12 Ways to Protect Yourself From Ransomware.

Prevent Ransomware

Tech TuesdayWhat is Ransomware?

Ransomware is vicious malware that locks users out of their devices or blocks access to files until a sum of money, or ransom, is paid. Ransomware attacks can be deployed in different forms. Some variants may be more harmful than others, but they all have one thing in common: a ransom.

Once the malware is on the machine, it starts to encrypt all data files it can find on the machine itself and on any network shares the PC has access to. Once a user finds that access to the files is blocked and alerts a system admin. The system admin usually finds two files in the directory that indicate the files have been taken hostage, along with instructions on how to pay the ransom to decrypt the files.

Ransomware prevention

Ransomware can spread across the Internet without specific targets. But the nature of this file-encrypting malware means that cybercriminals also are able to choose their targets. This targeting ability enables cybercriminals to go after those who can — and are more likely to — pay larger ransoms.

Ransomware attacks cause downtime, data loss, and possible intellectual property theft and in certain industries are considered a data breach.

Payments are typically required to be in an untraceable crypto-currency such as bitcoin.

Small to Medium Sized Businesses are attractive targets because they generally do not have the defenses that large enterprises can deploy but are able to afford a $500 to $700 payment to regain access to their files.

While knowing how to fight back if your company is attacked by ransomware is critical, taking proactive steps to minimize the odds that your organization falls victim to ransomware is equally necessary.

There are ways to protect yourself from ransomware.

Preventing ransomware attacks in the first place can save your business tens of thousands of dollars — or perhaps millions — in losses due to interrupted operations, data loss, and other consequences. Here are a list of Do’s and Don’t to help protect against falling victim to a ransomware attack:

  1. Do use security software. To help protect your data, install and use a trusted security suite that offers more than just antivirus features.
  2. Do keep your security software up to date. New ransomware variants continue to appear, so having up-to-date internet security software will help protect you against cyberattacks.
  3. Do update your operating system and other software. Software updates frequently include patches for newly discovered security vulnerabilities that could be exploited by ransomware attackers.
  4. Don’t automatically open email attachments. Email is one of the main methods for delivering ransomware. Avoid opening emails and attachments from unfamiliar or untrusted sources.
  5. Do be wary of any email attachment that advises you to enable macros to view its content. Once enabled, macro malware can infect multiple files. Unless you are absolutely sure the email is genuine and from a trusted source, delete the email.
  6. Do back up important data to an external hard drive. If the victim has backup copies, the cybercriminal loses some advantage. Backup files allow victims to restore their files once the infection has been cleaned up. Ensure that backups are protected or stored offline so that attackers can’t access them.
  7. Do use cloud services. This can help mitigate a ransomware infection, since many cloud services retain previous versions of files, allowing you to “roll back” to the unencrypted form.
  8. Do use both firewall and anti-virus software.
  9. Do not use public Wi-Fi connections unless on a virtual private network or using encryption software.
  10. Do use the most recent version of your operating system and browser.
  11. Do train employees on security measures for devices and train to fight against social engineering or phishing attacks.
  12. Don’t pay the ransom. Keep in mind, you may not get your files back even if you pay a ransom. A cybercriminal could ask you to pay again and again, extorting money from you but never releasing your data.

Other terms related to ransomware:

Scareware – Scareware is fake software that acts like an antivirus or a cleaning tool. Scareware often claims to have found issues on your computer, demanding money to resolve the problems. Some types of scareware lock your computer. Others flood your screen with annoying alerts and pop-up messages.

RaaS – “Ransomware as a service,” is a type of malware hosted anonymously by a hacker. These cybercriminals handle everything from distributing the ransomware and collecting payments to managing decryptors — software that restores data access — in exchange for their cut of the ransom.

Fake law enforcement ransomware locks its victims out of their desktops while showing what appears to be a page from an enforcement agency such as the FBI. This fake page accused victims of committing crimes and told them to pay a fine with a prepaid card.

All about ransomware from Malwarebyteshttps://www.malwarebytes.com/ransomware/
What is Ransomware and How Does it Work?https://www.sentinelone.com/blog/how-does-ransomware-work/

Tech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.

 

The Top 5 Reasons Computer Hardware Fails

Top 5 Reason IT Hardware Fail

As we get toward the hot summer months, it is a good time to take a look at some issues that can spell trouble for your computer or networking hardware. Most of these can be avoided with proper maintenance and precautions.

1. POWER SURGES

We like to think electricity is a constant stream that never ever varies, however computers are especially delicate to both rises (too much electrical power) and brownouts (inadequate electrical energy). You might see the lights dimming or flickering during a brownout, or radiant simply a little bit too strong throughout a rise. Power surges or unanticipated power cuts can not only trigger instant loss of information, but they can also damage a Power Supply or fry a processor or motherboard.

The circuit and chips inside the PC are extremely sensitive. If these components don’t get a steady, clean 120-V AC current, they won’t perform optimally. If the power is shut down all of a sudden, it can trigger a system crash in your PC.

2. HEAT
One of the worst things that can happen to a computer is for it to get too hot because usually, it will cause the power supply to stop working and possibly damage the motherboard. To keep this from occurring make certain there’s great air circulation through the computer system. Blocked air vents can cause major efficiency issues by limiting airflow, this can trigger the processor, memory (RAM) and other hardware to get too hot which might result in a possible hardware failure.the top 5 reasons computer hardware fail

Excess heat can trigger the fans to run faster and constantly which can potentially harm internal components and reduce the efficiency of the PC. Your PC might include several fans to keep the internal parts cool. Under typical working conditions, it is regular for a PC to produce a fair amount of heat and become warm to touch depending upon usage. All exhaust fans must be working correctly and air intake vents can’t be obstructed with dust if there is going to be great airflow.

The processor exhaust fan sucks air from the consumption vents and pulls the air across the disk drive and electrical parts, hence getting rid of the heat produced by these components. The second fan is on the power supply. This fan performs a similar function by drawing the air through the power supply and tiring the hot air out the rear or side of the processor.2

Fan failures can happen, however, aren’t extremely typical.

3. DUST
The most significant problem of getting too hot is dust. In our area, we actually get a lot of dust. When the air intake vents clogged, adequate air can not be pulled through the computer to cool the components. Leaving the computer system set on the floor or worst yet. The computer needs to be periodically cleared out to get rid of the dust heaps, clumped pet hair and carpet fibers, along with bugs that often crawl inside the computer

Dust and fibers that enter your computer system will generally end up stuck on the air consumption grill of the power supply. When the air consumption to the power supply is limited, the power supply can overheat and burn out. This can also trigger damage to the motherboard. Another critical location to tidy is the vents in the heat sink on the processor.

4. OVERWORKED COMPONENTS
Overworked hardware with little or no downtime and smoke or fire damage can ruin a system. Physical damage to your computer system: Any type of physical force, such as bumping, jostling, or dropping your computer system may lead to physical damage to the hard disk. If your computer remains in usage at the time of the effect, the read/write heads may touch or gouge the disks, triggering damage to the platter’s magnetic surfaces where the information is embedded. Power Voltage Rises: A power rise can be triggered by lightning strikes, interference with power lines, or by any event which triggers the flow of energy to be interrupted and then rebooted. Power surges can lead to data loss when the read/write heads stop working to operate properly, and in the worst case, a complete computer crash.

5. LIQUIDS
Electronics and liquids do not play well together. When you spill any sort of liquid, whether it be water, coffee or other any other beverage for that matter, you risk of short-circuiting your whole computer.

Merely drying off your computer may not suffice. Essentially, you will want to immediately close down your computer, dry it off, get rid of all detachable parts, make certain they are dry and clean of any residue, and after that wait a minimum of two days to ensure that everything is entirely dry before you reassemble your computer system and hope for the very best.

Tech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.

What is Social Engineering?

Tech TuesdaySocial engineering is the act of tricking somebody into divulging details or doing something about it, normally through technology. The idea behind social engineering is to take benefit of a possible victim’s natural propensities and emotional reactions. To access a computer system network, the typical hacker may look for a software vulnerability. A social engineer, however, could impersonate a technical support individual to fool an employee into disclosing their login credentials.

The kinds of information these lawbreakers are looking for via social engineering can differ. When people are targeted, the crooks are usually attempting to fool you into providing your passwords or bank information, or access your computer to secretly set up harmful software that will provide them access to your passwords and bank information as well as providing control over your computer.

This type of social engineering depends upon a victim taking the bait, not unlike a fish reacting to a worm on a hook. The person dangling the bait wishes to attract the target into acting.social engineering fast facts

The criminal utilizes the phone to trick a victim into turning over valuable information. A criminal might call a worker, presenting as a co-worker. The criminal might dominate upon the victim to supply login credentials or other details that might be utilized to target the company or its employees. Something else to keep in mind about social engineering attacks is that cyber wrongdoers can take one of 2 methods to their crimes.

The criminal might locate the name and e-mail of, say, a human resources person within a specific company. The criminal then sends out that individual an email that appears to come from a high-level company executive. Some current cases included an e-mail ask for staff member W-2 information, that includes names, sending by mail addresses, and Social Security numbers.

What is an example of social engineering?

Social engineering is an phishing attack that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain.

The attacks used in social engineering can be used to steal employees’ confidential information. The most common type of social engineering happens over the phone. … Gradually the hacker gains the trust of the target and then uses that trust to get access to sensitive information like password or bank account details.

Don’t Fall Victim Yourself! Slow down. Social engineers frequently depend on their targets to move rapidly, without considering the possibility that a fraudster might be behind the e-mail, telephone call, or in person demand on which they’re acting. If you stop to consider the ask and whether it makes sense or seems a bit fishy, you may be more most likely to act in your own benefit not the fraudster’s.

For example, it is much simpler to fool somebody into offering you their password than it is for you to attempt hacking their password (unless the password is really weak). Security is everything about knowing who and what to trust. It is necessary to know when and when not to take an individual at their word and when the individual you are communicating with is who they say they are.

Stay in control by discovering the website yourself utilizing an online search engine to be sure you land where you plan to land. Hovering over links in e-mail will show the actual URL at the bottom, but an excellent fake can still steer you wrong. Hackers, spammers, and social engineers taking over control of people’s e-mail accounts (and other communication accounts) has ended up being widespread.

Additional Resources: 

What is Social Engineering? – Webroot

Deep Fake Audio (Social Engineering) spells trouble for business as the latest grade text to audio and Artificial Intelligence (AI) technology can make it near impossible to detect if you are talking to the familiar voice from the office or a computer trying to get key details. Because this can be automated, many cyber-criminals will result to these methods in the coming years. More reasons for businesses and organizations to tighten up their multi-factor policies for all internal and external processes.  Learn more about this technology

ccnytech logo buttonTech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.

 

Boost Your In-Home Wi-Fi Signal

boosting wifi service and coverage

Tech TuesdaySo many people rely on Internet in their homes while they work remotely or take classes. Strong internet wifi signal can make the difference in a glitchy video conference call or an inability to upload or download an important file.

Things to check before blaming your WIFI Signal Strength or Speed on your ISP.

  1. Check Your Wired Internet Connection.

– Find an Ethernet cable and plug your computer directly into your modem/router

– Run an internet speed test to see your internet speed.

– If it doesn’t match the speed on your ISP Plan, you may need to call them to set out a technician or replace your modem.

– If your speed test does match your plan, but it still seems slow, it may be time to upgrade for a better plan. (Depending upon your usage you can go from 50 mbps to 1gbps.)

– If the modem seems okay, try running the test again wirelessly, standing right next to the router.

– If you get good speeds next to the router, but not elsewhere in the house, then it’s time to upgrade the router itself or add an extender.

  1. Placement of your Router for Optimal Performance

– Where you place the router can hugely affect your wireless coverage.

– The key here is placing your router in the best possible location and minimizing interference (both physical and wireless) can greatly improve network performance.

– The router should be placed in the center of your house, if possible, so its signal can reach to each corner with ease.

– Wireless routers need open spaces, away from walls and obstructions.

– Thicker walls, such as those made of brick, concrete, or stone, seriously impact signal strength.

 

  1. Check Your Router Frequency

– If you have a dual-band router, you’ll likely get better throughput by switching to the 5GHz band instead of using the most common 2.4GHz band.

– You can log in to your router’s admin panel and switch the wireless band setting to 5 GHz

– Fewer devices operate at this frequency so this band is less crowded, resulting in a speedier and more reliable wireless connection.

 

  1. Secure From Wi-Fi Intruders or WIFI Leeches

– If your network is open, or has a weak password, you could have an unwanted guest piggybacking on your network.

 

  1. Switch to a Different WiFi Channel

– If too many of your neighbors are using the same Wi-Fi channel, your connection is likely slow and/or spotty.

– If you have a 2.4 GHz wireless router, you’ll want to make sure it is connected to one of the three non-overlapping channels—1, 6, or 11.

– This can be done in your router’s administration portal in the Wi-Fi or Wireless section. (Look for a sub-menu called Radio or Channel.)

– If you have a 5 GHz router, there’s less chance of a crowded channel resulting in a slow connection, though it’s still possible.

 

  1. Restart your router at least once a month.

Turn off the router, wait for 30 seconds, and then turn it back on. Let it run for about 5 minutes, and then check your internet speed.

 

  1. Control Bandwidth-Hungry Applications and Clients

Most modern routers come with Quality of Service (QoS) tools to limit the amount of bandwidth that apps use.

QoS allow users to prioritize certain applications over others.

With QoS, your online gaming session won’t ever be interrupted again by a person watching a 1440p video on YouTube or downloading a huge Linux distribution from the Internet.

QoS settings can typically be found under advanced settings in the network’s administrator interface of your router.

 

  1. Buy a WiFi Repeater/ Booster/ Extender

If all of the above tips fail, it’s possible that your house is just too big for a single router to send a good signal everywhere.

If it’s not possible to be within 50 to 100 feet of your router and/or there are physical obstructions, you can use a range extender to rebroadcast your router’s Wi-Fi signal in other parts of your home.

A good repeater or booster costs less than $100, and it can be installed in a few minutes by anyone since the installation process usually involves only the press of the WPS button.

 

  1. Another option is a mesh router

This type of router consists of multiple access points placed throughout the home to boost signal in those locations.

The advantage of a mesh router to a range extender is that you can manage all of the access points from one central admin interface.

QoS allow users to prioritize certain applications over others.

 

  1. Disconnect unused computers and accessories from the network

 If you have multiple computers, phones, tablets, printers, Smart TVs, and other accessories using your wireless network at once, you might be slowing down your wireless network.

Turn off or disconnect the devices you aren’t using to improve network speeds for those you are using.

You can limit the number of devices your router will allow to connect at a time. This is typically done by logging in to your router’s administrator website and adjusting settings in the LAN or Local Network area.

One Bonus Tip is to consider having an external antenna or upgrade the antenna that comes with the router to extend the range from the same power and components.

Tech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech’s Marketing Guru Daryl Ledyard. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.

“Work-From-Home” Solutions For Older Computers From Microsoft

Tech TuesdayCovid-19 and stay at home orders across the world are presenting new and unique challenges for people who are being asked to work from home for the first time. Employees are navigating managing time, work, family and technology in new ways.

While using a smartphone or tablet may have been easy to answer a quick voicemail or email in the past, employees are finding that working full-time on these devices is not convenient or efficient. Most people find they require access to a laptop or computer to really do their best work from their home office. When you factor in employees who have children at home who are also working from home and in need of a device to work on their studies, many people are finding that they are dusting off old laptops and computers to get through and accommodate everybody’s needs.

Man in home office using computer looking frustrated

The challenge is that as we have come to rely more and more on mobile technology such as smartphones and tablet. The laptop, computer or netbook that was purchased years ago is now old and outdated. People are relying on devices that may be in desperate need of updating before it can really be an efficient tool for a “work-from-home” employee or your children’s distance learning.

Here are some tips on “How to Optimize Windows for Better Performance” from Microsoft’s website. This may help you to to get your older devices in shape to handle your family’s needs in this unprecedented time.

https://support.microsoft.com/en-us/help/15055/windows-7-optimize-windows-better-performance

 

ccnytech logo buttonTech Tuesday is heard each Tuesday on Mix102.5 with Big Poppa and CCNY Tech Engineer Jake Sears. Since 1988, CCNY Tech has been an IT Hardware Sales and Services company. Ten years ago, CCNY Tech has added IT Asset Disposition to it’s offerings.