Author: Jon Isenberg

Cybersecurity Alert – Ransomware That Does More Than Encrypt Your Data

IN THE NEWS – ELIJAH Digest | February 20, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. There is a new type of Ransomware that is attacking businesses and wreaking havoc on Cybersecurity measures. This new strain called “Ekans” contains not just the encryption software, but also a type of Artificial Intelligence that targets the entire corporate network infrastructure, including servers and virtual machines. This can not only lock your data, but also disable your network. How bad is this? If you thought that losing your data was bad, with Ekans, your entire network will be corrupted, and you may have to replace every device in your server room. Better Cybersecurity – Six Strategies To Be Proactive Rather Than Reactive: Security Software. There are a handful of security software products that offer Ransomware protection that automatically detects if you downloaded a file containing Ransomware. This software will delete the file… Read more »

Cybersecurity and IoT Devices – Are You Protected?

IN THE NEWS – ELIJAH Digest | February 06, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. IoT or the Internet of Things is bringing every aspect of our lives online. It is projected that the quantity of IoT devices will increase worldwide to over 75 billion in 2025. Phones, watches, thermostats, cameras, refrigerators, printers, and more are connecting to the wireless systems in our homes and offices. Every day a new device comes out – but are they secure? The majority of IoT devices do not have any security solutions built into them and are dependent on the network that they connect to. All IoT devices need to have some type of protection on them as they can be hacked. Seven tips on how to protect yourself and your business. Connect the IoT devices to a secondary network. Most Firewalls and Wi-Fi devices have the ability to create a… Read more »

Cybersecurity Alert: Cyberattacks On The Rise In Early 2020

IN THE NEWS – ELIJAH Digest | January 23, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. In the past two months, the news has been littered with reports of cyberattacks including attacks on: The Department of Homeland Security, Mitsubishi, and LifeLabs, to name a few. Five Steps to reduce the chance that your business will be a target of a cyberattack: Be careful what you click on. Watch for emails that seem out-of-place, like the email from your boss that asks you to run an errand and pick up gift cards as they are in a meeting. Or, that email that seems too good to be true (it probably is) and contains a ransomware infection. In our busy lives, remember to think before clicking. Use strong security software. Security software should be installed on every device that you use to connect to the internet. Whether accessing email or the… Read more »

Skype For Business Is Being Retired – Are You Ready?

IN THE NEWS – ELIJAH Digest | December 12, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Microsoft recently announced that in 2021, Microsoft’s Skype for Business will be retired and the service will no longer be available. According to a Microsoft website, Skype for Business customers will be migrated to Microsoft Teams. The Skype consumer service is not affected by this announcement. Why are they doing this? In 2017, Microsoft Teams was launched, as the “hub for teamwork” as part of the Office 365 software. Teams combines chat, video, calling, and document collaboration into a single integrated app and an entirely new way of working. This new upgraded experience will bring more technology and usability than the current Skype for Business product. With the most recent Windows updates, Microsoft Teams will start up every time you restart your computer. You can log in using your email & password, the… Read more »

Mobile Device Digital Forensics – Recovery of Digital Evidence

IN THE NEWS – ELIJAH Digest | November 14, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile devices have become an important part of people’s daily lives. As such, they are prone to facilitating criminal activity or may otherwise be involved when crimes occur. The crime may not be caused by the owner of the device, but may capture information about the crime (i.e. photos, text messages, etc.) itself. In the field of Digital Forensics, which includes many types of devices in addition to just computers, it is important to recognize the process of retrieving information needed for the legal process. Mobile device forensics obtains digital evidence from mobile devices for an investigation. Mobile devices can include smartphones, PDA devices, GPS devices, and tablet computers. There is a growing need for mobile device forensics as these devices can store and transmit both personal and corporate information and can be… Read more »

Cybersecurity – How Good Are Your Data Backups?

IN THE NEWS – ELIJAH Digest | October 31, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Data backups are an important way to allow your business to continue running should a data interruption occur. With the rise of Cyber and Ransomware attacks, your company’s data backups are more necessary than ever. On October 4th, the FBI released an alert about the increase in Ransomware attacks against SMB’s in all sectors, including healthcare, state, local governments, and businesses of all size. Data Backup Recommendations: Use Off-site backups. Gone are the days of backing up your data to a flash drive or external hard drive that are attached to your server. If attacked by an infection, all of the local computers/servers/external drives will be affected as well. Local and Off-site backups are needed to protect your data. Use a Data Center. A data center is a facility that centralizes an organization’s… Read more »

Cybersecurity – Now It’s Getting More Personal

IN THE NEWS – ELIJAH Digest | October 03, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. More and more people are getting emails addressed to them, from an executive level member of the company, asking for help. The emails are friendly and simple, but require the recipient to either reply to the message or open an attachment. For example, one of our clients recently had her email account hacked. She was unaware that she was sending messages to her staff, asking for help. The wording of the message was: From: (Company Boss) Sent: Tuesday, September 17, 2019 7:08 AM To: (Company Employee) Subject: I will need your help today. Quick response needed: I want you to handle something for me this morning before heading in. Thanks. Phishing attacks like this, in which carefully targeted digital messages are transmitted to fool people into following directions or clicking on a link,… Read more »

Better Cybersecurity – Phishing Scams You Need To Be Aware Of

IN THE NEWS – ELIJAH Digest | September 19, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Phishing is a type of cybercrime in which hackers contact you while posing as a legitimate institution or organization in an attempt to get you to provide sensitive or private information. Phishing can occur over the telephone, via a SMS text message, or through email. Spoofing is the practice of creating a website or email template that nearly perfectly mimics a legitimate website. Oftentimes, the website design will be very similar but the URL will be slightly off. See an example below: The Most Common Phishing Scams of 2019 Include: Government emails. Emails designed to look like they are from the FBI, IRS, or Medicare or other government agencies are designed to trick you to give away your personal information. Common scams tell you that you are under investigation for “downloading illegal files”… Read more »

Data Breaches & Costs

IN THE NEWS – ELIJAH Digest | September 5, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. The average cost of a data breach is now over $3.5 million. The average time to identify and contain a data breach averages over 8 months. If your business is impacted by a data breach, you can expect over 2/3 of the costs to occur in the first year. These number are up 12% over the past 5 years. The U.S. Security and Exchange Commission estimates that half of all small businesses that suffer a cyber-attack go out of business within six months. Tips on how to protect yourself and your businesses Educate your staff – it is important to teach your staff on what is safe to click on and what is unsafe. Human error was found to have caused over 22% of the breaches. Secure your network infrastructure with a Firewall.… Read more »

Smartphones & Cybersecurity – Are you at risk?

IN THE NEWS – ELIJAH Digest | August 22, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile device security threats are on the rise. In 2014, Kaspersky Lab detected almost 3.5 million pieces of malware on more than 1 million user devices. It is estimated that 3 out of every 4 mobile devices are unprotected and contain malware. Cell phones can store large amounts of data that typically includes passwords, credit card numbers, and other personal information. Thus, the cybersecurity risks are high. Top Risks Include: Unsecured Wi-Fi – no one wants to burn through their cellular data when FREE wi-fi is available, but how secure is the Free Wi-Fi? Very Unsecured. It is designed as a Guest network. Some Guest networks require a password, but there is no security. You are better to use your phone as a hot-spot, or use a VPN for better security. Network Spoofing… Read more »