Need Support Right Now?

What is a Virus?

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

An email virus comprises of malicious code that is distributed in email messages, and this code can be activated when a user opens an email attachment, clicks on a link in an email message, or interacts in a totally different way with the infected email message.

Email viruses are mostly spread by causing the malicious message or attachment to be sent to everyone in the victim’s address book. Recipients can find it difficult to identify specific email messages containing malware since these messages appear as if it has been sent from a known and trusted sender. This is true in the case of phishing attacks carried out to further business email compromise attacks.

Types of Email Viruses

Ransomware: Mostly delivered through emails, ransomware encrypts the victim’s data and then demands a fee to restore it. The motive for ransomware attacks is mostly monetary.

Phishing: Phishing employs manipulation to trick victims into revealing logon data or other sensitive information that criminals use or sell for malicious purposes. Generally, a phishing attack comprises of an authentic-looking sender and a message that is socially engineered. The recipients who believe that the message is from a legitimate source and end up opening infected attachments or clicking on malicious links.

Spoofing: Email protocols lack efficient mechanisms for authenticating email addresses and hence hackers are able to use addresses  that are very much like legitimate ones, tricking victims into believing that fraudulent emails they receive are from a trustworthy individual.

Whaling/Business Email Compromise: Business Email Compromise (BEC), also referred to as “whaling”, target’s an organization’s biggest fish. In this type of social engineering scam, an attacker sends an email to someone in the organization that has the potential to execute a financial transaction. The email appears as if it is from the CEO or another authorized individual, and demands for an instant financial transaction such as a vendor payment, wire transfer, or direct deposit.

Spam: Spam continues to be a major challenge for organizations even though a number of attempts have been made to filter out unwanted emails. While the most normal type of spam is simply considered a nuisance, spam is also frequently employed to deliver malware. For instance, ransomware is most commonly delivered through spam and thus alerts all organizations to carefully assess spam for dangerous intent.

Key Loggers: Criminals behind the most damaging data breaches always utilize stolen user credentials. A keylogger is considered to be one effective method used by criminals to obtain passwords and IDs. This is mostly delivered by emails when victims unknowingly click on a malicious link or attachment.

Zero-Day Exploits: A zero-day vulnerability refers to a security weakness that is not known to the software developer. The security hole is exploited by hackers before the vendor has developed a fix. Zero-day attacks are mostly delivered through malicious emails, and hackers use them in order to gain unauthorized access and steal sensitive information.

Social Engineering: Social engineering is used by cybercriminals in order to build trust before stealing confidential data or user logon credentials. In social engineering attacks, a computer criminal acts as a trusted individual and engages in a conversation to gain access to a company’s network. The attacker tricks the victim into disclosing passwords, IDs, and sensitive information, or forces them to unknowingly perform a fraudulent transaction.

How To Stop spam and Email virus

Consider employing the tips given below to prevent an email virus from infecting your client device or network:

  • Use antivirus software.
  • Scan all attachments for malware.
  • Refrain from opening potentially dangerous attachments, such as PDF files, that have been included in email messages from unknown senders.
  • Don’t click on links provided via email messages, and watch out for phishing email messages that appear to be sent from authorized sources.
  • Keep the mail client, operating system, and web browser updated and patched.
  • Do not open any executable files included as email attachments. Attackers may try to disguise these files by naming them with two extensions, such as image.gif.exe, but .exe is indeed the sign of an executable that will run automatically.
  • Don’t give out your email address to websites that are unsecured. Even if the site holds up, malware and viruses can still snag your address, making it easy for them to send a fake email with a virus your way.
  • You can stop spam and email virus attacks by getting a text preview in your chosen email service. Content previews give you a glance of the content in the email by minimizing your need to click on the email in order to ascertain its subject matter.
  • If an antivirus program sends you an email telling you that your computer has been infected, always make sure to verify the information via your antivirus software before opening the email. These programs are less likely to correspond via email than interface messages.

3 Ways an Email Virus Infects Computers

Individuals and institutions need to invest more resources into email protection to keep email virus at bay. Although an email virus looks simple, one must not underestimate its capacity to damage your computer. More email protection is necessary considering the possibility that a cybercriminal is behind the email virus.

In order to gain more email protection, consider what parts an email virus may be hiding in an email so you can guard yourself accordingly.

How an Email Virus Is Delivered to Your Email

Top 3 Ways an Email Virus is Delivered to your Email

  • An Email Virus in Phishing Email
  • Email Virus in an Attachment
  • An Email Virus in the Body of the Email

1. An Email Virus in Phishing Email

An email virus may only be the beginning of a targeted effort to gain your personal information. Some hackers could be aiming for sensitive data in your account or in some database you have credentials. Aside from upping your email protection, you will need to increase your vigilance as well. The hackers may have done research and used social engineering to design a phishing email to get your data.

In this case, email protection needs to be complemented by self-awareness and gut instinct. If you don’t know how a particular company got your email or you don’t know the person emailing you, it’s better not to touch the message as it may contain an email virus.

Also pay attention to the web address inside the email and remember if it’s the same one you log into. If there’s a change in the email address, verify with the institution if they had their domain changed. Sometimes changes in the address are so minute so you will need to be more detail oriented than normal. A little care is better than additional email protection.

If you’re aware that the email is a hoax, kindly delete it and don’t pass it along anymore. Start a practice of being very selective of what messages you pass along so you become a part of other people’s email protection in a way. This will also lessen the chance for an email virus to spread.

2.Email Virus in an Attachment

The most common way an email virus gets delivered is through the email attachment. Again, for better email protection against an email virus, you will need to be vigilant and do not open the attachment if it is not from someone you trust. And even if you trust the sender, you will still need to check the file name of the attachment.

Email virus often take the form of an executable file, therefore be very suspicious of anything that ends with the following extensions:

or anything that might have scripts in it: .doc

If you have antivirus on your computer, you can download the message but do not open it. Get your antivirus scanner to check for email virus. This can help clean the file for you. However, for the best email protection, your company or yourself can get Comodo’s Antispam Gateway. This particular software weaves three layers of email protection in a command console, containment technology which isolates email virus and let’s it run from a safe environment inside your computer, and advanced filters and algorithms which are wired to weed out threats inside your email. What better email protection is there?

3. An Email Virus in the Body of the Email

An email virus can likewise be embedded inside the body. However, much like email virus in attachments, email virus in the body also disguise themselves rather well. There are two ways they can compromise your email protection. First, they can disguise themselves as links. You may think you are safe inside your email account so you don’t need email protection anymore. That’s wrong. First, if you click on a link, you can end up opening an infected site which will install an email virus in your computer.

Second some email virus may pose as simple HTML code. So the best email protection advice in this scenario is to avoid enabling HTML in your account and stick to the standard view. That way an email virus will not have the chance to install itself.

Now you know where an email virus can be placed within your email. You’ll get the best level of email protection as long as you pair any solution you have with common sense and vigilance. This way even if you have a full suite of email protection software installed in your computer, no email virus will go past you in case your software fails. The best email protection is still you.


What to do when a File is Potentially Corrupted

Sometimes while sitting at your computer, drinking your tea and minding your own business, a file SUDDENLY goes rogue.

  • It runs amok
  • It will not open
  • It throws an error
  • There is a hitch in the giddyup
  • It takes the sunshine in your day and blocks it with a dark cloud

There are things that may be done before crying, throwing that tea cup against the wall or well… running around the room with your arms flailing over your head in a fit of panic.

Inform you to restart your system

Because you were preemptive, and you already have worked with setting up backup with Sandra Network and have Mozy in your pocket, all you need to do is give us a call, or email us at [email protected]

Or, in the case you have not yet set up a backup plan with us, we may be able to repair this file for you, if you are not comfortable doing so yourself. Generally, it is best to have someone with this experience help you out so more damage is not done. Again, you can give us a call at 978-535-0202 #3 or email and we will be glad to help you out.

If you are feeling adventurous, there is an option you may take.

Boot in “Troubleshooting tools by rebooting and continuously hitting you <F8> key until you are given the option.

Select Troubleshoot Option

Select Troubleshoot

select Advanced Options

Here you will want to select Advanced Options and Startup Repair

Now… if this does not repair, and you have not set up a restore point in the past… THIS is when you will want to call Sandra Network! We have ALL sorts of tricks up our sleeves for you!!!

What Are The Benefits of Anti-Virus Software?

One of the most important things is to stay ahead of the attacks with updates and real time protection. Without this, there is very little that may be done once the malware assaults, other than rebuilding the machine or hiring an IT company to clean the virus from the machine and THEN install an anti-virus application.

Yet another form of Ransom-ware!

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.9.0″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″ sticky_enabled=”0″]

Your screen just went to this:
What do you do?

It could be a Ransomware – Just look at that color!!!

Ohh NOOOOO!!!!
Do you call the phone number?
Do you click on the page and find as many links as you can?


This is the doorway for ransomware that will only bring you sadness and destruction.
There are a couple of tell-tale signs that will only bring you sadness and destruction. There are a couple of tell-tale signs:

The URL. In most cases, it is something that should throw red flags. In THIS case, it is…
Windows Security Essentials does not send a phone number to their help desk and that hints towards a potential ransomware attack. Many times, ransomware attacks can also come through email viruses too.
You may not even have Windows Defender turned on, but it will never blank out your screen with an error, it might send a “notification”.

What should you do?

  1. You will want to start the Task Manager. There are two ways to get to it:
    <Ctrl><Alt><Del> at the same time
  2. Right click on your taskbar
  3. Select the browser you are in (Chrome, IE, Firefox)
  4. Select “End Task”. (this will close out the application
  5. Download an Anti-Malware app for example:
  6. Call Sandra Network: 978-535-0202 #3 or email: [email protected]

Sandra Definition


LogMeIn is the Right Thing Baby! Call Us.

Think about the Summer and LogMeIn

Though Sandra Bullock in The Net could do it without a thought, very few (if any) could work remotely from a beach in 1995, let alone use VI shell to program on a Macintosh Laptop. Sorry, I was speaking geek… I digress… Now add LogMeIn into the plot.

The Net - LogMeIn

Scene: The Net (1995)

It is 2017 and you have the option to work anywhere you want to You can WAH (Work At Home) or WAB (Work At Beach) or just about anything. How do you do this you ask?

  1. Call Sandra Network at 978-535-0202 #3 or [email protected]
  2. Ask about setting up LogMeIn for your business, or personal use
  3. Log into the new account
  4. Roll over in the sun and enjoy that margarita on the beach, while working on your computer in the stuffy old office.

There are many options, and you can get in touch with us to discuss some of them and break the leash of the office and get out and enjoy the sun while being productive.

Do you wanna cry? Call Sandra Network!

There is a new form of Ransomware out there, once again, Called WannaCry.


WannaCry Man

It encrypts the files on your machine, THEN demands an average of $300 in bitcoin. If payment is not received within three days, the demand doubles. Should, no action be taken after seven days, the affected files will be deleted.

What if I do not want to run my Windows updates, because some software will no longer run properly?

What can you do to prevent the WannaCry ransomware? There are steps that may be taken, should you not want to update Windows presently. The entry of the virus to your device, which is dependent on a gap in the Windows system and the gap is present in all types of Windows is that the feature is open. If you did not update your windows, turn off SMP . following are the steps.

  • Control Panel\Programs\Programs and Features.
    • Select the Turn Windows features on or off option on the left
      Control Panel WannaCry




  • Remove check box SMB1.0/CIF File Sharing Support
    • File Sharing Support WannaCry






  • You must restart your computer to complete this change.
    • Once this is completed,  you are safe from this specific ransomware.

Keeping updates in order is usually the best option to prevent the introduction of WannaCry ransomware, but it is always good to STILL follow these guidelines:

  • If you receive a message from your friend with a link, ask him before opening the link to confirm, (infected machines send random messages with links).
  • Keep your files backed up regularly and periodically.
  • Be aware of fraudulent e-mail messages that use names similar to popular services such as ‘PayePal’ instead of ‘PayPal’ or use popular service names without commas or excessive characters.
  • Use anti virus and Always make have the last update.

If you still run into any issues, or it is too late, please contact our Support at Sandra Network

Verizon email Moving to AOL – Be Prepared!

Outlook Email SetupSo, you have probably heard through that pesky grapevine… Verizon is no longer going to be supporting or hosting email, the company will be having it hosted by AOL within the next couple of weeks. When logging into the there will be an “Email service notice“. Click on “Keep email address” or “Use any other email provider” to complete the setup. There will be no action to take until you receive an email service notice from them. Through all of the shuffling, it may  have been missed, AOL is a Verizon company. Verizon is looking to put their focus on their FIOS and phone markets.

Does this mean my Email is going away?

No, once you have received this notice.. you will probably say… AOL? WHAT??!! Do I need to find one of those diskettes they sent me through the mail in 1990… so what do I do next?
There are a few options, hold on..

  • Follow the directions and forward your email to AOL and continue from there. In this scenario, you will keep your email, while navigating the AOL Mail website.
  • Do nothing and let that email account fade to digital dust
  • Set up an Office 365 account and have all of your emails forward through one account, making it MUCH easier for you! (We can actually do this for you at Sandra Network!)

Not sure WHAT to do? 

There are still a lot of options; these are but a few. If you are still unsure what your next steps should be you should give us a call at 978-535-0202 or email us at [email protected] and we will walk you through or set you up with the correct options just for you!

Avoiding a Virus in the New Year

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

There are times when even the smartest and most careful people fall into a trap and are duped into pushing that “save” or “open” button, creating a Virus on their machine. The message looks plausible, but before you push the button check a few things out…

  1. What is the URL? Does it show the page displayed is being sent from Firefox/Mozilla?
  2. An executable file has the extension .exe. In this example, notice this is .js. This is a (java)script the site is attempting to run on your computer and it may collect personal information, or be a virus ready to spread into your system.


If any of this seems suspicious or you think it’s a scam, the best thing to do for assurance is to actually navigate to the Firefox download site.
If this installer is downloaded it will be called: Firefox Setup Stub (version #).
If you have this version installed, you will be alerted to that.

What is your best course of action if this page comes up?
Close the browser, reopen it and delete all temporary internet files. This will prevent your downloading a virus.

With that,  we at Sandra Network hope everyone finds a healthy and successful New Year in 2017!


It’s A Trap, A Scam!

Recently, a great many people have asked what to do if they receive calls where someone asks to connect to their computer to resolve some issue. the quick answer is: It is a Scam!

  • Did you already sign a contract with this company?
  • How do they know you signed onto your computer?
  • Have you recently seen any suspicious activity on your computer?

If these questions create a long list of additional questions, please DO NOT allow them access to your computer, it is a scam. Please contact us first!

This is how it tends to happen:

You are sitting around, your computer is on, but not being used and the phone rings.

“Hello this is Peggy from Microsoft, I noticed that your computer has been sending error messages. There are problems with the internet connection or phone line and this has affected your computer’s recent performance. On top of that, the broadband connection has been hacked. May I have remote access to the computer to find out what the problem is?”

Your first thoughts should be… I don’t know anyone named Peggy. WHY are they monitoring my system, I didn’t hire them and if I didn’t, who did?

These are all valid and you are correct in being suspicious of this call. This is not a technical support service,  already hired (such as Sandra Network) then the scamming call should be ended immediately.

What is the best way to protect yourself?

  • Never give an unsolicited caller remote access to your computer. This is ALWAYS a scam!
  • Never give your personal, credit card or online account details over the phone unless you made the call and the phone number came from a trusted source; otherwise, this is a scam!
  • Receiving a phone call out of the blue about your computer and remote access is requested – hang up – even if they mention a well-known company such as Microsoft.

If you have questions or think you may have been hacked, or have given out pertinent and private information:

  • Please call your financial institutions and have your accounts monitored or closed.
  • Change your passwords for your email, login.
  • Call us at Sandra Network and with your permission, clean out the machine of any suspicious activity.