IT Insights Trends

Network monitoring

Network monitoring is the process of continuously tracking the performance, health, and security of a network infrastructure. By monitoring traffic, devices, and services in real-time, businesses can proactively identify potential issues, optimize performance, and ensure seamless connectivity. Our network monitoring solutions provide visibility and control, helping you stay ahead of potential disruptions and maintain a reliable, secure network environment.

Help Desk / End-user support

Help Desk and End-User Support services ensure your team stays productive by providing fast, reliable assistance for technical issues. Whether it’s troubleshooting software, resolving hardware problems, or guiding users through common tasks, our expert support team is available to solve issues quickly, minimizing downtime and maximizing efficiency. We’re here to keep your operations running smoothly and your users happy.

On-site / Consulting support

On-site and Consulting Support offers hands-on assistance to address complex technical challenges directly at your location. Our experts work closely with your team to analyze, recommend, and implement tailored solutions that align with your business needs. Whether you need system upgrades, network design, or troubleshooting, our on-site support ensures your technology runs optimally and efficiently.

Vendor Management

Vendor Management services help you streamline relationships with third-party providers, ensuring that your business receives the best value and service. We handle everything from selecting and negotiating with vendors to monitoring performance and managing contracts. Our goal is to optimize vendor partnerships, reduce risks, and ensure seamless integration with your operations, so you can focus on what matters most—your business.

Cloud Solutions

Cloud Solutions empower your business with flexible, scalable, and secure computing resources. From cloud storage and data management to custom applications and infrastructure, we provide tailored solutions that help streamline operations, enhance collaboration, and reduce costs. Transitioning to the cloud with us means increased efficiency and future-proofing your business in a fast-evolving digital world.

Technology Consulting

Technology Consulting helps businesses harness the power of technology to drive growth, improve efficiency, and stay competitive. Our expert consultants work closely with you to assess your needs, recommend innovative solutions, and guide the implementation of tech strategies that align with your goals. Whether optimizing existing systems or exploring new technologies, we provide the insights and support you need to succeed in the digital age.

Another malware wreaking havoc on company networks

Virus ProtectionSymantec is currently warning computer users that a new variation of the Shamoon malware has been detected.  This most recent variant performs several different actions on infected systems.  In addition to wiping data and destroying entire files by replacing sectors with random data, the new version of Shamoon is capable of wiping a system’s master boot record.  The malware’s effects also include changing a machine’s active partitions, an action that could render much of the data stored on a system inaccessible or unusable.  Symantec’s computer safety software suite is able to detect this new version of Shamoon as W32.Disttract.

Shamoon is an example of a fairly sophisticated piece of malware.  Instead of attacking the system in a random fashion, Shamoon will scan through a list of files identified as high-priority targets.  It opens up certain specified files in order to determine what access rights might exist on the system.  The security team at Symantec provided additional details about how this new version of Shamoon operates on an infected system: “If successful, it [the malware] will then copy itself to the remote system32 directory and attempt to execute itself using psexec.exe.  If unsuccessful, it will try to load itself as a remote service.  Once it has successfully looped through all target machines it will delete itself.”

The target machines can include all systems on a local network.  Shamoon attempts to share itself across the entire network by gaining access to the domain credentials that control access to the local domain.  Some businesses have seen thousands of workstations become infected in this manner.  Saudi Aramco, for example, has reported that the new variant of Shamoon managed to spread itself to 30,000 of its business systems, greatly interfering with the company’s ability to maintain solid data security.

Is your computer network secure?  Take the Great Lakes Computer Corporation’s FREE 27 point Network System Audit to find out.

If you would like to learn how we can help please contact us sales@grlakes.com