Email – Formerly Nerd4Rent https://www.nerd4rent.com Local, Trusted, Reliable Technology Support for Your Home, Small Business, Home Office. Computer Setup, Networking, Virus Removal, Backup, Windows and Macs. Wed, 03 Jan 2018 17:36:58 +0000 en-US hourly 1 https://www.nerd4rent.com/wp-content/uploads/2018/01/cropped-Logo-Cropped-for-Website-32x32.jpg Email – Formerly Nerd4Rent https://www.nerd4rent.com 32 32 Protect Yourself From Ransomware Attacks https://www.nerd4rent.com/protect-ransomware-attacks/ Tue, 14 Jun 2016 17:42:14 +0000 https://www.nerd4rent.com/?p=1299 Ransomware is a growing threat! Don’t be a victim. Our client Bill received an email with an invoice attached. He clicked on the invoice to open it and quickly bypassed a couple of warning pop-ups. Immediately, some malicious code contained Continue reading Protect Yourself From Ransomware Attacks

The post Protect Yourself From Ransomware Attacks appeared first on Formerly Nerd4Rent.

]]>

Ransomware is a growing threat! Don’t be a victim.

Our client Bill received an email with an invoice attached. He clicked on the invoice to open it and quickly bypassed a couple of warning pop-ups. Immediately, some malicious code contained in the invoice file started encrypting all documents, PDF files, music and photos on his computer.

Worse, the code encrypted some files on his company’s server that he had access to, and looked for backup drives, and other computers on the network to attack.

Bill was a victim of ransomware. To see how Bill’s ransomware attack concluded, read on…

What is Ransomware?
Ransomware is malicious software that encrypts files on your computer, backup drives and network. After your files are encrypted with an UNBREAKABLE code, the criminals will ask for payment (ransom) to unlock your files.

The use of ransomware is increasing dramatically, because it’s profitable. There’s no way to know how much money the criminals are taking in, but even published accounts (a very small number of actual incidents), quote tens of millions of dollars of ransom paid in 2015.

According to FBI Cyber Division Assistant Director James Trainor, “There’s no one method or tool that will completely protect you or your organization from a ransomware attack. “But contingency and remediation planning is crucial to … recovery and continuity—and these plans should be tested regularly.”

How does ransomware infect computers?

1. Email attachment: This is the most common method. An email comes in with a legitimate-looking attachment, such as an invoice, fax, or photo. The user is tricked into clicking on the attachment and allowing a program to run.

2. Link to a malicious (or hacked legitimate) website. If your computer is using outdated software, the website will try to install the malicious software without your knowledge, by exploiting a known vulnerability in software like your browser, Java, Flash, etc.

FBI Cyber Division Assistant Director James Trainor, “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers.”

How can I protect myself from ransomware?

1. The best defense is knowledge. Don’t click on any unverified email attachments.  This alone will stop most ransomware dead in its tracks. Don’t bypass macro security prompts.

2. Backup your files, both locally and online. If the ransomware encrypts your files AND your local backup, you can usually recover from online backup. One of the great features of most online backup services is that they save versions of your files. If the current version is encrypted, you can recover an older, unencrypted version.

3. Keep your operating system and other software updated. Many viruses and ransomware will exploit known vulnerabilities-most of which have been fixed with updated software.

4. Disconnect your backup drives when not is use. If the backup drive is connected when the ransomware hits, it will try to encrypt your backups.

5. Use several layers of malware protection. Anti-virus software alone (especially free versions) is not enough.

6. Use anti-malware software, like MalwareBytes, in conjunction with your anti-virus software.

7. Change your DNS servers. DNS servers like Open DNS will not allow your computer to connect to known malicious websites.

8.  Lock down your computer. Login with a standard user account, and create a password-protected Administrator account that you only use for installing software and administrative tasks. This will prevent most malicious software from installing.

9. Disable macros in documents that come through email or the Internet. Article about disabling macros.

How much money do the criminals demand?
The ransom varies, but we’ve mostly seen $300-$800 demanded.

If I pay the ransom, will I get my files back?
Sometimes. There are many cases where the ransom has been paid and no key is returned. Worse, the criminals require you to pay with untraceable currency, like Bitcoins, which are anonymous and charges can’t be disputed.

What should I do if my files get encrypted?
Try to restore your files from backup
Pay the ransom (not recommended).

According to FBI Cyber Division Assistant Director James Trainor, “The FBI doesn’t support paying a ransom in response to a ransomware attack. Said Trainor, “Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom.

Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.

So what does the FBI recommend? As ransomware techniques and malware continue to evolve—and because it’s difficult to detect a ransomware compromise before it’s too late—organizations in particular should focus on two main areas:

  • Prevention efforts—both in both in terms of awareness training for employees and robust technical prevention controls; and
  • The creation of a solid business continuity plan in the event of a ransomware attack.

Home computers and Macs are vulnerable to ransomware
if you are a home computer user or a Mac user, all of the above applies to you.

According to FBI’s Trainor “…home computers are just as susceptible to ransomware, and the loss of access to personal and often irreplaceable items—including family photos, videos, and other data—can be devastating for individuals as well

Bill’s story-Continued from above
Bill called us, and we were able to eliminate the malicious code with some virus and anti-malware scans. Luckily for Bill, he had backed up SOME of his files, and we were able to restore them. The files that were not backed up were lost. Bill has since implemented online backup and does not click email attachments.

Resources
FBI Article about ransomware

CERT Article about disabling macros

Open DNS

MalwareBytes

The post Protect Yourself From Ransomware Attacks appeared first on Formerly Nerd4Rent.

]]>
Tips for Getting off The Grid https://www.nerd4rent.com/tips-for-getting-off-the-grid/ Sat, 01 Aug 2015 19:52:06 +0000 https://www.nerd4rent.com/?p=1189 All of us need to be away from home or the office occasionally for: vacation, business meetings, training etc. One of the big questions we all face is: do I want to be reachable by email or phone while away? You Continue reading Tips for Getting off The Grid

The post Tips for Getting off The Grid appeared first on Formerly Nerd4Rent.

]]>

All of us need to be away from home or the office occasionally for: vacation, business meetings, training etc. One of the big questions we all face is: do I want to be reachable by email or phone while away?

You have several options for keeping in touch while away:
No Communication (off the grid)
Limited Communication
Full Communication

No Communication (Off the Grid)
Many people want to have no email or cell phone access so they can completely unwind and not think about work. This is easy: just leave your cell phone and computer at home and enjoy your trip! Consider adding an out-of-office reply to your email, and changing your voicemail greeting to let your contacts know you won’t be reachable during your absence. (see below for more information about out of office messages)
Limited Communication
If you don’t feel comfortable being completely unplugged, consider limiting your connectivity by checking email and voicemail only periodically. For limited communication, it’s advisable to setup an out-of-office email reply, and to change your voicemail greeting. (see below for more information).
Full Communication
If you decide to keep your lines of communication open during your trip, there are several strategies to use to access your email and voicemail from anywhere.
Out-of-office/Vacation reply
This is a customizable message that is automatically sent to each person who sends you an email. A typical out-of-office message looks like this: ” I am out of the office until August 17th, with limited (no) access to email. If your message is urgent, please contact our support desk at (925) 283-5666 or email support@nerd4rent.com”
If you have corporate email, there is an easy setting to create and turn on an out-of-office reply. In Outlook 2013, go to File | Info | Automatic Replies.
if you don’t have a corporate email system, sign in to your email via your provider’s web site.(below are some common providers).
Gmail: www.gmail.com. Click the Gear symbol at the upper right side of the screen, Scroll down to Vacation Responder.
Yahoo/AT&T/SBC Global: www.yahoo.com.  Click the Gear symbol at the upper right side of the screen, Choose Settings | Vacation Response.
Comcast: www.comcast.com. Sign into your email account and click Preferences | Email | Vacation Response
Take your cell phone with you
Many cell phones will work in foreign countries-check with your provider. If you are going on a cruise, you may be able to use your cell phone on the ship. Check with your provider before you go.
Take your laptop or tablet with you
You can use your laptop or tablet almost anywhere there is Wi-Fi. This includes coffee shops, hotels, cruise ships, many airlines. Note that if you use a computer-based, (Mac mail, Outlook, Windows Live Mail, etc.) email, as opposed to web-based), email, you may have to change your outgoing email settings when you are traveling, in order to send messages.

The post Tips for Getting off The Grid appeared first on Formerly Nerd4Rent.

]]>