Latest News and Resources
New Malware can infect your FitBit and spread to your computer
Could Your Wearable Carry Viruses?
Recently, a type of vulnerability
Infecting a Fitbit via Bluetooth Is Possible
Hackers
How to Protect Your Devices From Malware
To prevent malware infection,
Although the Fitbit virus is merely hypothetical
Reach out to your Bay Area IT support team and get your network security road map started a with a free onsite network assessment today!
Stegoloader Malware Sneak Attack Hits California Healthcare Providers
Stegoloader Malware Targeting Healthcare Providers Throughout California—Is Your Practice Safe?
There have been number of reports about how stegoloader malware is being used to target healthcare providers across North America, which is increasingly becoming a cause for concern for many practitioners.
Why? Stegoloader malware is the latest and most disastrous version of TROJ_GATAK, (the strain of trojans which use steganography to evade detection) and is sophisticated enough to conceal itself and often slips by undetected because of this ability.
Stegoloader Trojan Infection Count Per Industry
In order to avoid becoming an easy target many healtcare providers throughout the San Francisco Bay Area are choosing to partner up with seasoned IT support teams who have the security skills necessary to protect them against the latest generation of advanced malware.
Read on if you work in healthcare, deal with PHI, and want to learn more about how to keep your organization safe.
Just What Is Stegoloader Malware?
Stegoloader is advanced malware that utilizes digital steganography by hiding within a Portable Network Graphic (PNG) hosted on a valid website. Once this malware is accidentally accessed, it remains on the computer, lurking in the background, often evading detection.
It should be noted that the malware is so sophisticated that when it detects security or analysis tools running on the infected system, it will suspend its main program code, allowing it to stay hidden. Furthermore, it has been designed to ‘look’ for reverse engineering tools and terminate them, making it difficult for providers to regain control of their computer systems even when a security threat has been identified.
North American Healthcare Providers Targeted
A report carried out by Trend Micro found that North American healthcare providers were by far the greatest targets and experienced the heaviest impact as they became infected with the Stegoloader Trojan.
It increasingly appears that cyber criminals are becoming more interested in stealing healthcare information than even credit card information (PCI) since protected health (PHI) information has been fetching higher prices on the black market. This puts healthcare providers in a vulnerable position as their system security may have been breached without them even being aware of it.
Keeping Your Organization Safe
Stegoloader malware is impacting healthcare providers across North America. Up until they experienced a breach directly, many of these organizations remained complacent as business operations demanded full attention and the priority of planning IT security was set aside.
Don’t make the same mistake by assuming you have the adequate security measures in place. If you are concerned that your healthcare practice may have already been targeted, or want to prevent your system security from being infiltrated, get started with a free network assessment today.
Leverage the wealth of experience of our strategically-minded IT support services team, and implement the right technological solutions for your office to help prevent your organization from falling vicitm to a healthcare data security breach.
Is your point of sale software at risk of being infected by malware?
Is Your Point of Sale Software At Risk of Being Infected by Malware?
Point
What Is Point of Sale Malware?
Malware
Some of the high-profile companies that have
How to Protect Your Business
The first step to protecting
At
5 things every CEO needs to know about the Cloud
5 Essential Facts About the Cloud for Business Owners
Cloud computing
1. Cloud Systems Can Help Your Business Save Money
The most attractive thing about Cloud systems
2. The Cloud Can Facilitate Remote Collaboration.
Because everything is hosted
3. Cloud-Based Systems May Have Tighter Security Than In-House Solutions Due to Compliance Regulations
Some businesses are wary of Cloud-based
4. There is No Upgrade Cycle for SaaS.
One of the drawbacks of in-house software is the constant need to upgrade to the latest version. Sometimes
5. Switching to the Cloud Can Enable Next-Generation Analytics.
The other buzzwords you may have heard
Cloud computing
http://www.economist.com/news/business/21648685-cloud-computing-prices-keep-falling-whole-it-business-will-change-cheap-convenient
The Best Way to Protect Your Business? Start Fighting Back Before Malicious Malware Attacks
Worried About Malware? Protect Your Business Proactively With Managed IT Services- Before Disaster Strikes
Malware is software that has been developed to attack and inflict harm on computers and their networks.
Malicious attacks can be especially damaging to businesses because once malware infects computers, it can be used to disable your business, hold your data hostage or even steal crucial account details to ensure mayhem and bend your organization to your attacker’s will.
What Is Malware?
Malware is a type of software that is designed to cause disruption and damage to computer systems.
While there are many different types of malware, such as adware, viruses, spyware and browser hijacking programs, it should be noted that much like a virus in biology, a computer virus has the capacity to replicate itself and infect other computers on the network.
With that in mind, hackers are constantly looking for for security vulnerabilities in websites so they can use them to their advantage by infusing malware into the software and systems that are already present, even on trusted websites.
(Sidenote: Studies have shown an estimated 82% of malicious sites are actually legitimate websites which have been compromised)
The United States has the highest number of malware-infected web pages in the world and the effects of malware can vary from nusicances such as simply being inconvenienced by recurring pop-up windows to more sinister and damaging effect such as identity theft and financial failure (based on extortion or fines incurred).
Just How Do Malware Attacks Work?
While the inner-workings of each malware exploit will vary, from a business decision making and Office IT related perspective, most have this in common:
- They are extremely effective at infecting and exploiting their victims
- Malware attacks can often force operations to grind to a halt as business is brought to a stop for triage and quarantine to be fully conducted
- Without the right safeguards and recovery solutions in place, your business can face days (possibly even weeks) of downtime and/or have to deal with massive data loss
- Malware exploits place your clients’ sensitive data in harm’s way (if your business network is compromised, data stored and transmitted also is at risk)
- Businesses held to data security standards (such as PCI-DSS, the SEC OCIE Cybersecurity Initiative Guidelines or HIPAA Security Rule requirements) will often incur fines if they are found to have insufficient safeguards in place.
What Is the Financial Cost of an Attack?
Research analysts estimate that businesses around the world will spend approximately $500 billion dollars repairing computer systems from malware damage and other security breaches.
Furthermore, when you take into account the number of hours or days spent trying to retrieve lost data (depending on what business continuity and backup technologies you have in place), that figure easily climbs higher.
Another tactic which has been growing rapidly is the use of malicious injections into businesses’ payment processing systems, which allows cybercriminals to steal customers’ credit card information.
Data loss can set a business back weeks, if not months. Malware attacks are continuously on the rise, and industry trends are showing that hackers are now adjusting their aim to going after small to midsize businesses. Why? With smaller operational staff, or a lack of a fully-fledged IT department, these cyber raiders know they’ve identified a soft target…
Keeping in mind that a data breach can result in multiple punitative fines, potential lawsuits and most importantly, a loss in consumer confidence as credit card payment information and personal data are exposed (as seen even with big-name players such as Target).
How to Protect Your Business From Malware
It’s time to take a stand and make sure your business is protected. Take action to know your organization is prepared. Rest assured with the knowledge that your business will be be back up and running, able to rapidly move forward if and when you are attacked.
The financial cost to affected businesses can be staggering, but by choosing to work with with seasoned Bay Area IT services veterans, disaster can be avoided by partnering with the right IT firm.
When you combine a proactive approach to business IT with dedicated and ongoing strategic technology planning, regular monitoring and ongoing updates supported by best-in-class business continuity and recovery solutions, you drastically decrease the likelihood of your organization becoming a malware target and enable your business to stay one step ahead of the hackers.
Curious where your network stands? Find out today with a free onsite network assessment with one of our technology experts.
Read MoreBusiness IT Security And Why You’re Floundering Without It
Business IT Security and Why You’re Floundering Without It
Intitially, the term “IT security” may seem out of reach for many small business owners, or possibly even like a luxury, but as ransomware, BYOD-policies and compliance requirements become incraesingly common in the workplace, a lack of security can actively hamper growth, even and particularly with. At worst, it can sink the entire enterprise.
Many small- and medium-business owners know that IT security is something they should care about, but they have no idea how to manage it. One study by the National Cyber Security Alliance found that a whopping 59 percent of small business owners have no plan in place to prevent data breaches.
Even industries that revolve around preparing for the worst can be affected. IT help desk services can often be the first the line of defense for insurance companies, financial services firms, and healthcare providers in San Francisco, Oakland, or elsewhere throughout the greater Bay Area.
In fact, insurance companies are one example where a lack of network support services might have an outsized impact. Insurance companies regularly deal with highly sensitive data, including names, Social Security numbers, birthdays and addresses. Having the right IT support is essential.
What’s at Stake
The cost of data breaches can be enormous for small business owners. Research from Atlanta-based payment technology firm First Data shows that as many as 90 percent of data breaches can be traced back to small businesses, and the average cost of a breach to small businesses can be as high as $50,000 or more. That would be devastating for most small businesses and doesn’t even begin to account for the loss of trust from your customers. IT service continuity is critical.
What Companies Can Do
Experts say that, at the very least, small businesses can enact the following controls:
- Secure all your business data. Security experts at Kroll say businesses should only keep the data they need.
- Stay current with security patches and updates. This can be more difficult than it seems, especially for busy small businesses.
- Require the strongest possible passwords.
- Establish an Internet usage document and make employees sign it.
- Limit access to your network outside of private workspaces.
- Consider a professional IT security audit.
Looking Inward
No one wants to think about a worst-case scenario, but threats to business data aren’t likely to go away any time soon. Unfortunately, employees are often at unwittingly at the center of them. Data from TrendMicro found that nearly 60 percent of employees surveyed “very frequently or frequently stored sensitive data on their laptops, smartphones, tablets, and other mobile devices.” This may mean that more sophisticated IT support is needed to prevent a worst-case scenario in the era of Bring Your Own Device (BYOD). Rather than relying on stop-gap measures, having your IT services provider regularly work on prevention may secure your business now and in the future.
Read More
OCIE’s Focus on 2015 Cybersecurity Examination Initiatives
Understanding OCIE’s 2015 Cybersecurity Examination Initiative
Following
In its summary report of those
The OCIE further announced that it planned to focus on cybersecurity compliance
OCIE 2015 Cybersecurity Examination Initiative Priorities
OCIE examiners will pursue investigations into any
1. Governance and Risk Assessment
The OCIE may examine whether companies have existing
The
- Information security when dealing with third parties
- Software
patching, especially regarding critical security updates - Board minutes
and briefing documents containing or related to sensitive information and cybersecurity - A firm’s chief information security officer (CISO) or equivalent
position - The firm’s organizational structure as related to cybersecurity
- The
firm’s procedures for risk assessment, proactive threat identification, penetration tests, and vulnerability scans
2. Access Rights and Controls
The
The OCIE notes its intention to highlight concerns related to the following:
- Controls and safeguards for network segmentation and access levels across
different security clearances - Perimeter-facing procedures such as failed
logins, password retrieval, dormant accounts, and unauthorized logins - Network
access from outside devices - The firm’s documentation and dissemination
of its cybersecurity procedures to all relevant users
3. Data Loss and Prevention
OCIE
Examiners may highlight
- Identifying and preventing unauthorized data transfers
- Verifying
the authenticity of requests to transfer funds - Mapping data to verify information
ownership and privileges - Data classification and security levels
4. Vendor Management
As third-party vendors are a prominent source
The OCIE
5. Training
Security procedures are only as effective
6. Incident Response
The OCIE will examine a firm’s policies and
Examiners may further highlight procedures related to the following:
- How
cybersecurity fits into a firm’s business continuity plan - A firm’s testing
and drilling procedures for cybersecurity incidents and all data disasters - System-generated
alerts to automatically notify key personnel of potential incidents - Actual
customer losses related to cybersecurity incidents
Recommended Actions
Ultimately, the OCIE’s examination priorities reveal that it considers
A
To achieve
1. Data Protection
A
2. Proactive Security
A
3. Cyber-Perimeter
A
4. Documentation
84% of Dropper File Malware Attacks Hit Healthcare – Here’s What to Do
File Dropper Malware Targets Healthcare
As organizations worldwide work to increase data protection, cyber criminals are continuing to launch increased attacks against businesses. One of the greatest risks facing modern organizations are “dropper files.” These common risks are a form of advanced malware that gain entry into business systems through vulnerabilities to gather protected information to sell.
There was a significant spike in dropper file attacks in March, which constituted 90 percent of these malware attacks to date. Healthcare organizations are four times as likely as other industries to be targeted by dropper attacks, which constitute 84 percent of cyber crimes in this niche. This is a major threat in the information security realm, but there are ways businesses can take action to protect themselves against costly data breaches.
A dropper, or Trojan dropper, is a form of file that injects viruses and worms into a computer system. In some cases, these files can execute without being saved to a computer’s disk, which aids in avoiding detection by on-staff IT professionals. Droppers can encompass many forms of information security attack, including ransomware, a term used to describe a common method in which information security attacks are executed.
Due to the incredible sophistication of successful dropper attacks, a comprehensive information security practice is the only effective means of preventing this type of cyber crime. Symantec recommends a variety of approaches, including maximum firewall security, a comprehensive password policy and regular review of user permissions. By reducing vulnerabilities, including unnecessary file sharing and extraneous services, businesses can limit the ways in which dropper files can enter their networks.
Information security is inherently complex. Humans, compromised computers and outdated patches can all present means for dropper attacks to gain entrance to a company’s network. Working with an expert information security consultancy to identify risks can allow businesses of all sizes to prioritize and act upon their greatest vulnerabilities. Experts can assist with creating a broadly focused framework for protection and training.
A sophisticated, varied approach to information security is the only effective means of protection in today’s complex cyber crime climate. By partnering with an experienced IT services provider, your Bay Area business can get started reducing the risk of human error enabling malicious attacks, cut back on network related risks, and develop a comprehensive, customized approach to using technology to protect, preserve and promote your office productivity.
Stegoloader Malware Targeting Healthcare Providers Throughout North America — Is your Practice Safe?
Stegoloader Malware Targeting Healthcare Providers Throughout North America—Is Your Practice Safe?
There have been number of reports about how stegoloader malware is being used to target healthcare providers across North America, which is cause for concern because the malware is sophisticated enough to go undetected. To avoid being targeted, partner up with experienced IT security experts who have the skills to detect this complex malware. Read on if you live in the San Francisco Bay area to find out how we can help your organization.
What Is Stegoloader Malware?
Stegoloader is advanced malware that utilizes digital steganography by hiding within a Portable Network Graphic (PNG) hosted on a valid website. Once this malware is accidentally accessed, it remains on the computer, lurking in the background, often evading detection. It is so sophisticated that when it detects security or analysis tools running on the infected system, it will suspend its main program code, allowing it to stay hidden. Furthermore, it has been designed to ‘look’ for reverse engineering tools and terminate them, making it difficult for providers to regain control of their computer systems even when a security threat has been identified.
North American Healthcare Providers Targeted
A report carried out by Trend Micro found that North American healthcare providers were major targets, as many of their machines were infected with stegoloader Trojan malware. It appears that cyber criminals are interested in stealing healthcare information because it can be worth much more on the black market than credit card details. This puts healthcare providers in a vulnerable position as their system security may have been breached without them even being aware of it.
Keeping Your Organization Safe
Stegoloader malware is impacting healthcare providers across North America. Many of these organizations would have been initially complacent because they thought they had adequate security measures in place. If you are concerned that your healthcare practice may have already been targeted, or want to prevent your system security from being infiltrated, we can help! Bay Computing has a wealth of experience and technological solutions that can prevent your organization from having its security compromised.
When It Comes to Patch Management, Zero Day Can Be the Longest Day
Zero-Day, the Longest Day?
Ever since childhood, you learn that things go “Boom!” when you count down to zero…
Sometimes that’s a good thing: The engines ignite and a rocket lifts off
Sometimes that’s a bad thing: A bomb detonates
The question for software development and IT support teams is what does zero-day mean in terms of impact on end-users and what, if anything, they can and should do about it.
Zero-Day Defined
Despite software vendors’ best (or sometimes not) efforts, all software has bugs in it. Some of these bugs present opportunities that malicious users can take advantage of to gain access to a network, functionality, or data that they aren’t authorized to use.
Zero-day vulnerabilities are the bugs the vendor doesn’t know about. When hackers exploit them, this is called a zero-day exploit. Once vendors learn of a vulnerability, they work to create a patch to close it. Microsoft regularly issues patches on one or two Tuesdays per month, with occasional patches issued at other times.
Patches Close Zero-Day Vulnerabilities
Once a patch is issued, you can close the vulnerability by installing the patch. Yet it must be noted- If you don’t install it, your vulnerability to the zero-day exploit continues indefinitely. This is one reason it’s important to remain on supported versions of operating systems and application software, as well as pay for maintenance support. When you’re on an unsupported version, patches are no longer created — even if a security hole is later identified. Because code is commonly shared between versions, a hole found in the latest, supported version of the OS might exist in your older, unsupported version. But the vendor will only issue a patch for the supported version, meaning the zero-day vulnerability can’t be closed on an older system.
Because of the risk of these exploits, many companies require their computers to be maintained at current patch levels. In some ways, this is the “safe” decision. It’s important to realize, though, that there are risks associated with patching systems as well.
Patches Have Risks
The biggest risk is that installing a patch will somehow break an application. Patches are software, and as likely to contain bugs as any other software. There’s also the cost of downtime involved with deploying a patch, plus the potential of a failed deployment leaving a computer unusable until it can be restored. If the patch isn’t simply “under the hood” but makes a change that end-users can see, they may need some time to become familiar with the new way things work.
Create a Patch Management Strategy
Rather than automatically deploying all patches to every computer, companies should evaluate the risks involved. If a PC isn’t connected to the network, there may be very little risk of leaving it unpatched. When patches do need to be deployed, companies should think through how they can complete the deployment while minimizing the risk to their operations. Deploying to a few machines at a time and keeping some machines unpatched as a fallback are two options to consider.
The best way to develop a patch management strategy is to speak with an IT services provider like Bay Computing. We can help you evaluate the threat of vulnerabilities and plan a safe approach to deploying patches. Contact us, your San Francisco IT Services Provider to hit “stop” on the countdown to zero.
Read More