July 23rd, 2018 by Jennifer Lough
This is the fourth of a multipart series on common types of malware and other computer hazards. For those who have managed services with Micro Visions, we’re keeping an eye on threats for you. However, there are always small things you can do to further protect yourself.
Part 4: Trojan Horses
The term “Trojan Horse” comes from Homer’s Iliad. During the Trojan War, the Greeks built a large wooden horse, pretended it was a peace offering, and snuck into the city of Troy by hiding inside the horse. The key to getting inside the city? The people of Troy had to bring the “peace offering” inside the wall. Similarly, victims of Trojan horse malware generally download or click on something that they expect to be innocuous. (Spoiler, it’s usually pretty nasty.) Good news is they don’t replicate (like a virus does), but the bad news is that they can still do damage. They also tend to be pretty invisible while they’re at it.
According to Symantec, there are a few major categories of Trojan: backdoor, downloader, and infostealer. Essentially, the backdoor type allows the attacker to access your machine and its data and programs. Sometimes this results in someone taking control of your computer while you’re not actively using it (or even while you are). The downloader type acts as a carrier for other types of malware. In this case the Trojan malware is the large wooden horse, and the other kinds of malware are the Greeks. Infostealer Trojans include Emotet, which steals sensitive information from your machine. This type can allow the attacker to monitor your device for passwords and other login information.
What to do?
Micro Visions protects against Trojans and other malware with monitoring and antivirus software. To protect yourself, beware of phishing emails. Avoid websites or links that seem suspicious. IMPORTANT: Your phone can also get Trojans, and it is especially vulnerable to apps with malware. Do your research before downloading.
June 2nd, 2018 by Jennifer Lough
Attention, people in charge of buying things. If you’re anything like me, a large contributor to whether or not you’re going to purchase something is the price. However, if the cost of something is surprisingly low, you should look into the reason it’s so low. Simply put, if it seems too good to be true, it probably is. For example, when someone smashes the front end of a 2017 luxury car and has it rebuilt, the value of the car is far lower than the value of an unwrecked, otherwise identical car. Similarly, a product from one company that’s significantly cheaper than the same product from the official distributor or manufacturer will likely be a low price for a reason. This is where the grey market comes in. Read the rest of this entry »
April 9th, 2018 by Jennifer Lough
This is the third of a multipart series on common types of malware and other computer hazards. For those who have managed services with Micro Visions, we’re keeping an eye on threats for you. However, there are always small things you can do to further protect yourself.
Part 3: Ransomware
Ransomware likes to sneak into your computer and encrypt your files. It’s called ransomware because if you give the attacker money, he could theoretically decrypt the data. Most of the time. Read the rest of this entry »
March 28th, 2018 by Jennifer Lough
Do you know what DNS is and what it does? Because I didn’t, so no shame. First, it’s helpful to define terms.
- IP address: the number that identifies a piece of hardware connected to a network. This allows information to reach it directly. There are several types of IP addresses with different purposes, but they all help devices communicate, but public IP addresses are those that connect to the Internet and the world outside an individual’s home.
Read the rest of this entry »
February 24th, 2018 by Jennifer Lough
This is the first of a multipart series on common types of malware and other computer hazards. For those who have managed services with Micro Visions, we’re keeping an eye on threats for you. However, there are always small things you can do to further protect yourself.
Part 1: Viruses and Worms Read the rest of this entry »
December 14th, 2017 by Jennifer Lough
Regardless of politics, the proposed repeal of net neutrality is making everybody with an Internet presence pretty crabby. However, in the interest of spreading knowledge, I’ve gone and sorted through the hysteria and straw men floating around. The vote to keep or kill net neutrality is today, December 14. Whether net neutrality stays or goes, here’s what it means for your business: Read the rest of this entry »
September 22nd, 2017 by Micro Visions
On September 19th, Apple released iOS11 for iPhone and iPad devices. There is a known issue sending email with the default iOS11 Mail application and communication with Office 365 services.
To prevent interruption in your iOS and Office 365 communications we have 2 recommendations for you: Read the rest of this entry »
September 1st, 2017 by Lauren Zielinski
It’s the first of September. Mornings are cooler, the sun is rising later, and leaves are starting to change color. Fall has finally arrived, and we all know what that means–pumpkin spice everything, college football, and cider mills. But while everyone else is engaging in the stereotypical fall activities and discussions, we’d like to discuss the cloud.
Adopting cloud-based computing can mean big benefits for a business. Aside from the obvious benefit of being able to access your data from anywhere, on any device, at any time, we believe that businesses of all sizes and at all stages can benefit from storing data in a secure, centralized environment. Check out a brief list of some of the benefits of cloud computing below. Read the rest of this entry »
August 25th, 2017 by Lauren Zielinski
Every year businesses of all sizes are affected by catastrophic events ranging from cyber-attacks to natural disaster to human error. Can you relate? Sure…but most business owners commonly think “I mean, come on…how often does a catastrophic event happen in which MY business would be in jeopardy?”
I’m glad you asked! Let’s bring it a little closer to home for you. Citizens living in Texas RIGHT NOW are currently living in fear as they wonder what disaster the storm, Hurricane Harvey, will bring. Read the rest of this entry »
August 17th, 2017 by Micro Visions
It is commonly held that cyber attackers do not and will not waste their time hacking small businesses. Unfortunately, that idea is dangerously wrong. The truth is, just because a business is small does not mean that its information is less valuable to these attackers. Per the National Cyber Security Alliance, one in five small businesses falls victim to cybercrime each year and that number is GROWING. These small businesses are considered the low-hanging fruit because they have very loose or no security systems and protocols in place. Forbes goes as far as saying half of all cyber-attacks are aimed at small businesses. Wow! The trend toward smaller businesses will worsen as larger businesses further tighten security. Read the rest of this entry »