IT Insights Trends

Network monitoring

Network monitoring is the process of continuously tracking the performance, health, and security of a network infrastructure. By monitoring traffic, devices, and services in real-time, businesses can proactively identify potential issues, optimize performance, and ensure seamless connectivity. Our network monitoring solutions provide visibility and control, helping you stay ahead of potential disruptions and maintain a reliable, secure network environment.

Help Desk / End-user support

Help Desk and End-User Support services ensure your team stays productive by providing fast, reliable assistance for technical issues. Whether it’s troubleshooting software, resolving hardware problems, or guiding users through common tasks, our expert support team is available to solve issues quickly, minimizing downtime and maximizing efficiency. We’re here to keep your operations running smoothly and your users happy.

On-site / Consulting support

On-site and Consulting Support offers hands-on assistance to address complex technical challenges directly at your location. Our experts work closely with your team to analyze, recommend, and implement tailored solutions that align with your business needs. Whether you need system upgrades, network design, or troubleshooting, our on-site support ensures your technology runs optimally and efficiently.

Vendor Management

Vendor Management services help you streamline relationships with third-party providers, ensuring that your business receives the best value and service. We handle everything from selecting and negotiating with vendors to monitoring performance and managing contracts. Our goal is to optimize vendor partnerships, reduce risks, and ensure seamless integration with your operations, so you can focus on what matters most—your business.

Cloud Solutions

Cloud Solutions empower your business with flexible, scalable, and secure computing resources. From cloud storage and data management to custom applications and infrastructure, we provide tailored solutions that help streamline operations, enhance collaboration, and reduce costs. Transitioning to the cloud with us means increased efficiency and future-proofing your business in a fast-evolving digital world.

Technology Consulting

Technology Consulting helps businesses harness the power of technology to drive growth, improve efficiency, and stay competitive. Our expert consultants work closely with you to assess your needs, recommend innovative solutions, and guide the implementation of tech strategies that align with your goals. Whether optimizing existing systems or exploring new technologies, we provide the insights and support you need to succeed in the digital age.

[vc_row][vc_column][vc_column_text]malwareWe’ve talked a lot about ransomware this year. The WannaCry attack was certainly the most notable, recently. Ransomware is a nasty piece of code that takes your system hostage until you pay the hacker whatever they demand. Then, most people assume, you get the pass key and regain control. However, it’s often advised to not pay the ransom because there’s little guarantee that the data will be released and you just empower the attackers to keep it up. It’s a pretty mean trick, but there’s a worse one: Wiperware.

On June 28th, the world got its first major viewing of wiperware in the form of a virus called Petya. While, initially, it was reported that the Petya virus was ransomware, it turned out the ransomware claim was just to garner media attention and there was a much bleaker intent than holding data hostage. The objective was to permanently wipe as many hard drives as possible on infected networks. The attack infected thousands of systems across the world, including massive multi-national corporations like Maersk, Rosneft and Merck.

How does it work?

The US Computer Emergency Readiness Team (USCERT) said the “Petya variant encrypts the victim’s files with a dynamically generated, 128-bit key and creates a unique ID of the victim. However, there is no evidence of a relationship between the encryption key and the victim’s ID, which means it may not be possible for the attacker to decrypt the victim’s files even if the ransom is paid.”

How to prevent an attack:

    • Scan all incoming and outgoing emails to detect threats and filter executable files from reaching the end users.
    • Ensure anti-virus and anti-malware solutions are set to automatically conduct regular scans.
    • Manage the use of privileged accounts. Implement the principle of least privilege. No users should be assigned administrative access unless absolutely needed. Those with a need for administrator accounts should only use them when necessary.
    • Configure access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares.
    • Disable macro scripts from Microsoft Office files transmitted via email. Consider using Office Viewer software to open Microsoft Office files transmitted via email instead of full Office suite applications.
    • Develop, institute, and practice employee education programs for identifying scams, malicious links, and attempted social engineering.
    • Run regular penetration tests against the network, no less than once a year. Ideally, run these as often as possible and practical.
    • Test your backups to ensure they work correctly upon use.
    • Utilize host-based firewalls and block workstation-to-workstation communications.
    • Ensure anti-virus software is up-to-date.
    • Implement a data backup and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location. Backup copies of sensitive data should not be readily accessible from local networks.
    • Scrutinize links contained in emails, and do not open attachments included in unsolicited emails.
    • Only download software—especially free software—from sites you know and trust.
    • Enable automated patches for your operating system and Web browser.

How Great Lakes Computer Corporation can help.

There is no guaranteed solution to prevent data theft and malware. Hackers are coming up with new variants on old attacks everyday. However, you can decrease the likelihood of an attack by making it harder to gain access to your data. The biggest weakness in your security will always be your staff. Read our article 8 Network Security Best Practices Your Staff Needs to Know for some helpful tips.

Great Lakes Computer offers a wide range of services that can help safegaurd your data from remote server monitoring to cloud computing to antivirus software to data backup and recovery. We have also partnered with proven providers of services like digital forensics and cyber liablity insurance to ensure our clients have all the tools they need to prevent, detect, remediate, and recover from attacks on their systems. We can help you build the strongest defense possible.

Learn more about our Data Security Product Suite[/vc_column_text][/vc_column][/vc_row]