WannaCrypt make you WannaCry? An overview of the ransomware attack
As you may be aware, a serious and vicious piece of malware made its rounds over this past weekend. It goes by many names, WannaCrypt, WannaCry, or Wncry, but the fact of the matter is it has already infected over 200,000 computers across more than 100 countries. Any un-patched computer may still be vulnerable to WannaCrypt and any of its variants. Researchers have announced that WannaCrypt 2.0 is beginning to spread along with other variants.
These all fall into the category of malware known as ransomware.
The malware will encrypt files on the computer and then display a message demanding a ransom be paid before restoring access to these files. WannaCrypt, in particular, has demanded users shell out $300 to $1,000 in Bitcoins to regain access to their systems. This will effectively render the computer useless until the ransomware is removed and the files restored from backup.
As everyone may not have complete or any backups, this type of malware can be devastating to a business as the files may not be recoverable, potentially losing days, weeks, months, or even years of work.
How does this happen?
Ransomware has been around for years. This began in 1989 but, throughout the years, has developed into complex malware. However, WannaCrypt is particularly difficult because the attackers gained their resources from a NSA leak. WannaCrypt took advantage of a hole in Windows Server Message Block connections, which are used to transfer files and data between authenticated computers.
The primary delivery method of WannaCrypt ransomware is through email. Be extremely cautious of any email you receive with an attachment even if the sender is known to you. If there is an attachment, especially a .zip file, delete the whole email and never open the attached file. Remember: “When in doubt, throw it out!”
Wannacrypt does not discriminate. Businesses like FedEx and Renault, various universities worldwide, hospitals across Europe, and even Russia’s Interior Ministry and telecommunications company, Megafon, were all hit by WannaCrypt. Patches have been made by Windows but it is extremely likely that similar ransomware will strike again.
How to prevent a ransomware attack.
Intellithought can assist with making certain the machines on your network have the appropriate Microsoft patches that close the security hole currently being exploited by WannaCry and its variants. Services range from a Basic security package for personal users, to Real-Time Monitoring for bigger companies and businesses.
We also provide Intellithought Phoenix which can provide effective patch management and anti-virus/anti-malware to protect against malware such as WannaCry. Phoenix will allow Intellithought to make certain that the computers on your network have the most up to date security patches and are running up to date anti-virus/anti-malware software. Contact Us to receive more information on Phoenix.
What is Phishing?
Phishing (a play on the word fishing and pronounced the same) is a method used by cybercriminals to dupe you into disclosing personal information such as username/password, credit card, and banking information. The goal for the cybercriminal is to steal your identity and/or your money. The information gathered can be used to open fraudulent accounts in your name or make purchases using your financial information. Phishing attacks commonly use email, phone calls, or social media to trick you into giving out your personal information.
What Your Web Design Should Look Like in 2018
The Future of Web Design
“If you think math is hard try web design.”
― Trish Parr
Think of how you use a paper map compared to how you use Google maps. Or look at a printed resume versus a LinkedIn profile. How is a file cabinet in comparison to DropBox? Each of these situations show the central benefit of a website.
Cloud Storage vs. Dedicated Servers, Pros & Cons – Part 2
In part 1 we took an in-depth look at dedicated servers, the solution where a company’s data is stored on physical hardware locally (in the building) using custom software. We found this solution to be costly but secure and flexible. In this post we are going to be looking at a new spin on flexibility called cloud computing, an emerging off-site IT solution for all types and sizes of companies. Furthermore, we intend to answer the question: I know cloud computing will work for advanced organizations in larger metros, but is it viable for a company located in Johnson City, Kingsport, or Bristol?
Let’s jump in.
Cloud Storage, Pros & Cons:
Definition: Cloud Storage means that a company’s data from all its users is hosted (stored) on a “virtual” server supplied by a third-party cloud provider off-site and accessed through the web.
A huge benefit of cloud storage is the ability to access data from any device anywhere there is Internet connectivity. For example, a realtor who relies on a local dedicated server for her data leaves her office to meet with a client. At the meeting, the client asks to see the financial plan for the project. The realtor reaches into her briefcase only to discover she has forgotten the folder in her file cabinet back at her office. The meeting ends.
Another realtor who relies on cloud storage to store her data, leaves her office carrying nothing but her iPad to meet with her client. At the meeting, the client asks to see the financial plan for the project. The realtor says, “Sure,” and opens an app on her iPad, instantly connecting to her cloud storage and displaying the report, as well as other information that client spontaneously asks for. The meeting continues.
The point: a cloud computing solution allows users to access any data through any web-enabled device in any location, removing the limitation of workstation dependency. Businesses that rely on mobility, agility, and real-time data-sharing will find huge benefits in cloud storage.
CloudTweaks, a leader in cloud research, writes:
One of the key benefits of using cloud storage is its scalability. Cloud storage allows your business to easily upscale or downscale your IT requirements as and when required. For example, most cloud service providers will allow you to increase your existing resources to accommodate increased business needs or changes. This will allow you to support your business growth without expensive changes to your existing IT systems.
In the past, when web-based companies jumped from a couple thousand users to millions of users, a company would have to scramble for physical servers. The cloud lets this rapid scalability happen by automatically unlocking more server space in the – essentially – infinite reservoir of storage.
The ability to increase or downsize as needed in a matter of clicks is a huge money-saver, especially for small businesses. With a physical, in-house server system, an increase in IT requirements would mean sinking the cash into new hardware and software. Then, the new hardware and software may be underutilized or even unneeded in a matter of months. Cloud storage makes it easy to scale up or down in server space with greater efficiency and at a fraction of the price.
We compared the pricing of five of the most popular consumer cloud providers.
For a dedicated server system, a company can expect to pay $15,000 – $100,000 depending on size and capability, with ongoing support costs.
For a cloud computing system, can expect to pay $750 – $3,000 per month.
Cloud storage providers have thousands of customers, it can be difficult to get a quick response from them. In this scenario, we recommend working with a local cloud computing company to serve as a liaison to solve technical problems. The benefit here is since the hardware is not on site, IT support will not need to come to your facility to manage the equipment.
Cloud computing subjects users to two risks: large-scale data breaches and Internet volatility. Large-scale data breaches are attacks by malicious hackers gaining access to the entirety of a cloud’s data. The Cloud Security Alliance ranked data breaches as the number one top nine threats to cloud computing security. If the architecture of the database is not designed perfectly, a single flaw could expose the data of every tenant.
When searching for a secure cloud service provider, make sure they employ data encryption. Encryption provides an extra level of safety where each file is individually encoded requiring a decryption tool to access.
Lastly, cloud storage data is only accessible through an Internet connection. If the Internet slows down or goes out, your ability to work drags or even desists.
Cloud Storage vs. Dedicated Servers
We’ve looked at the pros and cons of cloud storage and dedicated servers and this is what we’ve found:
- Dedicated servers pros: security, control, and reliability.
- Dedicated servers cons: cost and local risk.
- Cloud storage pros: accessibility, scalability, and cost.
- Cloud storage cons: macro risk and support.
Is there a universal right choice? No. Is their a right choice for your business in Johnson City, Kingsport, or Bristol? Yes. Location does not matter as much (or at all) to do cloud storage as long as there is reliable Internet connectivity.
Talk to us and we’ll walk you through your specific IT requirements and best-fit solutions at no charge.
Learn More About Cloud Services Contact Us to Get Started
Comparing 5 of the Best Cloud Storage Services Available
Updated for 2016, the cloud storage battle continues to rage as service providers continue to slash prices and add new features to their services. These cloud storage services allow you to store your files, photos, videos, etc. on servers in large data centers, “the cloud.”
Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company.
8 Surprises About the Apple Watch
“We’ve never sold anything as a company that people could try on before.”
– Tim Cook, to sales staff at a London Apple Store, reported by The Telegraph.
The Apple Watch was one of the century’s most anticipated technology products. When the company that could form its own country and compete with other mid-sized (actual) countries, decided to design and produce a wearable, the world watched (pun intended, please laugh).
But did the Apple Watch live up to the hype?
6 Effective Ways to Use the Periscope App
Last month, Twitter announced its $100 million acquisition of Periscope. Twitter CEO, Dick Costolo said that video is only going to become more of a focus for the micro-blogging social network.
Periscope is the, if you will, lead surfer on the new wave of content marketing and social media. It (and its twin brother, Meerkat) are the first pioneers to introduce live-streaming video sharing to the masses. I hopped on the app to try it out and this is what I discovered.
But first —
Pros & Cons List: Cloud Computing vs. Dedicated Servers – Part 1
“I don’t need a hard disk in my computer if I can get to the server faster… carrying around these non-connected computers is byzantine by comparison.”
– Steve Jobs, late chairman of Apple (1997)
Steve Jobs imagined cloud computing fourteen years before it became a reality. In his mind, optimal efficiency and effectiveness were the result of as little hardware as possible. As we can see from the iPhone, iPad, and soon the Apple Watch, Jobs employed minimalism to achieve the sleekest, simplest design for his products.
5 Technology Tools Every Good Business Should Be Using
Business is tough. I get it.
There are so many factors to consider to help grow your business. Which one should I do? That’s probably what you ask yourself every day.
There is no doubt though that information technology allows us the ability to not only grow our businesses fast, but protect it as well.
Your Computer Crashed,
It’s inevitable, computers are going to crash.
They run their course and then they die.
Do you have a plan in place?
Do you have a team in place to monitor your system to see if a crash (or worse yet, a virus) is coming?
Back to that in a moment.
My computer crashed in a lighting storm about 3 years ago.