

What is the attack?

The vulnerability in the WPA2 Wi-Fi protocol makes your computer prone to Key Reinstallation Attacks, or KRack for short. A KRack attack disables a Wi-Fi router’s security and makes your information prone to whoever is roaming through the same network areas as you are.

You can watch a video of the process below:

If you notice in the video, a potential hacker would only need a few tools to find important login information. Furthermore, if a Miami business owner thinks their company information is not secure, this could be potentially dangerous for vital company information. So far, there have been no major cyberattacks regarding KRack. However, you should know that if an attacker were to gain access to your router, they could manipulate the data by adding a type of ransomware or malware to the computer. In a year full of cyberattacks, it is entirely possible that a hacker would benefit from this type of attack.

Is My Miami Business Protected?

With this information finally in the open, the most common concern is having a safe business in Miami. If your company has any vital information, you must check if it’s on any affected software. If so, you company might be prone to cyber attacks. Therefore, it is important to know the affected software so you, as a business owner, can start figuring out how to secure your business quickly.

As of October 18, the US-CERT confirmed the following affected vendors:

  • Cisco
  • Google
  • Intel Corporation
  • Samsung Mobile
  • Toshiba Memory Corporation

As of October 18, the US-CERT confirmed the following unaffected vendors:

  • Arista Networks, Inc.
  • Check Point Software Technologies
  • Internet Systems Consortium
  • Internet Systems Consortium – DHCP
  • MikroTik
  • VMware

For the full list of affected vendors, you can click here.

Even if you work with unaffected vendors, you should still update your devices. This way, you can ensure that your company may be as secure as possible. As a result, any important business information that you have will remain secure. If anyone in your company keeps information on affected software, you need make sure your data is safe. By doing this, your company will be safe and you won’t have to shut down. 

How Can I Keep My Miami Business IT Solutions Safe?

In the past, our data backup and recovery team has always advocated for the importance of securing your passwords, installing the proper firewalls or anti-viruses and, of course, conducting regular data backups. Updating your devices to the latest software is the best way to prevent KRack attacks. However, if you are a South Florida Business who wants more security for your business, you can trust Nerds Support’s Business IT Solutions to help business owners in Miami, Doral and Ft. Lauderdale to fight against hackers to keep their information safe. Our IT Support Miami service providers work round the clock to you can take comfort in knowing that your business information will be safe from cyberattacks and other disasters. All your information will be safe from malware with Nerds Support’s secure servers. MSPmentor, The Channel Company and, most recently, The South Florida Business Journal have recognized our Business IT Solutions.  Most of all, Nerds Support has helped many small to medium-sized businesses through difficult times and during a time where cyberattacks have been consistent, our Data Recovery Miami team is ready to keep your business safe too. To schedule a consultation, please call 305-551-2009 or fill out a contact form here.

hurricane-harvey

Donating Responsibly With Data Protection in Miami

From Houston to Corpus Christi, the effects of Hurricane HarveyDonating Responsibly With Data Protection in Miami were felt over the weekend. Hurricane Harvey has become the first major hurricane to hit the United States since Hurricane Wilma in 2005. Houston recorded record levels of rain as a result of the storm. Homeless shelters are expecting an estimated 30,000 people. Needless to say, the pictures of the damage are heartbreaking. Like every disaster, people feel the need to unite and take action. It’s incredibly understandable if you would like to donate to the victims of the hurricane, or help in any sort of way. Many sources has said that the best way to help, for those outside of Texas, is to give cash. While giving money is an effective way of lending aid to those in need, there are always a group of people who are willing to take advantage of a person’s compassion.

At Nerds Support, we have recently learned that there are fraudulent emails going around from hackers looking to capitalize off hurricane Harvey. Because it is common knowledge that most cyberattacks happen through email, our IT support experts would like to remind you to keep data protection in mind as you read your inboxes in these next few weeks.

Signs of a Potential Cyberattack

Earlier this week, the Department of Homeland Security issued a statement regarding awareness of Hurricane Harvey cyberattacks. You are allowed to view the link here, but our Miami IT support experts have left a list of the most important ways to keep your data protected from email cyberattacks.

  •  Do not follow unsolicited web links in email messages.
    • You should do a web search to make sure the links in your email are real.
  • Use caution when opening email attachments.
  • Keep antivirus and other computer software up-to- date.
    • Refer to the Avoiding Social Engineering and Phishing Attacks page for more information on social engineering attacks.
  • Review the Federal Trade Commission information on Charity Scams.
  • Verify the legitimacy of any email solicitation by contacting the organization directly through a trusted contact number. You can find trusted contact information for many charities on the BBB National Charity Report Index.

Finally, if you believe you may become the victim of a cyberattack, you are urged to seek out a data protection plan right away.

How to REALLY Help

Despite those out there looking to donate to their own “charities”, there are still a lot of great, verified organizations that will need your help in the next few weeks.

  • Catholic Charities USA, the official domestic relief agency of the US Catholic Church, is taking donations to provide support for Harvey victims. They are accepting donations through text and through a webpage they created. You can access the page and find more information here.
  • Feeding Texas, the Texas chapter for Feeding America, a network of the state’s food banks, is accepting donations here. Like its parent foundation, Feeding Texas uses their network of food banks to feed the hungry. You can also find a list of food bank locations that might need help here.
  • The Texas Diaper Bank is seeking donations to provide diapers to families that have been displaced due to Hurricane Harvey. The bank has set up an Amazon wishlist for donors who would like to buy diapers for the diaper bank. The bank has also set up an FAQ highlighting the many ways you can donate . You can find both of these on the organization’s facebook page.
  • The Houston Coalition for the Homeless, which helps coordinate shelters and outreach for the city’s vulnerable homeless population, has a paged dedicated to shelters in heavily affected areas. To find out how you can help, click here.
  • Portlight is a local organization that offers relief to the disabled and older adults, has released an announcement asking for support.
  • GlobalGiving, a crowdfunding site, has launched a hurricane relief fund aimed at gathering funds for local nonprofits in the storm-stricken region. You can visit the page, and donate, right here.
  • Heart To Heart International is currently giving out hygiene kits to displaced families and need more donations in order to get more kits. The organization is also giving out water and minor medical care. To donate, click here.
  • Austin Pets Alive! has many stray pets that have lost their owners, to find out how you can help click here.

Give Responsibly

There are many great verified charities out there that are motivated to give to victims of Hurricane Harvey. At Nerds Support, our Miami IT consulting team would like to remind you to do the following before you donate to any type of charity.

  • Verify the charity – Conduct an online research on the charity that is reaching out to you. Make sure they have a website and are active on social media.
  • Stay away from suspicious links –  before you click a link, run an online search on the link name. (i.e. A link like saveharveyvictims.com/donate would require an online search).
  • Make Sure Your Data is Safe – 37% of cyberattacks can be avoided if the computer user stays careful. Only open emails from people you know and immediately delete emails from strangers.
Wanna Cry Protection

With IT Services in Miami, You Don’t Have to Worry About Ransomware

Since its sudden increase in 2015, Ransomware has become more than a cruel petty crime…it has become a full blown illegal business model. The profits crypts have taken from this crime have turned Ransomware into a billion dollar business and if your company has not experienced any sort of attack yet, then our Managed IT Support team recommends that you take the time to read this article and follow the necessary precautions to prevent a Ransomware, or other cyber security, attack. Since its sudden increase in 2015, Ransomware has become more than a cruel petty crime…it has become a full blown illegal business model.

Ransomware-Prevention-NerdsSupport-ITservices-Miami

How Do I know if I have Ransomware:

Warning signs of ransomware is not an easy thing to detect, but that does not mean they are impossible to detect. Our IT support team has found some of the following to be common signs of a Ransomware attack:

• Slowdown
• Pop-Ups
• Running out of hard drive space
• Unusually high network activity
• New browser homepage, new toolbars and/or unwanted websites accessed without your input
• Unusual messages or programs that start automatically
• Your friends tell you that they are getting strange messages from you
• New, unfamiliar icons on desktop + battery life drains quickly

However, some malware is so advanced, that most companies don’t even know they are in danger of a ransomware attack until the attack has already been carried out. If your computer has experienced any of these symptoms, our IT consulting experts advise that you do not touch the laptop and that you call your IT support team for help. With a great engineer team, like the one at Nerds Support, Inc. you can assure that your cyber security plan will be the most secure one in Miami.

How Does Ransomware Spread?

Another way that ransomware can spread is through spam emails. Once a computer becomes infected with a type of ransomware, like wannacry, the virus goes through your computer to see the people you have interacted with, typically through email, and they begin sending the virus to your contacts, in the form of spam email. With Nerd Support’s expert Managed IT team, you can assure yourself that your inbox will be monitored and you will be made aware of any suspicious emails. In all cases, it is important that you delete every suspicious email that you get. To protect your email, you should try to delete any strange emails that appear to look like spam. You should also try to stay off of strange or inappropriate websites, to further decrease the risk of a virus. However, the simplest way to assure your internet security is to call a great IT consulting firm to monitor your servers, or move you into the cloud.

How You Can Prevent a Ransomware Attack?

The easiest way to prevent a ransomware attack is to have a great security protection plan in place. A great IT company, like Nerds Support, would already know the perfect plan to protect your company, no matter what size, and their 24/7 IT Support would mean that a cyber attacker would never take your business by surprise. Finally, the best way to prevent a cyberattack, whether it is ransomware or a Trojan horse, is to have the right software on your computer.

Nerds Support engineers pride themselves on having the most important certifications and years of experience to provide companies with the IT support that they deserve. Our company knows the importance of having a secure company and works non-stop to make sure that your company is safe from all types of malware, including some of the most dangerous viruses. If you’re looking for a Miami IT support company that can make your company the most secure company, then you need to consider Nerds Support, Inc. You can leave us message on our website or you can call 305-551-2009.

Managed Security Service

Types of Miami Managed Security Services to Enhance Your Business’s Security

In today’s competitive Miami market, work is usually outsourced to a competent firm. The size of the company does not matter. Managed services are the proactive management of IT assets by an outsourcing firm on behalf of the customer. Among various functions performed by the Managed Service Provider (MSP), managed security service is the most sought after. Here are 5 types of managed services which enhance your business’ security:

Remote Monitoring

Remote Monitoring is the continuous monitoring of all sorts of activity that takes place on the network in order to determine in advance the security threat it poses to the company’s systems or data. They will also try to track any unauthorized behavior on the network as well as try to determine if any inbound connections to your network can hack your company’s data system. Remote monitoring analyses security developments from time to time to locate niggling problems and weed it out as soon as possible.

Vulnerability Testing

Due to vulnerability testing, you don’ have to wait for any security breach before taking any action. It simulates hacking attacks and does software scans on your system to discover any vulnerability that may exist in your system. After performing these tests, they address the vulnerabilities by improving the software and hardware systems.  Vulnerability testing service does not perform network wide security assessment instead focuses on areas which the hackers can exploit.

Penetration Testing

Penetration testing involves random testing of your company’s network periodically with the help of remote access to not only evaluate the IT infrastructure but also to get a clear picture of the network’s strengths and weaknesses. The one-time event is normally performed using manual or automated technologies. Penetration testing offers many benefits which include dodging the cost of network downtime.

Risk Assessment

Risk assessment services help in trying to explain the potential risks that are involved especially security risks which may have an adverse effect on your company’s capital. They will try to minimize the risks involved in sharing information with outside vendors. The risk assessment service will also inform your company about the risks that are involved in the procedures and policies of your company.

Perimeter Management

In perimeter management system, firewalls, Virtual Private Networks and intrusion detection software are installed and upgraded periodically. It is one form of remote service since it involves management of the configuration settings remotely so that both hardware and software are able to secure the information and data systems.

Managed Service Providers play a key role in managing the It department of any organization. Managed services will keep your company’s data safe and provide IT solutions. It will also keep software updated and provide data backup solutions. Using MSP is both costs effective as well as good for the growth of your IT capacity. Managed Services gives quick solutions to security related problems and fixes potential vulnerabilities that can affect your system.

Looking for reliable managed security service in Miami? Contact Nerds Support, Inc. for highest quality managed IT services.