Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

ALERT: Illegal Game of Thrones Download

August 9, 2016 by The T By D Team Leave a Comment

Game of Thrones

ALERT:  Illegal Game of Thrones Download

 

Illegal downloading of tv shows and movies from a variety of websites is the bane of the entertainment industry.  Yet it’s done all the time.  Currently, the HBO series, “Game of Thrones” is the #1 download.  
And CyberCriminals are ready to cash in…

Emails are being received that look like a legal violation notice from IP-Echelon, which is the company that enforces copyright claims for companies such as HBO.  The email states that the person receiving the notice has illegally downloaded “Game of Thrones”, or other copyright-protected entertainment and that unless they pay a settlement within 72 hours, the matter will be turned over to their attorneys.

When you click on the link provided, you are directed to a website where you can pay your “settlement”.

The people on the other side of the website, are CyberCriminals, not a copyright-protection agency.

In general, it’s a bad idea to illegally download shows and movies for two reasons:

  1.  You are violating copyrights, which can turn out to be very expensive when you get sued.
  2. The websites promising these downloads are often compromised and infect your computer with all kinds of malware.

If you’ve received a notice and want to verify if this is for real or not, contact the real IP-Echelon directly which you can do here: https://www.ip-echelon.com/contact-us/

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

ALERT: Don’t Get Poke-Punked

July 21, 2016 by The T By D Team Leave a Comment

Pokemon Go with Credit

Don’t Get Poké-Punked!

 

With the Pokémon Go hitting the streets…you know CyberCriminals are not going to be far behind!

 

The game’s rapid rollout and unparallelled success has it’s risks.  Pokemon Go has immediately hit several security and privacy-related speed bumps, and not all of them are virtual…

Muggings

In this game, players can meet in real life using the Pokéstop feature to do virtual battle.  Police in several cities have already accumulated some scary stories – some people are using the popular game to lure other players to remote locations with the intention of robbing them (or worse!).

Google Login Permissions Problems

Many security researchers have been warning that the initial release of the Pokémon Go app has access to many more device permissions than needed, meaning a possible privacy risk.  Some information security experts have even been urging players to create “burner” Apple or Google accounts that are only used with this game.  

Trojanized Apps

Just 72 hours after the initial release of the Pokemon Go app, CyberCriminals had Trojanized a legitimate version of the free app to include malware, which was released via unofficial, third-party app stores.

Researchers at the security firm “Proofpoint” stated in a blog post that the malicious Android app file “was modified to include the malicious remote access tool called DroidJack – also known as SandroRAT, which would virtually give an attacker full control over a victim’s phone.”  Gaming websites have begun publishing instructions on how people can download the app, including using side-loading – evading Google’s official app store – to install them. 

Proofpoint went on to state, “In the case of the compromised Pokémon Go APK we analyzed, the potential exists for attackers to completely compromise a mobile device.  If that device is brought into a corporate network, networked resources are also at risk.”  

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

Budgeting for Technology Costs

July 21, 2016 by The T By D Team Leave a Comment

brand new computer with tft monitor in modern classroom at school

Budgeting for Technology Costs

Budgeting for technology costs is difficult.  We often run into clients that don’t budget for these costs at all.  They are then often caught with tough (and costly!) surprises when a workstation or server goes down.  

 

For smaller companies, this may work as the cost is lower (due to the lower volume), but for companies with a server and 5 or more workstations, a budget is a MUST.

Let’s say the average lifetime of a workstation and/or server is 3-5 years.  If a company has 10 workstations and 1 server, the total replacement cost would breakdown as follows:

(please realize I’m using these numbers for ease of example.  Actual costs may vary)

Workstation:  $1,000 + $200 cost of transferring to a new PC = $1,200 x 10 = $12,000

Server:  $5,000 + $1,000 cost of transferring to a new server = $6,000 x 1 = $6,000

Switches/Printers/Misc. Hardware = $2,000

So we have a total replacement cost for the company of $20,000

3-Year Replacement Plan

If you want to go with the 3-year replacement plan, you are looking at a total of $6,666.66/year.  You could spread out the costs by simply replacing workstations, and some networking equipment over the first 2 years.  You then replace the server in the 3rd year.  You then start the replacement plan (by replacing the workstations again) in year 4

5-Year Replacement Plan

By choosing the 5-year plan, you can plan on replacing the workstations and networking equipment spread over years 1-4.  In year 5, you then replace the server.  With this plan you can budget to spend approximately $3,500 in 4 of the years, and $6,000 in the 5th year.

By spacing out your technology purchases, you are potentially decreasing your downtime, and also working it into an affordable cost-space, making it easier on your company’s cash-flow.
Want help with your technology budget?  Call Technology by Design at 1-204-800-3166.
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Blogs, FAQ

ALERT: Ransomware Update

July 20, 2016 by The T By D Team Leave a Comment

Ransomware

ALERT:  Ransomware Update

 

Ransomware is the fastest growing, most lucrative form of malware out there right now, and CyberCriminals are cashing in.

 

 

Here is a list of some of the latest versions out there.  This list is ever-changing, and should not be taken as a complete list.  If you have any questions, please call us at 1-204-800-3166, and we can go over some of the solutions available to help to prevent infection.

Zepto

A form of the popular “Locky” virus, this encrypts your files to “.zipto”.  Usually spread through email containing a zip file.  When clicked, a javascript file will begin unpacking itself, and start encrypting your files.  Because this version is so new, some antivirus software may not detect it yet.  There is currently no way to decrypt the files.

CryptXXX

This has been around for a while, but has recently made a comeback in June collecting approximately $50,000 in ransoms for the month.  CryptXXX is spread through spam email.  There is currently no way to decrypt CryptXXX.

Bart Ransomware

Usually spread through an email with a “photos” zip attachment.  When the attachment is opened, it triggers a javascript filr called “Rocketloader” that zips up your files in a password-protected zip file.  Bart is a little different, in that it doesn’t have to communicate with the “mothership” computer to encrypt your files.  So it will continue to do so, even when disconnected from the network.  Currently there is no way to decrypt Bart-encrypted files.

Cerber Ransomware

This has been attakcing Office 365 users, and usually comes in the form of an emailed Office document.  Currently there is no way to decrypt Cerber-encrypted files.  

With no way to decrypt the files, and no choice but to pay the ransom, companies are seeking ways to avoid getting infected in the first place.  

Make sure your employees are familiar with how to identify a suspect email.  Check out our “Red Flag Emails” for tips! 
For increased protection, call Technology by Design at 1-204-800-3166 and ask us about our Spam Filter Solution!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

Windows 10 Free Upgrade Ends Soon!

July 20, 2016 by The T By D Team Leave a Comment

Windows 10

Windows 10 Free Upgrade Ends Soon!

 

 

The free offer to upgrade to Windows 10 expires on July 29th, and here are some things you should know:
  • The offer is not likely to be extended.
  • Any upgrades performed before the deadline are valid for as long as the device lasts.
  • There is a slim possibility of some new upgrade offers after the 29th, but don’t hold your breath.
  • Windows 10 will eventually become software as a service.  Price is unknown at this time, but for Enterprise customers it looks like the cost will be just under $100 USD annually.
  • Retail Windows 7 PCs and laptops will no longer officially be available after October 31st.  You may however, still be able to get old stock.

If you are planning on upgrading, the Window is closing (no pun intended).  

Extended support for Windows 7 ends in January 2020, so your PC will still receive security updates until that time if you choose to stick with Windows 7.

Need assistance upgrading your computer network?  
Call Technology by Design at 1-204-800-3166
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs

Should I or Shouldn’t I?: Replacing Old Servers

July 7, 2016 by The T By D Team Leave a Comment

network server room routers and cables

network server room routers and cables

Why Replace An Old Server?

This is one question we get a LOT.  If an old server is doing the job, clients often wonder why they should bother replacing it.

The 3-Year Rule
Servers generally don’t last longer than 3 years.  This is due to many factors within the server.

Operating System (OS):  The older the OS, the less likely it is still going to be ‘protected’ (receive security updates from the manufacturer).  Still running Server 2003?  It’s already expired.  OSs expire or get old, and are more vulnerable to exploitation by CyberCriminals, and are more at risk for loss of data and/or information, identity theft, etc.

Hard Drive:  Hard drives will fail, on average, after 3 years.  Sometimes sooner, sometimes a little later, but it will happen.  AND, when it does, your company will shut down completely until the server is rebuilt and restored from a backup (that assuming you have a good backup…).

Power Supply and Fan:  Power supplies fail, fans fail (which could lead to motherboard failure).

Replacement Parts:  After 3 years, manufacturers are busy pushing the newer models, so parts become harder to find, and the likelihood of a major catastrophe increases immensely.

Performance

Once a server is running at 70% capacity or more (in plain language:  it’s basically 70% full when all operations are running), it slows down immensely.  And a funny thing about performance that we’ve noticed:  Unlike vehicles, and appliances, people tend to accept poor performance and slowness from their computer.  After a while, they don’t even realize that are doing it.  

How many of you start up your computer, or open a file, and start doing something else because it takes so long?  If you do, you’re not alone.  Many people do just this, and think nothing of it.  Consider the loss of productivity this is costing you & your company.  

Lots of potential for fails after 3 years.  What would a server failure cost your business, and how quickly could you recover?

We often notice people replace their vehicles far more often than their servers and other technical equipment.  A new truck runs upwards of $50,000++.  A new server:  a few thousand.  Is the new truck making you money?  Your server is your business’ lifeblood, and without it you may not be able to afford the payments on that shiny new truck.  

Make it a priority to replace your server.  Your business depends on it.  
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: Blogs, FAQ

ALERT: New Facebook Hoax

June 29, 2016 by The T By D Team Leave a Comment

Facebook Colour Change

ALERT:  New Facebook Hoax

A new version of an old hoax is spreading fast through Facebook pages everywhere.

 

 

CyberCriminals are cashing in on people’s fear that Facebook is going to start charging for its service.

The message specifics vary, but the gist of the message is that Facebook is going to start charging for Facebook accounts sometime in the near future (times vary between “tomorrow” to “this summer”).  The message goes on to state that if current users copy and paste the message into their own status, that their icon will turn blue, and their account will be “safe”.

This is a new version of an old hoax, which began circulating as early as 2006.

A Simple Rule of Thumb Regarding Social Media

Any message that claims that a particular online service provider will start charging you or will close your account unless you send on the information to others, is a hoax.  If you receive this Facebook version, or any of the other versions of this hoax, please DO NOT pass it on to others.  Reposting does nothing other than clutter social networks and inboxes with even more useless information.  Also, CyberCriminals have ways of collecting (read “make $$$$”) off of such scams.  

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

ALERT: New Ransomware Targets MS Office 365 Users

June 28, 2016 by The T By D Team Leave a Comment

Cerberus with Credit

ALERT:  New Ransomware Targets MS Office 365 Users


A new strain of the Cerber Ransomware is targeting MS Office 365 email users with a massive attack that has the ability to bypass the Office 365’s built-in security tools.  

A report recently released by cloud security provider Avanan shows a massive zero-day attack targeting Office 365 users with phishing emails containing attachments with malicious files.

Microsoft reported in its 1st quarter of 2016 that there are almost 18.2 million Office 365 subscribers.  And while Avanan does not specify the number of users that have been hit by the ransomware, Avanan does state:

“While difficult to precisely measure how many users got infected, roughtly 57 pecent of organizations using Office 365 received at least one copy of the malware into one of their corporate mailboxes during the time of attack.”

The Cerber Ransomware uses the ever-popular social engineering to try to trick users to allow macros, very similar to the recent Locky and Dridex attacks.  The difference is that Cerber not only encrypts user files, and displays a ransom note, but it also takes over the user’s audio system to read out its ransom note informing them that their files were encrypted.

Cerber Ransom Note with Credit

How To Protect Yourself

I’d love to tell you that there was some magic potion to sprinkle, or some magic software to download, that would keep you safe from Cerber Ransomware.  However, the steps to avoid becoming a victim to this strain of ransomware, are much like the steps to avoid the rest:

  1. Backups.  Backups.  Backups.  Maintain current, and reliable backups of all pertinent files.  Nothing beats a good, reliable backup!  Backing up your data now can prevent a lot of expensive headaches in the future.
  2. AntiMalware Software.  Regularly run AntiMalware software to block known strains of ransomware.
  3. Update.  Update.  Update.  Keep all hardware, software, and Operating Systems up-to-date.  
  4. Educate.  Educate.  Educate. Make sure employees and coworkers know about current viruses/malware, and what to look for.  Print & post our “Red Flag Emails” for easy reference on what to look for in scam emails.
  5. Install Ad Blockers When Possible.  uBlock Origin is a great ad blocker for Chrome and other browsers.
  6. Block Extensions via Email.  A good spam blocker will usually handle this for you.
  7. Limit permissions.  Allow “Read/Write Access Only” when necessary.
  8. Avoid mapping network shares.  If you have to use them, hide them whenever possible.  This is sometimes as simple as appending a “$” to your share name.

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

ALERT: FBI Warns Email Extortion Heating Up for Summer!

June 7, 2016 by The T By D Team Leave a Comment

Extortion letter

 ALERT:  FBI Warns Email Extortion Heating Up for Summer!

The FBI’s Internet Crime Complaint Center (IC3) has issued a warning that  email extortion campaigns have heated up recently.  The IC3 states that the recent increase in email extortion stems from recent data breaches in companies such as Ashley Madison, the IRS, Anthem, and others where millions of records with highly personal information was stolen.

Ashley Madison Extortion

With extortion email scams, victims are informed that the CyberCriminals have their highly personal information.  The victims are instructed to pay, usually within a short time period.  The ransom amount typically ranges between 2-5 Bitcoins (approximately $300-$1400 US, depending on exchange rates).

Victims are told that if they do not pay the ransom, their personal information (such as name, phone number, address credit card info. and other confidential information) will be sent to the victim’s social media contacts, family, and friends.

Do NOT answer these demands, and do NOT pay anything.

If you do, your data will be sold to other scammers who will continue to haunt & extort you for further fund.

Report this scam to the FBI’s Internet Crime Complaint Center (IC3), at:  http://www.ic3.gov/default.aspx

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

ALERT: Evil Android Trojan Empties Your Bank Account

May 17, 2016 by The T By D Team Leave a Comment

Mobile Device Trojan

ALERT:  Evil Android Trojan Empties Your Bank Account

The FBI has identified 2 versions of malware for Android (SlemBunk and Marcher) actively phishing for financial institutions’ customer credentials.  According to cyber threat security reports, both types of malware have targeted foreign financial institutions since 2014, gradually broadening the list to include Western banks, and offered the malware for lease or purchase in underground forums.

SlemBunk apps often masquerade as common, popular applications, and stay incognito after running the 1st time.  They have the ability to phish for, and harvest, authentication credentials when specified banking and other similar apps are launched.  Slembunk currently spoofs the apps of 31 banks across the globe – some of which are among the biggest banks in the world – as well as users of 2 popular mobile payment service provider apps.

Online Banking Login

Users will only get infected if the malware is accidentally downloaded from a malicious website, the new version of the malware being distributed by porn websites.  Users who visit these sites are incessantly prompted to download Adobe Flash update to view the porn, and doing so, downloads the malware.  

When the app is launched for the 1st time, it activates the registered receiver, which subsequently starts the monitoring service in the background.  On the surface, it pops up a fake UI claiming to be Adobe Flash Player, or whatever it was advertised as being, and requests to be the device admin.  Upon being granted admin privileges, it removes the fake icon from the device, and the malware monitors the infected phone for the launch of a targeted mobile banking app.  When a mobile banking/payment app is launched, the malware injects a phishing overlay over the legitimate banking/payment app’s user interface (aka login screen).  The malware then uses the fake login screen to steal the victim’s banking credentials.

How to Avoid Mobile Device Malware:
  1. If you receive a pop-up telling you that you need to download Adobe Flash or any other software, whether you’re on your desktop or on your mobile device, go directly to the Adobe website or the app store (type it in the address bar), and download it from there.
  2. Keep Android devices updated.
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Blogs, Featured

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in