Author: Jon Isenberg

Cybersecurity, COVID-19, and Work at Home

IN THE NEWS – ELIJAH Digest | March 19, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. With the increasing number of cases being reported in the USA and worldwide of the Coronavirus (COVID-19), many businesses and government offices are sending employees home, to work at home. Students are not attending classes in a classroom and are now attending online classes from their homes or dorm rooms. But with work-at-home or study-at-home, there is a new threat – a Cybersecurity related one. Cybercriminals are ramping up their tactics to take advantage of consumers that are working at home with an internet service that is not as well protected as their business. Most consumers do not have the same network security devices as businesses, thus exposing the business data to a potential attack. On March 3, 2020, technology researchers reported that 2 malware campaigns were launched and were connected to the… Read more »

Apple Devices Now A Big Target For Cyber Attacks

IN THE NEWS – ELIJAH Digest | March 05, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. In 2019, Mac computers with a Mac operating system held a 6% market share while Windows has a 36% market share. With Macs growing in popularity, they are becoming a big target for cyber threats and malware. Malwarebytes identified a 400% increase in threats to Mac devices from 2018 to 2019, with an average of 11 threats per Mac device (PC’s average 5.8 threats per device). Macs are not immune to infections. While ransomware has been scarce on a Mac operating system, it has been easily targeted by crypto jacking (coin mining) operations, Potentially Unwanted Applications or Programs (PUAs or PuP’s) and the run of the mill online threat of phishing. Crypto jacking is best defined as stealing computing power (i.e. cookies that contain login credentials and passwords). In 2019, the top 10… Read more »

Cybersecurity Alert – Ransomware That Does More Than Encrypt Your Data

IN THE NEWS – ELIJAH Digest | February 20, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. There is a new type of Ransomware that is attacking businesses and wreaking havoc on Cybersecurity measures. This new strain called “Ekans” contains not just the encryption software, but also a type of Artificial Intelligence that targets the entire corporate network infrastructure, including servers and virtual machines. This can not only lock your data, but also disable your network. How bad is this? If you thought that losing your data was bad, with Ekans, your entire network will be corrupted, and you may have to replace every device in your server room. Better Cybersecurity – Six Strategies To Be Proactive Rather Than Reactive: Security Software. There are a handful of security software products that offer Ransomware protection that automatically detects if you downloaded a file containing Ransomware. This software will delete the file… Read more »

Cybersecurity and IoT Devices – Are You Protected?

IN THE NEWS – ELIJAH Digest | February 06, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. IoT or the Internet of Things is bringing every aspect of our lives online. It is projected that the quantity of IoT devices will increase worldwide to over 75 billion in 2025. Phones, watches, thermostats, cameras, refrigerators, printers, and more are connecting to the wireless systems in our homes and offices. Every day a new device comes out – but are they secure? The majority of IoT devices do not have any security solutions built into them and are dependent on the network that they connect to. All IoT devices need to have some type of protection on them as they can be hacked. Seven tips on how to protect yourself and your business. Connect the IoT devices to a secondary network. Most Firewalls and Wi-Fi devices have the ability to create a… Read more »

Cybersecurity Alert: Cyberattacks On The Rise In Early 2020

IN THE NEWS – ELIJAH Digest | January 23, 2020 Computer Forensic, Cybersecurity and Managed IT Solutions. In the past two months, the news has been littered with reports of cyberattacks including attacks on: The Department of Homeland Security, Mitsubishi, and LifeLabs, to name a few. Five Steps to reduce the chance that your business will be a target of a cyberattack: Be careful what you click on. Watch for emails that seem out-of-place, like the email from your boss that asks you to run an errand and pick up gift cards as they are in a meeting. Or, that email that seems too good to be true (it probably is) and contains a ransomware infection. In our busy lives, remember to think before clicking. Use strong security software. Security software should be installed on every device that you use to connect to the internet. Whether accessing email or the… Read more »

Skype For Business Is Being Retired – Are You Ready?

IN THE NEWS – ELIJAH Digest | December 12, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Microsoft recently announced that in 2021, Microsoft’s Skype for Business will be retired and the service will no longer be available. According to a Microsoft website, Skype for Business customers will be migrated to Microsoft Teams. The Skype consumer service is not affected by this announcement. Why are they doing this? In 2017, Microsoft Teams was launched, as the “hub for teamwork” as part of the Office 365 software. Teams combines chat, video, calling, and document collaboration into a single integrated app and an entirely new way of working. This new upgraded experience will bring more technology and usability than the current Skype for Business product. With the most recent Windows updates, Microsoft Teams will start up every time you restart your computer. You can log in using your email & password, the… Read more »

Mobile Device Digital Forensics – Recovery of Digital Evidence

IN THE NEWS – ELIJAH Digest | November 14, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Mobile devices have become an important part of people’s daily lives. As such, they are prone to facilitating criminal activity or may otherwise be involved when crimes occur. The crime may not be caused by the owner of the device, but may capture information about the crime (i.e. photos, text messages, etc.) itself. In the field of Digital Forensics, which includes many types of devices in addition to just computers, it is important to recognize the process of retrieving information needed for the legal process. Mobile device forensics obtains digital evidence from mobile devices for an investigation. Mobile devices can include smartphones, PDA devices, GPS devices, and tablet computers. There is a growing need for mobile device forensics as these devices can store and transmit both personal and corporate information and can be… Read more »

Cybersecurity – How Good Are Your Data Backups?

IN THE NEWS – ELIJAH Digest | October 31, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Data backups are an important way to allow your business to continue running should a data interruption occur. With the rise of Cyber and Ransomware attacks, your company’s data backups are more necessary than ever. On October 4th, the FBI released an alert about the increase in Ransomware attacks against SMB’s in all sectors, including healthcare, state, local governments, and businesses of all size. Data Backup Recommendations: Use Off-site backups. Gone are the days of backing up your data to a flash drive or external hard drive that are attached to your server. If attacked by an infection, all of the local computers/servers/external drives will be affected as well. Local and Off-site backups are needed to protect your data. Use a Data Center. A data center is a facility that centralizes an organization’s… Read more »

Cybersecurity – Now It’s Getting More Personal

IN THE NEWS – ELIJAH Digest | October 03, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. More and more people are getting emails addressed to them, from an executive level member of the company, asking for help. The emails are friendly and simple, but require the recipient to either reply to the message or open an attachment. For example, one of our clients recently had her email account hacked. She was unaware that she was sending messages to her staff, asking for help. The wording of the message was: From: (Company Boss) Sent: Tuesday, September 17, 2019 7:08 AM To: (Company Employee) Subject: I will need your help today. Quick response needed: I want you to handle something for me this morning before heading in. Thanks. Phishing attacks like this, in which carefully targeted digital messages are transmitted to fool people into following directions or clicking on a link,… Read more »

Better Cybersecurity – Phishing Scams You Need To Be Aware Of

IN THE NEWS – ELIJAH Digest | September 19, 2019 Computer Forensic, Cybersecurity and Managed IT Solutions. Phishing is a type of cybercrime in which hackers contact you while posing as a legitimate institution or organization in an attempt to get you to provide sensitive or private information. Phishing can occur over the telephone, via a SMS text message, or through email. Spoofing is the practice of creating a website or email template that nearly perfectly mimics a legitimate website. Oftentimes, the website design will be very similar but the URL will be slightly off. See an example below: The Most Common Phishing Scams of 2019 Include: Government emails. Emails designed to look like they are from the FBI, IRS, or Medicare or other government agencies are designed to trick you to give away your personal information. Common scams tell you that you are under investigation for “downloading illegal files”… Read more »