Data backup has undergone a significant revolution in the past decade. Back in 2009, businesses had a physical room with a server machine for data storage. Backup was self-hosted and its maintenance was primarily the task of the IT department. But now, new technological solutions have made it easy for companies to deploy powerful backup data security. The use of cloud-based storage, virtualization, Big Data, and IoT business solutions are now a commonplace. Let’s look at how data backup has shifted, and the trending data storage practices that affect today’s business world.
[Read more…] about The Changing State of Backup
Data Recovery
The Newest Malware – Fake Windows 10 Update
Great Lakes Computer is always on top of the latest cyber attacks and there’s a new one to beware of – the fake Windows 10 update. Portrayed as a critical update, this ransomware will install an executable .NET file that will infect your computer and request that you make a payment to recover your data. We found this article that we think is worth a read.
“A new malware campaign is under way: emails sent from a fake Microsoft address are pushing people to download a malicious Windows 10 “critical update”. Beware!
Spotted by computer security company Trustwave, the subject of the mail says “Install Latest Microsoft Update now!” or “Critical Microsoft Windows Update!” The mail contains one single line that says “Please install the latest critical update from Microsoft attached to this mail” and an attached file.
If you receive such an email, here are the steps you should take:
1. Delete the mail right away.
2. Write several post-it notes that say “Microsoft NEVER SENDS update notices via email” and place them around your home and loved ones’ computers.How this malware works
The mail contains a jpg file that is actually not a picture but an executable .NET file that will infect your PC.
This executable will download a program called “bitcoingenerator.exe” which comes from misterbtc2020 — a GitHub account. But this bitcoin generator doesn’t generate any virtual riches: it’s a ransomware called Cyborg.
Cyborg will encrypt all your files, locking their contents and changing their extensions to 777. You will also find a text file on your desktop named “Cyborg_DECRYPT.txt”, containing instructions about how to recover your life — for a price.
According to Trustwave, there are four variants of this malicious software. Following the trail, they reached to Russia. Because, of course it was going to be Russia.
Trustwave says this is a real danger to businesses and individuals alike, with the capacity to be attached to other emails and evade any gateway controls.
With that in mind, it’s good to remember to always distrust any mails you get, even if you think they come from a trustworthy source, and never blindingly click on something you didn’t ask for — even if you have the best antivirus software installed. You never know when the next malware will hit.”
Great Lakes understands that malware is always a potential threat.
Our experts can monitor and manage your data 24/7 and ensure all true critical updates are performed on a regular basis. We utilize anti-virus and anti-malware software to ensure your data is protected, and our backup services protect you from this type of ransomware.
Simple Tips to Keep Your Business Data Safe
Business data is vital to keep safe given increasing threats in the marketplace, such as identity theft and various forms of financial fraud. Fortunately, there are simple controls you can implement to mitigate risks to your business and clients’ confidential information. Follow the tips below to protect your data.
Create Data Security Procedures
Designing and implementing data security procedures is critical for getting everyone in your organization on the same page, as it relates to data protection. Standard operating procedures and reference material are important to author and distribute. Once employees know how to secure data, and how the authentication process works, you will start to mitigate risk and build a culture focused on security.
Monitor Network Access
Controlling network access through segmentation, and monitoring access in and out your system, is important for maintaining security and data integrity. User access should be restricted to those areas or data sets required to perform routine duties. If you do not have an internal tracking methodology, you can outsource network monitoring to skilled third-party service providers.
Create Secure Passwords
Routinely changing passwords is an important step in protecting data and restricting access to sensitive information. If a password is easy to guess, it weakens your company’s system of internal control and makes vulnerable sensitive information. Creating well-designed and difficult to decipher passwords can make penetrating your systems difficult for hackers.
Outsource Your IT Help Desk
If you don’t have a dedicated IT team, or if you need technical expertise securing your computers and troubling-shooting technical issues, an outsourced IT help desk is beneficial. Being able to contact an IT professional to work through computer virus issues, or hardware malfunctions, can protect the integrity of your digital records.
Backup Data & Cloud Storage
Regular backup of your data is essential. Whether you have an on-site server, or you utilize a cloud service with offsite storage, your records must be protected. Data loss attributable to natural disasters, faulty hardware or corrupted files can create a myriad of risks for your business. Routine data backup to an offsite location is among the most effective methods to secure business data.
Keeping your business data safe needs to be a priority, because it impacts the financial stability and long-term success of your company. It also protects your clients’ information and mitigates risks associated with identity theft. Follow these simple tips and enhance the effectiveness of internal control.
Great Lakes Computer Corporation can protect your business.
We offer a range of services designed to help our clients protect their businesses from data loss, from preventative maintenance to the latest in security services, at a price that SMBs can afford. Find out what we can do for you.