Need Support Right Now?

Why Your Business Needs a Password Vault 


Introduction to IT Security

To understand and peel back the layers of the IT security onion, we must start with education. The more you know, the more you can protect your network and business. 

Understanding the Password Vault

Let’s look inside the “Password Vault.” Like the vault we envision in a bank, the password vault protects the goods. The difference is that you can’t physically walk into a password vault on foot, but you can digitally access it. While there aren’t loads of cash and gold bars like in the movies, the data stored in a password vault is worth a lot. 

The Cost of a Data Breach

A data breach can cost your business a pretty penny. The U.S. has the highest data breach cost for the 12th year. It’s not something to brag about, especially with numbers like 5.09 million more than the global average, according to the report, “Cost of a data breach 2022:A million-dollar race to detect and respond,” commissioned by IBM. That is terrifying.

Why Use a Password Vault

Do we have your attention? The software program of your choice that creates your password vault will store and protect all the passwords your employees use while encrypting the data. There is one single master password to then access multiple passwords, which means no one else knows that password, not even the company hosting you. 

The Danger of Weak Passwords

We’ve all been taught not to use the same passwords across various websites or create something too simple like 12345, but people continue to do so. The reasoning may be the ease of remembering one password across multiple platforms, but that’s what’s helpful about password vaults. Weak passwords, or those not well thought out, allow hackers to enter your system. 

The Benefits of Using a Password Vault

Password vaults, (which some call password managers), are the best method of protecting your passwords. There is no method that is 100% foolproof. That’s different from what you want to hear, but using a password vault paired with added security steps significantly decreases your risk of a data breach. 

Look out for our next article, naming some added security steps, coming your way soon. 

Have questions about protecting your IT services? Learn more at SandraNetwork.com or Contact Us.

What Are The Benefits of Anti-Virus Software?

One of the most important things is to stay ahead of the attacks with updates and real time protection. Without this, there is very little that may be done once the malware assaults, other than rebuilding the machine or hiring an IT company to clean the virus from the machine and THEN install an anti-virus application.

Yet another form of Ransom-ware!

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.9.0″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″ sticky_enabled=”0″]

Your screen just went to this:
What do you do?

It could be a Ransomware – Just look at that color!!!

Ohh NOOOOO!!!!
Do you call the phone number?
Do you click on the page and find as many links as you can?

NO! STOP! SLOW DOWN! IT’S REALLY A DOOR TO RANSOMWARE

This is the doorway for ransomware that will only bring you sadness and destruction.
There are a couple of tell-tale signs that will only bring you sadness and destruction. There are a couple of tell-tale signs:

The URL. In most cases, it is something that should throw red flags. In THIS case, it is virus.com…
Windows Security Essentials does not send a phone number to their help desk and that hints towards a potential ransomware attack. Many times, ransomware attacks can also come through email viruses too.
You may not even have Windows Defender turned on, but it will never blank out your screen with an error, it might send a “notification”.

What should you do?

  1. You will want to start the Task Manager. There are two ways to get to it:
    <Ctrl><Alt><Del> at the same time
  2. Right click on your taskbar
  3. Select the browser you are in (Chrome, IE, Firefox)
  4. Select “End Task”. (this will close out the application
  5. Download an Anti-Malware app for example:
  6. Call Sandra Network: 978-535-0202 #3 or email: [email protected]

Sandra Definition

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Do you wanna cry? Call Sandra Network!

There is a new form of Ransomware out there, once again, Called WannaCry.

WannaCry

WannaCry Man

It encrypts the files on your machine, THEN demands an average of $300 in bitcoin. If payment is not received within three days, the demand doubles. Should, no action be taken after seven days, the affected files will be deleted.

What if I do not want to run my Windows updates, because some software will no longer run properly?

What can you do to prevent the WannaCry ransomware? There are steps that may be taken, should you not want to update Windows presently. The entry of the virus to your device, which is dependent on a gap in the Windows system and the gap is present in all types of Windows is that the feature is open. If you did not update your windows, turn off SMP . following are the steps.

  • Control Panel\Programs\Programs and Features.
    • Select the Turn Windows features on or off option on the left
      Control Panel WannaCry

 

 

 

  • Remove check box SMB1.0/CIF File Sharing Support
    • File Sharing Support WannaCry

 

 

 

 

 

  • You must restart your computer to complete this change.
    • Once this is completed,  you are safe from this specific ransomware.

Keeping updates in order is usually the best option to prevent the introduction of WannaCry ransomware, but it is always good to STILL follow these guidelines:

  • If you receive a message from your friend with a link, ask him before opening the link to confirm, (infected machines send random messages with links).
  • Keep your files backed up regularly and periodically.
  • Be aware of fraudulent e-mail messages that use names similar to popular services such as ‘PayePal’ instead of ‘PayPal’ or use popular service names without commas or excessive characters.
  • Use anti virus and Always make have the last update.

If you still run into any issues, or it is too late, please contact our Support at Sandra Network

Avoiding a Virus in the New Year

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

There are times when even the smartest and most careful people fall into a trap and are duped into pushing that “save” or “open” button, creating a Virus on their machine. The message looks plausible, but before you push the button check a few things out…

  1. What is the URL? Does it show the page displayed is being sent from Firefox/Mozilla?
  2. An executable file has the extension .exe. In this example, notice this is .js. This is a (java)script the site is attempting to run on your computer and it may collect personal information, or be a virus ready to spread into your system.

 

If any of this seems suspicious or you think it’s a scam, the best thing to do for assurance is to actually navigate to the Firefox download site. https://www.mozilla.org/en-US/firefox/new/?v=1
If this installer is downloaded it will be called: Firefox Setup Stub (version #).
If you have this version installed, you will be alerted to that.

What is your best course of action if this page comes up?
Close the browser, reopen it and delete all temporary internet files. This will prevent your downloading a virus.

With that,  we at Sandra Network hope everyone finds a healthy and successful New Year in 2017!

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

It’s A Trap, A Scam!

Recently, a great many people have asked what to do if they receive calls where someone asks to connect to their computer to resolve some issue. the quick answer is: It is a Scam!

  • Did you already sign a contract with this company?
  • How do they know you signed onto your computer?
  • Have you recently seen any suspicious activity on your computer?

If these questions create a long list of additional questions, please DO NOT allow them access to your computer, it is a scam. Please contact us first!

This is how it tends to happen:

You are sitting around, your computer is on, but not being used and the phone rings.

“Hello this is Peggy from Microsoft, I noticed that your computer has been sending error messages. There are problems with the internet connection or phone line and this has affected your computer’s recent performance. On top of that, the broadband connection has been hacked. May I have remote access to the computer to find out what the problem is?”

Your first thoughts should be… I don’t know anyone named Peggy. WHY are they monitoring my system, I didn’t hire them and if I didn’t, who did?

These are all valid and you are correct in being suspicious of this call. This is not a technical support service,  already hired (such as Sandra Network) then the scamming call should be ended immediately.

What is the best way to protect yourself?

  • Never give an unsolicited caller remote access to your computer. This is ALWAYS a scam!
  • Never give your personal, credit card or online account details over the phone unless you made the call and the phone number came from a trusted source; otherwise, this is a scam!
  • Receiving a phone call out of the blue about your computer and remote access is requested – hang up – even if they mention a well-known company such as Microsoft.

If you have questions or think you may have been hacked, or have given out pertinent and private information:

  • Please call your financial institutions and have your accounts monitored or closed.
  • Change your passwords for your email, login.
  • Call us at Sandra Network and with your permission, clean out the machine of any suspicious activity.

I won’t click on random or suspicious links

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Fake | Spoofing | Virus-filled | Identity-stealing | Hacking | Phishing Emails. So how do you know?Online Thief

Fake emails and websites will try to look like a real company’s email: all for the purpose of stealing your personal information. Passwords and account numbers are the favorite to grab, but sometimes to simply track your browsing habits and send information to the criminal’s web site. Hence it is important to check shortened links that come in emails to ensure more safety.

EBay, PayPal, Amazon are some of the favorites to spoof, because they are such common web sites. If you are getting emails from a web site like those mentioned, and you are not sure, then close the email. Open a browser, and login to the web site directly. Any email that came to you should be mentioned somewhere in the notifications area. The good news is a lot of the emails come from out of country, and the wording of the emails are sometimes a giveaway. Check for proper use of grammar and spelling. Really look at the logo in the email – is it pixelated? Or, does it look as clean as the ones on the web site.

Online Thief

How to tell if the link in the email is safe without clicking on it

Use a link scanner

Link scanners are web sites and plug-ins that allow you to enter in the URL of suspicious link and check it for safety. URLVoid is a really good one, because it uses multiple services to research.

In order to copy the link safely, without clicking on it, you can right click on the link and choose copy shortcut (IE), Copy Link (Firefox) or Copy Link Address (Chrome). You can paste this into the Link Scanner utility.

Check Shortened Links

URLVoid can’t handle shortened URLS from services like tinyURL or Bitly, Ow.ly. To check shortened links that you usually find on services like Twitter, you can use Sucuri. It will expand the shortened links and check it against a variety of services to ensure no threats are pending. In order to copy the link safely, without clicking on it, you can right click on the link and choose copy shortcut (IE), Copy Link (Firefox) or Copy Link Address (Chrome). You can paste this into the Link Scanner utility.

Hover over the link

If you hover over a link without clicking on it, you will see the full URL pop up with the links destination in the lower corner of your browser.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]