Wanna Cry Protection

Wanna Cry Protection Steps

The recent WannaCry extortion attack shows how common ransomware is becoming in recent times. With over 100,000 computers affected across 150 countries, the ransomware attack has shown that anyone, anywhere, can become a victim of such a scam. Thus, it has become vital to take some steps to protect your computer from similar ransomware, especially if you are running a business.

Here are some tips to protect your system from ransomware in the future:

Back-Up Your Valuable Data: In spite of all security steps you can take, there is still no guarantee that your system won’t be hacked. It is highly recommended to make secure backups of all sensitive data whether you do it in the Cloud or on external hard disks.

In the event of a hack, these backups will save you a lot of time and money by providing immediate access to data that you have lost.

Use an Antivirus: There are many efficient antivirus software available on the market today and it is wise to invest in one. These antivirus programs provide protection against a wide range of malicious software like viruses, trojans, and ransomware. Even if you are not willing to spend to get proper antivirus software, it is necessary to download a free trial version from the internet.

Installing an antivirus does not put an end to your security threats. It is also necessary to regularly update the antivirus software so that it can protect your system from regularly evolving threats.

Update to Windows 10 or Patch Your System: There was a well-known loophole in Microsoft Windows which the WannaCry hackers managed to exploit. Most of the systems affected by this attack ran Windows 7 or older versions of Windows. It is advisable to update to Windows 10 as soon as possible, which is the latest operating system.

Microsoft has also released a patch MS17-010, to fix the loophole, which should be installed right away. It is always wise to keep your system up to date to make sure you get all security updates.

Educate Your Employees: If you are running a big business and conduct much of your operations electronically, ransomware like WannaCry can be a death knell for your business. This is why it is a must to train your employees not to click on dubious links or attachments that they have received through email.

Employees must also avoid visiting untrusted websites or receiving files from complete strangers as they might contain malicious software.

Don’t Pay the Ransom: There is no guarantee that after paying you will be able to access your data or the ransomware will be removed from your system. However, by paying you might be encouraging similar attacks in the future. This is why most experts have advised against paying any ransom to WannaCry.

There is no assurance that the WannaCry ransomware will stop spreading anytime soon. Another attack like this can come anytime in the near future. So, it is absolutely vital to take the steps mentioned above to make sure you don’t lose all your data and have your business crippled.

Massive Cyberattack Targeting 99 Countries Causes Extensive Chaos

Major companies and businesses have been hit by massive cyberattack across the globe. Cybersecurity firm Avast said it had identified 75,000+ ransomware attacks in 99 countries. Online chaos affected thousands of machines globally. Major cyberattacks targeted Russia, Ukraine and Taiwan badly.

The ransomware attack locks people out of their computer files until they pay a ransom to the hackers. Rob Wainwright, the head of the European Union’s law enforcement agency Europol said “It’s still a live threat and we are in disaster mode”. The ransomware attack requires international investigation.Organizations are trying to recover after being hit by a virus that seeks to grab control of computers.

Microsoft said that it had taken further steps to protect systems against the malware. In March, Microsoft provided a security update which offers additional protection against the cyberattack. Those who are running their free anti-virus software and have Windows Update enabled are protected from this severe ransomware attack.

U.S. Treasury Secretary Steven Mnuchin said that the cyberattack was a reminder of the importance of cybersecurity. The organization should learn lessons from the banking industry as it is appeared to be least affected due to the global ransomware attack. Security agencies have not been able to identify who was behind the attack yet. Ransomware attacks are generally criminal in nature and have caused massive disruption all around the world.

Sixteen National Health Service organizations in the U.K. were badly hit and a few hospitals too. A large number of colleges and students in China had been affected by the ransomware. Even the digital payment systems at some gas stations were offline and it forced customers to pay cash.

U.K. defense secretary Michael Fallon said that Britain’s nuclear submarines were safe from cyberattack. Matthew Hickey, founder of the security firm Hacker House said that the attack shows many organizations do not follow cybersecurity updates in a timely manner.Protect your systems with our cybersecurity solutions!

Know All About Google Docs Phishing Campaign

Recently, a number of phishing emails have been sent to random people on Gmail. We have seen many posts on social media about this phishing scheme such as “If you have received an email from me sharing a Google Doc with you, don’t open. Your email address can be hacked” The subject line of these emails could be “XYZ has shared a document on Google Docs with you” and the convincing thing about these phishing emails is that the mail you are receiving will be in the name of someone you already know.

What if you open this document?

If it happens that you click on this shared link, it will ask for access permission to your Google account, but remember actual Google docs link will not ask for any permission. So, this is itself an alarming stage where you can identify the phishing. But still, if you grant the permission, the program will then send this spam mail to all your Google contact with the same Google docs’ link with your name. This will continue and spread everywhere. So, the overall reason for this campaign seems to be spamming as earlier in a similar campaign it had asked people to enter their passwords as well.

Are you receiving such emails and want to stop them?

If you see such mail with the similar subject of Google Docs, you should delete it without clicking on it. In case you have already granted access to this link then you can perform the following steps:

  • Go to – Gmail account’s permission settings – by writing google.com/permissions
  • You will see the name of this phishing campaign
  • Remove permissions for Google Docs.
  • After this, you’ll stop receiving these emails but you’ll continue receiving normal emails from your contacts.

Many organizations have taken precautionary measures to be safe from this phishing campaign as this can steal their confidential data and email address. People are requested to be aware while clicking on unknown links on Gmail. You can refer to Google’ statement about how to avoid phishing attacks and run the security checks for your Google account.

Google has taken necessary measures to safeguard its users from this phishing campaign by taking necessary measures. They have removed fake pages and disabled offending accounts and have spread a notification stating about such an activity. If you think you have been a victim of this and have clicked on the fraudulent link then follow the above steps and you’ll be out of this fraud.



Mobile Phones in Public Ports

Avoid Charging Your Mobile Phones in Public Ports For Privacy

All of us know the feeling when your battery is done but you have to answer business emails or collaborate with the office. That time, you may think of charging your phone in the coffee shop, mall, conference center, plane or airport wherever you are. Don’t forget that hackers can pull data from your phone at the same time. So, be careful while charging your phone at any public port. By charging your mobile in public ports, you give hackers a chance to steal your personal information. Keep in mind that the code you use to charge your phone is also used to send information from your personal phone to other devices. Data security must be an important area of concern for everyone from an individual to a small-business owner.

Following are few tips to protect your phone:
– Avoid using public charging stations.
– If you have to use public charging stations, don’t rely on dual use cables. You can use simple USB adapter.
– You should set screen mirroring function to “Off” on our mobile device.
– Keep your anti-virus and anti-malware up-to-date on your phone.
– Check your access permissions on your phone for privacy.

Despite the risks, people still do it. If you’re concerned about security, then stop using the public ports. And if you’re desperate to reply emails, make tweets or upload selfie, then take the risk on your own.

Maintaining privacy for your personal data is important than anything. Contact us for unrivaled data security solutions.


The Rise of Android Trojan

Android is surely leading the way and continue to soar with the highest adoption rate for android rate based mobile devices in the world. As per a research firm, Strategy Analysis found that more than 200 million of smartphone shipped in 2013-14 were Android based. This humongous customer base is ever rising since the discovery of android operating system. However, this massive user buyer has surely caught up the attention of infamous cyber criminals, who have kept eye on illegally obtaining personal information of phone owners.

If one go by online statistics, in 2016, malicious installation packages infected more than 8 million smartphone users. Unfortunately, the statistics have not dropped instead have increased because of the operating system. Geographically speaking, the nations with the highest number of Trojans and malware attacks were Bangladesh, Nepal, Indonesia, China, and Iran.

The biggest malware threat of 2016 was Trojans. Trojans is a type of virus that allows the cybercriminals to; secretly install the unwanted applications, advertisements and other events on the infected device. The biggest problem with Trojans is that it attacks vulnerable android smartphones patched in the newer versions. As most of the user’s don’t feel the need to update their system or applications, making them susceptible to Trojans and other malware threats.

As the malware installs the module directly in the system directory, it makes difficult to provide a remedy for the situation. There are some Trojans, like, Backdoor.AndroidOS.Triada, which even allows the hackers to alter text messages sent by other applications and steal the money from the android smartphone owner. Normally, hackers demand more than $200 to unlock or amend a device, infected by Trojan-Ransom.AndroidOS.Fusob and Trojan-Ransom.AndroidOS.Congur.

Many feel that having a malware or Trojan is not the crisis; however, if you do not pay attention to the problem at right time, you may even end up shedding money twice as your thought to be. There are more than 50 applications infected by Trojan.AndroidOS.Ztorg.am, a new modification of Trojan.AndroidOS.Ztorg.ad. One needs to be technically aware of the type of Trojans and ways to avoid malware activities on the smartphone.

The best way to avoid Trojans and malware on your phone is when downloading any application stick to the legitimate app store like, google play, amazon app store or Samsung app store. Nevertheless, while downloading be aware of suspicious applications with bad reviews or odd permissions. Always download applications from authorized developers. One can go to security in phone settings and enable ‘verify apps’ option to let the phone use malware detecting software automatically. This feature is available on all smartphones and considered as the best way to avoid Trojans by developers.

Furthermore, always check for any software update available on your phone to keep your applications and smartphone up-to-date and check for any bug fixes or software improvements. Not surprisingly, however, clever Trojans-makers can be, there is always a way out, which is being aware and alert of any suspicious activity on your android smartphone. Therefore, apply caution and entertainment in equal measure. Visit here https://nerdssupport.com/network-security-and-compliance/ to check our cyber security solutions!