Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Top 5 Reasons to Invest in CyberSecurity

December 15, 2015 by The T By D Team Leave a Comment

Top 5Top 5 Reasons to Invest in CyberSecurity

 You can no longer stick your head in the sand in the hope that CyberCriminals will go away.  

CyberCrime is now more profitable than the drug trade.  As reported by the 2013 Europol Serious & Organized Threat Assessment,

the “Total Global Impact of CyberCrime [has risen to] US $3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.” 

Large companies are no longer the only target of CyberCriminals.  Data breaches happen on a daily basis, and small and medium-sized businesses, and even home computers, are now all potential victims.  The frequency of CyberAttacks is increasing fast and furious, and CyberCriminals are more and more sophisticated, and their attacks are increasingly difficult to detect and counteract.

If you think you haven’t been attacked yet, you can either count yourself lucky, or you just weren’t aware of the attack & you narrowly avoided it.Invest in CyberSecurity

Top 5 Reasons to Invest in CyberSecurity:

1.  Frequency of Attacks

Symantec CyberCrime Costs2Industry leaders like Symantec, McAfee, FireEye, and Verizon all report increases in CyberAttack frequency over the last 2 years.  CyberCriminals are more sophisticated, and probe for vulnerabilities more often, with more sophisticated attack vectors, using such exploits as malvertising on major news outlets, poisoned ads, or infected webpages.  Symantec reports that ransomware attacks soared 113% in 2014.  Attacks are moving faster, I.T. defenses are not.

2.  Cost of Attacks

The cost being CyberAttacked not includes theCost of CyberAttack immediate payout, but also includes downtime, loss of data, PR damage, loss of business/revenue, damage to equipment, as well as legal fees and implications.  Statista reports that in August 2015, the average U.S. company lost $15.42 million.  Symantec Corp. reports, 60% of small businesses go bankrupt within 6 months of a cyber attack.  

3.  CyberCriminals Focus on Small- to Medium-Sized Businesses as Attack Targets

Small Business Cyber AttacksSmall- to -medium-sized businesses that have been hacked may feel like it was a ‘fluke’.  The reality is that CyberAttackers use both automated software that probes websites for vulnerabilities and flaws that are easily breached, and thoroughly tested, massive phishing campaigns to spread botnets, Trojans and ransomware.  Symantec reports that 60% of all targeted CyberAttacks in 2014 struck small- and medium-sized organizations.

 

4.  The Number of CyberCriminals Are Increasing

As the cost of launching a CyberAttack decreases, the number of attacks increases.  And as CyberWarfareCyberCriminals Increasing continues, countries are investing billions of dollars in their CyberWar attack capabilites.  CyberCriminals go after whole sectors of the economy – that means degrading organizations, running stock markets, financials, insurance, manufacturing and more.

CyberCrime-As-A Service is taking off.  It is easier than ever for CyberCriminal noobs to obtain the sophisticated tools available from an ever-expanding Cyber-Underground economy.  Existing CyberMafias are moving into this area at CyberSpeed, and the criminal competition is furious.

5.  CyberCriminals are After Low-Hanging Fruit:  Cyber-Uneducated Employees

Human FirewallAmazingly enough, CyberCriminals are business people too.  Their time is worth billions.  So why would they spend 3 weeks to uncover a vulnerability in a popular piece of software, when you can social engineer a cyber-uneducated employee in 10 seconds?  

According to an SVB survey about CyberSecurity completed by 216 C-level executives from US-based technology and life science companies in 2013:

“Just 35% [of businesses] are completely or very confident in the security of their company information.”

Educate your employees as your 1st line of defense against CyberCriminals.

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Resources:

http://www.tripwire.com/state-of-security/regulatory-compliance/pci/cybercrime-is-now-more-profitable-than-the-drug-trade/
http://www.symantec.com/security_response/publications/threatreport.jsp
https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report-volume-20-2015-social_v2.pdf
http://www.statista.com/statistics/293274/average-cyber-crime-costs-to-companies-in-selected-countries/
http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf

Filed Under: ALERTS, Featured

ALERT: Apple ID Suspension

December 10, 2015 by The T By D Team Leave a Comment

Apple

 ALERT:  Apple ID Suspension

With massive amounts of Apple devices being sold during the holiday season, CyberCriminals are looking to cash in.  People and businesses are left having to pay the price.

An email claiming to be from Apple Support, is being received that states your Apple ID and iCloud accounts are going to be suspended.  An example is below.

Apple ID Suspension Email

The email claims Apple sent you an earlier email regarding your verification, but it was not returned on time.  The email is nice enough to include a “Verify Now” link that, they claim, allows you to complete the verification process and save your account from suspension.  If you click on the link, you are directed to a fake Apple login page which asks for your credentials, including password.  Once you submit your credentials, you are then directed to a 2nd fake page which asks for personal and financial information, including credit card & banking details.

The fake “Apple” pages are well-designed to look like a legitimate Apple page, and includes information explaining in detail why you need to complete the verification process.  It all looks very official.

This scam even has retaliation against CyberScam investigators testing the phishing emails.  If you enter false data that includes words such as “scam” into fields on the fake form, your browser will automatically redirect you to a preconfigured Google search for pornography.

The best way to check if a link is legitimate, is not to click on the link in the suspicious email, but hover your mouse (don’t click!) over the link to get the link address (shown below).  Then open a new browser window and manually type in the link address.

Apple ID Link

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: iDNS Canada Domain Scam

December 2, 2015 by The T By D Team Leave a Comment

ALERT:

iDNS Canada Domain Scam

For those of you that manage your own domain name, you may see a letter similar to the one below come in the mail.  It usually shows up a few months prior to the expiration/renewal of your domain name.  TbyD - iDNS Canada Scam

It is a SCAM.  
This company is counting on people taking a quick look, and not taking time to read the fine print…

At first glance, it looks like you have to shell out some money in order to renew your domain name, and that your domain name is owned/managed by iDNS Canada.  

Although you do need to pay annually for the renewal of your domain name (unless you paid for several years at a time), the fee is paid to whomever you initially purchased/registered your domain name.

Take a look at the highlighted areas of the form:

TbyD - Highlited iDNS Canada Scam

First, they’re hoping you read the first highlighted area and automatically fill out the form out of fear of “a loss of your online identity making it difficult for your customers and friends to locate you on the Web”.

What this form is, is actually a request giving them authorization to transfer ownership of your domain name to iDNS Canada.  Once you fill out this form, you are not only paying an inflated renewal rate, you are giving them ownership of your domain name.  

They are nice enough to offer you ownership of similar available domains, (eg. www.yourcompany.org), which is a good idea.  However, you can do this through the company you initially registered (and will notify you when your domain really comes up for renewal).

Remember:  Read the fine print!  When in doubt, ask your I.T. provider.  

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: Top 5 Holiday Scams

November 19, 2015 by The T By D Team Leave a Comment

5 Common Holiday ScamsALERT:  The Top 5 Holiday Scams You Need to Know About!

Like it or not, whether you’re Scrooge or Mr. Claus, the holiday season is upon us. 
And with it…CyberCriminals.

Yes, they are waiting in the shadows, for you to drop your guard…and your money.

Digital identity company ThreatMatrix, reports that it has detected a 25% jump in cyber attacks already this season.

In an effort to thwart CyberCriminals’ attempts to separate us from our money, here are the top 5 Holiday Scams You NEED to Know About!

Online Holiday Scams1.  Black Friday/Cyber Monday

That heavily anticipated and/or dreaded time of year when you can buy almost anything, for next to nothing!  However, online scams use a variety of lures to get unsuspecting buyers to click on links or open attachments.  CyberCriminals build complete copies of well-known sites, send emails promoting great deals, sell products, and take credit card information…but never deliver the goods.  If it looks too good to be true…it probably is.  Sites that have deals even more incredible than normal should be a red flag.  Never click on links in emails, or popups with very deep discount offers (especially for watches, phones, or tablets).  Go to the website yourself through your web browser, and check if the offer is legit.  

2.  Complimentary Vouchers or Gift Cards

A popular holiday scam every year, is big discounts on gift cards.  Don’t fall for offers from Free Voucher Scamretailers or social media posts that offer phony vouchers or gift cards (eg. Starbucks) paired with special promotions or contests.  Some posts or emails may even appear to be shared by a friend (who may have been hacked).  Develop a healthy dose of skepticism this holiday…at least in relation to online scams.

3.  Bogus Shipping Notices from Canada Post, UPS, and FedEx

With the massive online shopping, comes massive FedEx Scamshipping, and shipping scams.  You will likely see emails supposedly from Canada Post, UPS or FedEx in your inbox that claim there’s a problem with your package and/or it could not be delivered.  Many of these are phishing attacks that try to make you click on a link or open an attachment.  If you click, your computer will be infected with a virus, or even ransomware which holds all your files hostage until you pay $500 in ransom.

4.  Holiday Refund Scams

Online shopping has increased in the past years, and don’tMouse Trap Money think that hasn’t escaped the notice of CyberCriminals.  Emails reportedly from retail chains or e-commerce companies such as Amazon or eBay have been received, claiming there’s a “wrong transaction” and prompt you to click the refund link.  However, when you do that and are asked to fill out a form, the personal information you give out will be sold to CyberCriminals who use it against you.  

5.  Phishing the Dark Side

A new phishing email has already begun circulating Star Wars Scamthat tricks people into thinking they could win movie tickets to the highly-anticipated movie, “Star Wars: The Force Awakens,” due out December 18.  However, the email is a phishing attack.  Leading up to the film’s release, and shortly after, you need to stay alert for this social engineering attack.  

Credit Card ScamBonus Tips:
  1. Never, Ever pay online with debit cards.  Only use credit cards when shopping online.  Why?  If the debit card gets compromised, the CyberCriminals can empty your bank account very quickly.
  2. Never use an insecure public Wi-Fi to shop with your credit card.  Only do your online shopping with a secure connection at home.

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: New Ransomware Infection “LowLevel04”, Coming Soon to a Computer Near You!

October 28, 2015 by The T By D Team Leave a Comment

Computer for Ransom
ALERT:
New Ransomware Infection “LowLevel04”, Coming Soon to a Computer Near You!

 

The new ransomware called “LowLevel04”, infects your computer, and encrypts your files making them useless to you…unless you pay their ransom demand for a decryption code.  

(Hint:  Backup your important files.  Check out our Managed Backups – they could save your company!)

What’s different about this new version?  For one, the ransom demanded is double the ‘normal’ $500, and demands 4 Bitcoin.  Many victims have also reported that the machines affected were servers, which could cause pandemonium within (or bankrupt) a company.  

Larry Abrams (from techie blog Bleeping Computer”) was the first to report on the new strain.  He stated:

“It appears that once the attacker gains access to a target computer, they download and install a package that generates the encryption keys, encrypts the data files, and then uploads various files back up to the hacker’s temp folder via a terminal services client drive mapping file”.

LowLevel04 scans all mapped drives, including removable and network drives, for data files to encrypt.  When it encounters a file that contains certain file extensions it will encrypt them.  When it’s finished wreaking havoc, the malware cleans up after itself and deletes a number of files used in the encryption process, as well as removing application, security, and system logs.

In each encrypted folder, a ransom note is found.  The note has instructions for the victim to follow, if they want to decrypt their files.  

LowLevel04 Ransom Note

NOTE:  

Abrams does mention that LowLevel04 does not delete Shadow Volume Copies (yet), so you could use that to get original, unencrypted versions of files back.

 

How To Avoid Becoming A Victim

Ransomware CyberCriminals have used RDP (Remote Desktop Protocol) exploits to gain access in the past, because so many businesses use remote desktop on a daily basis.  So here’s how to avoid becoming yet another victim of ransomware:

  1. If You Don’t Need It, Disable It:  It’s a good rule of thumb for everything.  Leaving anything enabled, when you don’t use it, is just leaving another potential back door open for CyberCriminals to gain access to your computer/network.  If you don’t use RDP, disable it.  It’s a huge CyberSecurity hazard.
  2. Keep Patches Up-To-Date:  Again, good rule-of-thumb for any electronics that are connected to the Internet (even just for short periods of time).  Keeping Windows patched will help ward off potential RDP exploits.
  3. Use What You’re Comfortable With:  If you’re not comfortable with something, you’re not going to use it.  This goes for RDP as well.  If you’re uncomfortable with the out-of-the-box functionality provided by Windows remote desktop software, change to another software you are comfortable with.  Talk to your I.T. provider about options.
  4. Use Additional Safety Measures:  Sure, your network security may be good.  But remote desktop is such a huge CyberSecurity hazard that you should have additional security measures in place for each user/computer.  Especially with all the recent hacking, a 2-factor authentication for all remote logins is a absolute MUST.  
  5. Security Awareness Training:  Many of the ransomware attacks still arrive via email.  Anyone that has access to anything that contains, or has access to information and the Internet is a CyberSecurity risk and should be put through Security Awareness Training.  This includes everything from computers to mobile devices and receptionist to accountant to CEO.    
  6. Backup, Backup, Backup:  The surest solution for that applies to everyone, from the home user to the biggest corporation – BACKUPS.  No defense plan is foolproof – so backup anything you don’t want to chance losing.  Did I mention backups?
Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

Definition: Shadow Volume Copies

October 28, 2015 by The T By D Team 1 Comment

Definition:  Shadow Volume Copies

A Microsoft Windows Server feature that takes snapshots of volumes that can be used for restoring logical unit number and individual files or for data mining.  The snapshots can be taken manually or automatically.  

Filed Under: Definitions

Definition: Backup

October 28, 2015 by The T By D Team 1 Comment

Definition:  Backup

If you value anything on your computer or computer network (files, data, photos, customer information, accounting data, etc),

…this is THE MOST IMPORTANT TERM YOU SHOULD KNOW.

I know, I know.  I yelled.  I’m sorry.

However, I cannot stress enough how important backups are.  Whether you simply have 1 computer at home, or several computers on your network at work.  I’m guessing there is at least 5 things you can think of right now on your computer (or network) that you would be devastated to lose.

A backup is a copy of one or more files created as an alternate in case the original data is lost or becomes unusable (in the case of ransomware, malware, virus, etc.)

Hard drives are made to run for years without crashing & burning.  However, just like all electronics, they have their issues.  Hard drives rely on moving parts to access data.  Moving parts can malfunction, and cause your data to become unrecoverable.

If you need proof of how fragile hard drives really are, take a look below.

Three opened Hard drives isolated on white background

Open Hard Drive

If a picture isn’t enough to convince you, call us at 1-204-800-3166, or go to your local computer store, and ask someone to show you an open hard drive.

When you realize that all of your data is stored in such a small, delicate devices, you may have a new appreciation for backing up your important data.

Hardware malfunctions aren’t the only plague to hard drives.  Software corruption (damaged structures, viruses, improper program installation) can cause file damage, files to disappear into thin air, or simply render them useless.

Human error, the most common plague to hard drives, can cause irreplaceable files to be deleted.

That is why backing up your data is so important.

Unfortunately, most people don’t realize the importance of backups…until it’s too late.

When you have lost years of photos, school papers, business documents, email archives, music, movies, or any other data that suddenly becomes unrecoverable, the importance of backups becomes all too real.

Not sure if your information is safe?  Ask us for a FREE Backup Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Definitions

Definition: Mail Server

October 28, 2015 by The T By D Team Leave a Comment

Definition:  Mail Server

A computer in a network that provides email facilities.  It stores incoming email for distribution to users (message store), and forwards outgoing email through the appropriate channel (message transfer agent).  

The term may refer to just the software used to perform this function, which can reside in a machine with other applications, or to a stand-alone computer (server) dedicated only to the email function.

Filed Under: Definitions

Definition: Server

October 28, 2015 by The T By D Team 2 Comments

Definition:  Server

A computer that provides data to other computers.  It may serve data over a local area network (LAN) or a wide area network (WAN) over the Internet.  

There are different types of servers, including Web servers, mail servers, and file servers.  Each server runs software specific to the purpose of the server.

The hardware used for a server is not as important, as long as the hardware is sufficient to support the demands of the server.  Any desktop computer could be turned into a server by adding the appropriate software.  However, most large businesses use rack-mountable hardware designed specifically for a server.    Multiple rack-mountable servers can be placed in a single rack, and often share monitors and input devices.  Most servers are accessed remotely using remote access software, making input devices unnecessary.  

Filed Under: Definitions

Definition: File Server

October 28, 2015 by The T By D Team Leave a Comment

Definition:  File Server

A server that acts as a central file storage location, which can be accessed by multiple systems.  Commonly found in company settings, such as company networks, but also used for organizations such as schools, and even home networks.

A file server may be a dedicated storage system, such as a network attached storage (NAS) device, or a computer that hosts shared files.  Dedicated file servers are typically used for business applications, as they provide faster data access and offer more storage capacity than non-dedicated systems.

Filed Under: Definitions

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in