Types of Malware and How to Beat Them: Part 3

April 9th, 2018 by Jennifer Lough

This is the third of a multipart series on common types of malware and other computer hazards. For those who have managed services with Micro Visions, we’re keeping an eye on threats for you. However, there are always small things you can do to further protect yourself.

Part 3: Ransomware

Ransomware likes to sneak into your computer and encrypt your files. It’s called ransomware because if you give the attacker money, he could theoretically decrypt the data. Most of the time. Read the rest of this entry »

Types of Malware and How to Beat Them: Part 2

March 12th, 2018 by Jennifer Lough

This is the second part of a multipart series on common types of malware and other computer hazards. For those who have managed services with Micro Visions, we’re keeping an eye on threats for you. However, there are always small things you can do to further protect yourself.

Part 2: Spyware Read the rest of this entry »

Types of Malware and How to Beat Them: Part 1

February 24th, 2018 by Jennifer Lough

This is the first of a multipart series on common types of malware and other computer hazards. For those who have managed services with Micro Visions, we’re keeping an eye on threats for you. However, there are always small things you can do to further protect yourself.

Part 1: Viruses and Worms Read the rest of this entry »

Doing Nothing About Cyber Security Could Cost You Everything

August 17th, 2017 by Micro Visions

It is commonly held that cyber attackers do not and will not waste their time hacking small businesses. Unfortunately, that idea is dangerously wrong. The truth is, just because a business is small does not mean that its information is less valuable to these attackers. Per the National Cyber Security Alliance, one in five small businesses falls victim to cybercrime each year and that number is GROWING. These small businesses are considered the low-hanging fruit because they have very loose or no security systems and protocols in place. Forbes goes as far as saying half of all cyber-attacks are aimed at small businesses. Wow! The trend toward smaller businesses will worsen as larger businesses further tighten security. Read the rest of this entry »

WannaCry? We don’t. Read these tips to protect yourself from similar attacks.

July 27th, 2017 by Lauren Zielinski

WannaCry Help for West Michigan businesses with Virtual CIO services by Micro VisionsImagine this: You receive an email, apparently from a reputable source, such as Best Buy, where you had recently purchased a flat screen TV. The email states that if you click on the link, you will instantly receive a $25 gift card good towards your next purchase. You had your eye on a brand new blu-ray DVD player to go with that nice TV you just bought. Why not? So you decide to click on the link.

Oops. You probably shouldn’t have done that.

Your machine is now infected with malware and to secure your data or block further nefarious access to your computer, it is demanding that you pay ransom.

Read the rest of this entry »

The Return of the Toxic Newts: BYOD Privacy Concerns in Social Media at Work

September 6th, 2016 by Jennifer Lough

Newts Micro Visions, Inc.A while back, I brought in my toxic newt buddies to illustrate the issues with BYOD in the office. Today, they have returned to address one of the stickier issues in device privacy and security policies. So, hands in the air. Who uses Facebook and Twitter at work? Now stop it. Here’s why.

Since the last time you heard about the newts, one of the grad students in the lab put toxic newts in with nontoxic. The plan is to see whether the nontoxic suddenly start leaking poisonous ooze. This is all well and good in the lab, but it’s not going to fly at work. Mixing Farmville with the daily grind is not, contrary to popular belief, a good plan. Actually, it’s going to make your company computer (because we’ve already established that BYOD is dangerous, so you’re not bringing your own devices) more susceptible to malware. That’s a bummer.

Yes, I know, everybody does it. That’s the problem. Those pesky hackers use it too, and if some smarty pants out there realizes your password is your birthday (which he can find on social media) or 1234, you’ve just given him one more entry point into your company’s systems.

Have a boss? You might be fired for using social media at work, even if you think you’re within the bounds of the policy. Familiarize yourself with that policy and tread carefully. If my professor discovered we were cross contaminating newts not involved in the experiment (supposing any of us had a death wish), we’d all be in the doghouse.

The toxic newts and I grant that there are several advantages to social media in the workplace, but we are still on the fence about whether those advantages outweigh the disadvantages (but it’s not looking good). To each employer his own policy. Should anyone desperately need to be social during the day, look over the cubicle and channel your inner Jim Halpert. There’s a Dwight or Pam out there somewhere.

Subscribe to our newsletter for tips and tech news delivered right to your inbox.

Distinguishing Common Types of Malware

August 11th, 2015 by Pamela Michael

Malware is short for “malicious software,” and is an umbrella term for any software designed to damage or take partial control over the operation of a computer, mobile device or computer network. Malware includes viruses, worms, trojans, spyware, ransomware, adware, and more.

Surely by now you’ve heard most of these terms and have been warned to protect yourself against them. However, not understanding the differences between these types of malware could make protecting yourself more difficult. Here’s a quick rundown of the most common types of malware and some easy ways to protect yourself from them:


Probably the most well-known type of malware, a virus is a piece of code that it capable of “infecting” a computer by copying itself from file to file. When these infected files (germs) are shared between computers, Read the rest of this entry »

How Dyre Wolf Malware is Stealing Millions from Corporate Bank Accounts

April 8th, 2015 by Pamela Michael

microvisionsinc.comDyre Wolf has been unleashed on Corporate America.

This new and sophisticated attack, carried out by a seasoned gang of cyber criminals, utilizes malware and social engineering to dupe unsuspecting employees into divulging sensitive banking information. Millions of dollars have reportedly been stolen so far, and if your team isn’t properly trained and informed you could be next.

Here’s how it works:  Read the rest of this entry »

Malware: A Serious Threat System Administrators Need to Guard Against

January 15th, 2015 by Joseph Lalonde

malware MVIThe more you’re around workstations the more you’re aware that there are people out there looking to break into those workstations. However, today’s threats aren’t so much in damaging workstations through viruses; No, today we’re being attacked by Malware –  malicious software that tries to obtain user credit card information, login passwords, or extort cash.

Read the rest of this entry »

The Crypto Virus: Are your files safe?

June 11th, 2014 by MVI Team

You own a computer, so you’ve certainly become familiar with the threat of computer viruses; destructive pieces of software that work to negatively impact productivity and, in some cases, maliciously breech the security of your most sensitive data. For years we’ve worked to prevent the annoying pop-ups and slowed processing caused when these pests sneak their way onto our machines unknowingly attached to files or downloads. Today, however, a far more vicious threat is being used by cyber-criminals to make millions of dollars off vulnerable prey.

The Crypto Virus, also known as “Ransomware,” is a relatively new attack that works by locking down your machine or encrypting your files, rendering them inaccessible. They become password protected, at which time you receive a message similar to this:

Your files are now held hostage, with the password (or key) offered for a price. If you fail to deliver on the payment, your files are locked forever.

There is no perfect reaction to this kind of infection. Rather, being proactive and PREVENTING the attack is best. If you have the Securelink Essentials Anti-virus plan, you’re already covered. Other anti-virus and malware solutions may also prevent infection; speak with your IT resource for further details if you’re unsure.

If you DO become infected, here are some simple first steps to minimize the damage:

  • Do NOT give your credit card number to pay for your files release. Cases have been reported where, even after payment is made, files were not decrypted. In addition, you’ll have now exposed your credit card number to the added risk of fraud and identity theft.
  • Contact your IT resource(s). Let them know you think you’ve been infected. It may not be too late to seek help.
  • Avoid plugging flash drives/removable media into your workstation. The infection can lock down these files as well.

Again, the best defense against this type of attack is to prevent it. Additionally, faithfully performing scheduled backups can eliminate countless headaches should your important files be permanently encrypted or corrupt.

If you would like information on how Securelink Essentials can work behind the scenes securing your data and managing routine backups, please contact us today.