Tag Cybersecurity

Tag Cybersecurity

The Data Breach at Target Affects More Than Originally Thought

Tags: , , , Computer Security Baltimore

In December, the retail giant Target reported that hackers had breached their collection of customer data and made off with credit and debit card numbers and affecting up to 40 million people. Now, Target is reporting that the data breach will affect up to 70 million people. In a statement, Target stated that the stolen data includes not only credit and debit card numbers, but names, phone numbers, addresses, and email addresses of customers as well. Target’s ongoing investigation into the matter revealed these new findings in the data breach, which occurred between Nov.27 and Dec. 15 of last year.

Target has attempted to contact every customer for whom it has contact information and inform them that their information was stolen. CEO Gregg Steinhafel apologized to all Target customers in a video statement. According to IT World, “Target has pledged to pay for the costs of any fraudulent charges related to the breach. The company is also offering one year of free credit monitoring and identity theft protection to customers who shopped at the company’s U.S. stores.”

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources

Cybersecurity News: Los Angeles Creates Cyber Security Command Center

Tags: , , , Computer Security Baltimore

Around the world e-security is one of our biggest threats. In Los Angeles, steps are being taken to combat the risks. The Cyber Intrusion Command Center was created to secure all city agencies against cyberattacks. The mayor of Los Angeles wants to make sure that the city is protected from all future potential cyberattacks.

Technology allows the government to be more efficient at a lower cost, but security can be sometimes compromised. That’s where the cybersecurity command center comes in. The purpose of the command center is to protect the computer systems from potential hackers. Federal officials have warned city officials that the next terrorist attack could be through computers as technology continues to be more prevalent in society. The goal of the cybersecurity command center is to fight electronic terrorism.

The center will identify cyberthreats, ensure incidents are quickly investigated and see that information on the threats are sent out.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

http://www.dailynews.com/government-and-politics/20131030/la-mayor-eric-garcetti-creates-cyber-security-command-center

The Importance Of Virus Protection

Tags: , , , Computer Security Baltimore

Most computer users blindly download, install, and ascribe to an anti-virus program without actually fully understanding the necessity of such software. At Working Nets, we provide top-notch virus protection at affordable prices to ensure your business, files, and computers remain safe and functioning smoothly.

What are threats?

Malware, short for “malicious software,” is the catchall phrase for potentially damaging threats to your computer: viruses, trojan horses, worms, spyware, and the like. Generally this software is created to either disrupt or worse – destroy – files and programs on your computer.

What happens when malware infects your computer?

Without a reliable anti-virus program, your infected computer often becomes unusable, requiring the hard drive to be wiped clean, and your computer’s operating system reinstalled. To avoid lost data and a dysfunctional system, effective malware-combatants are necessary.

What does Antivirus software do?

Antivirus software serves double duty, both removing preexisting malware and working to prevent them from occurring in the first place. Taking the precaution against harmful viruses will save you money and time in the long run, protecting your computer and by extension, your business. Let the Information Technology professionals at Working Nets, Inc. help you do just that, by outsourcing your computer support needs from our company.

If you have any questions about Antivirus Software, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

The Importance of Antivirus and Security Software

How Can Cloud Computing Benefit Me?

Tags: , Computer Security Baltimore

Cloud computing is one of the big buzzwords right now. But why? Clearly if everyone is talking about it then there must be something to it. Cloud computing offers many benefits to users.  Whether you know it or not, you may already be using cloud based storage. That photo you just uploaded to Facebook, that is stored in the cloud so you can share the content with other members.

The benefits to cloud computing are very straightforward. Your data becomes accessible from anywhere if you have the correct permissions. Additionally, data in the cloud is safer, it requires security backups and firewalls to protect your sensitive data from prying eyes.

In short, cloud computing is beneficial regardless of the reasons which you chose to use it and it also provides a much greater accessibility rate for its users.

At Working Nets, we were founded to provide small businesses in Baltimore and the surrounding area, businesses like yours, with the expert information technology support they need to not only survive, but thrive. Our disaster recovery services help ensure your vital business data is kept safe and secure, providing you with a peace of mind that is unequalled.

Did you know that 43% of companies that experience major data loss never recover? 51% close within 2 years. Don’t let this happen to you. Pick up the phone, call Working Nets today, and stop playing Russian roulette with your business.

If you have any questions about cloud computing, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today! You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/Dataprotection/QA/QA10

Windows 7, Windows XP, & Malware Infections: Is your Computer at risk?

Tags: , , , , , , , , , , , Computer Security Baltimore, Explanations, IT industry, IT Tips Baltimore

According to the latest Microsoft Security Intelligence Report (volume 13), the average number of infected Windows 7 SP1 machines has increased in 2012 by 23% on 32-bit systems and 7% on 64-bit systems, compared to the last quarter of 2011. Meanwhile, the average number of malware-infected Windows XP SP3 PCs has increased by around 10%.

According to the report: “A similar trend of slowly increasing infection rates was observed for Windows Vista between 2007 and 2009, prior to the release of Windows 7.” But why? Well, as more and more people adopt software, security suffers. Early adopters are often well versed in cybersecurity techniques. However, the general populous is not.

“As the Windows 7 install base has grown, new users are likely to possess a lower degree of security awareness than the early adopters and be less aware of safe online practices,” according to the Microsoft security report.

Quick Security Tips from Working Nets

  1. Avoid questionable behavior. If you engage in questionable behaviors; if you don’t have SOME healthy skepticism about clicking on links to who-knows-where; if you download “drivers” or “players” willy-nilly, so that you can see that “new video”, and especially if you don’t have some form of anti-virus software, you’re going to get hurt.
  2. Trying to avoid paying for software by downloading license key generator, also known as Keygen, software to allow you to install a full-version of whatever software you’re talking about is not only illegal, it constitutes “questionable behavior.” Remember what we just talked about. There is plenty of free software, and if the software you want to use isn’t free, and is that important to you, it’s probably worth paying for. It’s usually cheaper than having to have viruses uninstalled, and is certainly cheaper than having financial credentials stolen.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Virus/Spyware Protection Services: Viruses and spyware are time-consuming and costly. The virus protection we offer is top-notch and consistently updated. Our monitoring software ensures your business is safe.

Welcome to Working Nets – your virtual IT Department!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Windows 7 Malware Infection Rates Soar

 

Cybersecurity News: Microsoft PCs are infected before reaching Consumers

Tags: , , , , , , , , , , , Computer Security Baltimore, IT Tips Baltimore

It has not been a good couple of weeks for Microsoft. First, they discovered that Hackers had found a Security Hole in Internet Explorer. Now, the computer company has discovered that many of their PCs and laptops made in China were embedded with malicious software before ever reaching the consumer. The computer virus allows hackers to switch on a microphone or Webcam, record keystrokes, and access login credentials and online bank accounts.

And because computer companies rely on such a long and complex supply line, the malicious software could have been uploaded at any point, something Richard Domingues Boscovich, the assistant general counsel for the Microsoft Digital Crimes Unit, called “especially disturbing.”

“It’s one of the toughest cybersecurity challenges out there,” said Tom Kellermann, vice president of cybersecurity at Trend Micro. “There’s not really a solution unless you start to only build computers in the USA again.”

This isn’t the first time this has happened either. In 2008, the Defense Department and Federal Aviation Administration unknowingly purchased counterfeit Cisco routers, which were pre-loaded malicious software. FBI investigators found the routers allowed hackers to “gain access to otherwise secure systems.”

Then in May, the Senate Armed Services Committee released  a report citing 1,800 cases of counterfeit electronics from China, electronics used in the Air Force’s largest cargo plane and Special Operation helicopters.

“Companies are in a competitive dogfight to make products cheaper and hit the market faster,” said Scott Aken, a former FBI special agent who dealt with cyber counterintelligence. “They’re not spending time or money to ensure those products they are sourcing from overseas are devoid of counterfeits.”

So what are consumers to do?

Boscovich offers this simple advice: Consumers can often spot dangerous counterfeit technology if the deal “appears too good to be true.”

“However, sometimes people just can’t tell, making the exploitation of a broken supply chain an especially dangerous vehicle for infecting people with malware.”

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Pre-Infected PCs Expose Flaws In Global Supply Chain

Cybersecurity News: Hackers have found a Security Hole in Internet Explorer

Tags: , , , , , , , , , , , Computer Security Baltimore, IT industry, IT Tips Baltimore

It was recently reported that security researcher Eric Romang of Zataz.com discovered a major cybersecurity issue with Internet Explorer (IE) versions 6, 7, 8, and 9. The popular Internet browser has a major hole, a hole that hackers have already discovered.

The fresh “zero day” vulnerability allowed cyber attackers to install malicious software – a form of the old Poison Ivy Trojan – on Windows computers. This allowed the hackers to take control of the victim’s computer.

It is thought that the hackers behind the IE attack may also be the group responsible got last month’s exploitation of Oracle’s Java browser plug-in.

Microsoft Responds to the Cybersecurity Threat

Microsoft quickly responded with a security advisory, including an extensive list of work-arounds. Unfortunately for IE users, these work arounds are somewhat burdensome.

“I would recommend not using Internet Explorer until this issue is patched,” Sophos’ Chet Wisniewksi tells me. “While the exploit is not in widespread use, it could be integrated into popular attack kits like the Blackhole Exploit Kit any time now.”

The Solution: Make the switch to another browser, like Google Chrome, Mozilla Firefox, or Opera. You can always come back to IE after Microsoft issues a patch.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

Hackers Just Found a Big Hole in Internet Explorer. Should You Switch Browsers?