Our Blog

Our Blog

Cybersecurity News: Hackers have found a Security Hole in Internet Explorer

Tags: , , , , , , , , , , , Computer Security Baltimore, IT industry, IT Tips Baltimore

It was recently reported that security researcher Eric Romang of Zataz.com discovered a major cybersecurity issue with Internet Explorer (IE) versions 6, 7, 8, and 9. The popular Internet browser has a major hole, a hole that hackers have already discovered.

The fresh “zero day” vulnerability allowed cyber attackers to install malicious software – a form of the old Poison Ivy Trojan – on Windows computers. This allowed the hackers to take control of the victim’s computer.

It is thought that the hackers behind the IE attack may also be the group responsible got last month’s exploitation of Oracle’s Java browser plug-in.

Microsoft Responds to the Cybersecurity Threat

Microsoft quickly responded with a security advisory, including an extensive list of work-arounds. Unfortunately for IE users, these work arounds are somewhat burdensome.

“I would recommend not using Internet Explorer until this issue is patched,” Sophos’ Chet Wisniewksi tells me. “While the exploit is not in widespread use, it could be integrated into popular attack kits like the Blackhole Exploit Kit any time now.”

The Solution: Make the switch to another browser, like Google Chrome, Mozilla Firefox, or Opera. You can always come back to IE after Microsoft issues a patch.

If you have any questions about Cybersecurity, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Source:

Hackers Just Found a Big Hole in Internet Explorer. Should You Switch Browsers?

Updating the Virus Signature: Why it isn’t enough

Tags: , , , , , , , , Computer Security Baltimore, IT Tips Baltimore

What is a Virus Signature?

A virus signature, sometimes referred to as a definition file or a DAT file, is an algorithm or hash used by antivirus software to identify a specific virus or threat. However, signatures are only affective at detecting previously known viruses. When a new virus arises, a new signature must also be created.

What it means to Update the Virus Signature

When a new virus is discovered that is not detectable by an existing signature, a new signature must be created and tested by the antivirus vendor. This new signature is then pushed to the public in the form of a signature update, adding the detection capability to the scan engine.

Why it isn’t enough to just Update the Virus Signature

Because it is not practical for antivirus companies to release individual signatures, they often release several at a time on a set schedule. Still, keeping your signatures up to date will not guarantee a new virus will not slip through. To better protect yourself, it is recommended that you purchase the latest version of the antivirus software.

It’s important to keep the actual software current; not just the virus signatures!

If you have any questions about Antivirus Software, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Olympic-Themed Internet Phishing Scams :: Cybersecurity Tips

Tags: , , , , , , , , , , , Computer Security Baltimore, IT industry, IT Tips Baltimore

Every four years, the best athletes gather from around the globe to compete in the Olympics. Unfortunately, the Olympics also provide Internet scammers with a new outlet to try and phish information from unsuspecting and trustworthy individuals.

What is Phishing?

Phishing refers to attempting to acquire personal information – such as usernames, passwords, and credit card information – and money by masquerading as a trustworthy entity.

Olympic-Themed Phishing Scams

  • London 2012 Ticketing Team: This phishing scam sees scammers pose as ticketing officials offering unsuspecting individuals with an once-in-a-lifetime opportunity to purchase Olympic tickets that have been made available because of a previous bidder’s inability to pay for them. However, unlike the previous bidder, you are expected to pay upfront. This is why the original email is followed by a phone call asking for credit card information.
  • London Olympic Cash Officer: Unsuspecting individuals are sent an email from the “London Olympic Cash Officer” stating that the recipient has been randomly selected to receive a cash prize of 1.6 million GBP. However, to receive the payment the individual must provide personal information.
  • Dr. Beavis: Unsuspecting individuals are sent an email (signed by Dr. Beavis) stating that they, along with 6 other individuals, have been randomly selected as the winners of 7 million GBP. And, of course, they must provide personal information to claim their prize.
  • You are needed … Get Back to Us: Unsuspecting individuals are sent an email headed “You are needed … Get Back to Us.” It informs the recipient that they are needed to participate in the Olympics as a coordinator or event staffer. The individual is then directed to a site where they must input personal information and provide payment for the placement services.
  • Ring Steward: Unsuspecting individuals are sent an email (or letter) informing them that they have been selected to be a ring steward in the Olympics. Recipients are asked to call a phone number for additional details. And guess what? They are then asked to provide personal information.
  • Text Message Scams: Yep, phishing scams can include text messages, as well. This phishing scam involves a text message stating that the recipient has won 300,000 pounds in the London 2012 lottery. Recipients are then asked to call a phone number and provide personal information to claim their prize.

And this is just the beginning!

If you have any questions about Internet Phishing Scams and IT Security, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

10 Olympics-Themed Phishing Scams To Avoid At All Costs

Another Website Hacking Incident: What the LinkedIn & DropBox Hacks mean

Tags: , , , , , , , , , , , Computer Security Baltimore, IT industry, IT Tips Baltimore

First there was the infamous LinkedIn hack a few months ago. Now, another major website has been attacked, Dropbox.

“Our investigation found that usernames and passwords recently stolen from other websites were used to sign in to a small number of Dropbox accounts,” said Aditya Agarwal, VP of engineering at Dropbox. “We’re sorry about this, and have put additional controls in place to help make sure it doesn’t happen again.”

In instances such as these, hackers breach a website to steal usernames and passwords in hopes that these login credentials work for other services, as well. If they do, these hackers harvest personal data to use in future scams.

Protecting your Information: Simple IT Security Tips

The only way to truly prevent cyber-attacks is completely avoid using the Internet, which is nearly impossible these days. There are, however, several ways in which you can make your business network more secure. These security tips include:

  • Stop Password Reuse: Do not use the same password for multiple accounts. Yes, using multiple passwords will not be as easy to remember, but it will make you much less susceptible to cyber-attack.
  • Reset your Passwords Regularly: Security experts advise people to regularly change their passwords.
  • Choose your Security Question Carefully: Don’t make it too easy for hackers to access your information. Do not use personal information or basic information that can be found on the Internet.
  • Be Careful: Only access the Internet over a secure network.
  • Keep Everything Up to Date: Keep your operating system, browser, anti-virus and other critical software up to date.
  • Outsourced IT Security Services from Working Nets: Data protection is crucial. Working Nets assures that your vital business data is available when you need it by implementing tools to protect you!

If you have any questions about Hackers, Hacking, and IT Security, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Outsourced Preventative Computer & Network Maintenance Program

Tags: , , , , , , , , , , , Computer Security Baltimore, IT industry, IT Tips Baltimore

Productivity is crucial in any business.  For this reason, we at Working Nets have put together a preventative maintenance program to analyze your computer systems for potential problem areas to keep your business running smoothly, reducing costly downtime. And by reducing downtime, your office remains more productive, more often.

The Benefits of Working Nets’ Preventative Maintenance Program

  • Productivity: As we have already touched on, Working Nets can identify and remedy problems before they result in downtime, meaning your employees can remain productive.
  • Minimize Breakdowns: Besides keeping productivity high, preventative maintenance helps eliminate most costly breakdowns.
  • Keep Data Secure: You rely on your business information to stay profitable. So doesn’t it make sense to do whatever you can to protect your business critical information?
  • Optimize Machine Performance: Regular maintenance can help you get the most out of your machines.
  • Reduce Intrusion: Hackers can be a business’s worst nightmare. Is your network secure?

Performing proactive maintenance, by taking care of the overall health of your network,  is the most cost-effective and efficient way to prevent system problems and minimize breakdowns.

If you have any questions about Prevetative Maintenance or Outsourced IT Services, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Password Changes with Google Apps Outlook Sync Tool

Explanations, IT Tips Baltimore

Okay, so today I had a client call with a problem that should have been obvious, but wasn’t. Seems one of her users had reset her Google Apps password, and now the Outlook Sync Tool (GAOST) wasn’t working anymore. Further, there didn’t seem to be any way to reset that password – at least, nothing was prompting for it. Further, I couldn’t find anything on the Internet about how to fix this issue, so here it is:

  1. Close Outlook.
  2. Click: Start | All Programs | Google Apps Sync | Delete Saved Google Apps Password.
  3. Identify the profile you want to change and click Delete Stored Password. Then click OK when it tells you it’s been done.
  4. Close the application. You can click Cancel if you like – it doesn’t matter.
  5. Start Outlook (and make sure you’re using the correct profile, if prompted).
  6. A window should pop up giving you the opportunity to enter the new password. If so, do so, and click the Remember This Password box. If it doesn’t pop up… (and this was our issue today…)
  7. Check to see whether Outlook says “Offline” in the lower right corner. It probably does. Either way, check the File menu, and look for whether there is a check-mark next to “Working Offline”. If there is, click it to turn it off. If you don’t see “Working Offline,” you might need to click the double-down-arrow button which shows the options you haven’t used recently.
  8. Restart Outlook.

That’s it. Hope this helps someone else.

IT Purchasing Assistance: Finding the Right Technology for your Business

Tags: , , , , , , , , IT industry, IT Tips Baltimore

As a business owner, you are busy enough running your business and trying to turn a profit. You don’t have the time to track business technology advancements and determine if your business needs to upgrade its current hardware or software. Unfortunately, without a dedicated IT department handling these duties for you, your business may be quickly falling behind the competition. So what do you do?

Outsource your IT assessment and purchasing needs to Working Nets – your Virtual IT Department!

Our philosophy is that business owners should focus on their business, not on the tools that make it run. At Working Nets, our outsourced IT assessment and IT purchasing assistance services help your business find the right solutions for your hardware and software needs.

Benefits of a Technology Assessment and IT Purchasing Assistance

  • Identify your current strengths and learn how to better utilize the technology you currently have
  • Identify potential security risks and learn how to fix them.
  • Identify the new technologies – both hardware and software – you need to operate your business as effectively and efficiently as possible
  • Reduce your total cost of ownership!

Your network is at the core of your business. Ensuring that it is designed correctly and properly maintained, is at the core of ours. So contact Working Nets today and develop a plan for future IT growth and development!

If you have any questions about Outsourced IT Purchasing Assistance, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Department!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

DNS Changer Virus – Fix it NOW!

Computer Security Baltimore, IT industry

Back in March, I posted an important piece about the DNSChanger Malware, and the problems it was scheduled to cause if not fixed. In the end, the date was extended to this coming Monday (July 9, 2012). But on Monday, if you have the virus, and you haven’t fixed it, you’re going to discover that you effectively have no Internet.

One thing I’d like to make perfectly clear, because there’s been some confusion about it: If you have the malware on your machine, your loss of Internet is a function of that malware – it has nothing to do with your ISP blocking anything. Your DNS is what’s blocking it.

If you’d like to check on whether you have this nasty little buggy, click over to the DNSChanger Diagnostic page – it’ll tell you.

If you are affected, fix it, if you can, today. And if you can’t, call us – or whomever you use for your support services.

The Benefits of Outsourced Disaster Recovery :: Maryland IT Support

Tags: , , , , , , , , , , , IT industry, IT Tips Baltimore

With so much of your business relying on technology, you cannot afford to lose critical data. The outcomes could be disastrous to your business. In fact, of companies that had a major loss of business data…

  • 6% Survived
  • 51% Closed Within 2 Years
  • 43% Never Recovered!

So what do you do when disaster strikes?

Do you have a plan in place?

Don’t wait until disaster strikes to step back and look at what you could have done differently. Now is the time to act. Now is the time to address Disaster Recovery.

What is Disaster Recovery?

Disaster recovery is the process and procedures your business puts in place for the recovery of your technology infrastructure and critical data after a natural or human-induced disaster.

What is Outsourced Disaster Recovery?

Companies of all shapes and sizes – from small businesses to Fortune 500 companies – are beginning to realize the importance of disaster recovery. But what do you do if you cannot afford to hire an in-house IT technician?

You outsource your disaster recovery needs to Working Nets, your virtual IT department! We assure that your vital business data is available when you need it.

What are the Benefits of Outsourced Disaster Recovery?

  • It is often cheaper to outsource your IT needs than it is to hire an in-house IT professional. Plus, you can utilize an entire team of IT experts without having to pay a single salary!
  • There are no upfront technology or storage costs.
  • There are no hardware maintenance costs.
  • There are no software subscriptions.
  • Peace of Mind!

So do the right thing for your business and outsource your disaster recovery to Working Nets!

If you have any questions about Outsourced Disaster Recovery, please contact Working Nets by calling (443) 992-7394 or visit WorkingNets.com today!

Welcome to Working Nets – your virtual IT Deptartment!

At Working Nets, we support your business by providing top-notch Information Technology (I.T.) services to companies like yours: Companies that don’t need full-time I.T. services, but do need someone to turn to, when they are having a problem. We provide services like Network Design, Monitoring and Maintenance. We troubleshoot technical issues when they arise, and give you options for solving them. We help you use your technology investment to achieve your business goals.

At Working Nets, our focus is on your needs!

You can also follow us on Facebook, Twitter, LinkedIn, and Google+.

Sources:

Data Storage: 10 Compelling Reasons for Outsourcing Disaster Recovery

Outsourcing Disaster Recovery versus traditional in-house methods

Disaster Recovery Services FAQ

Disaster Recovery Guide

Google Drive Not as Useful as it Could Be for Small Business

Tags: Opinion

Google Drive is now one of those Google products that could potentially be of great value to small business… but it’s not really implemented in a way that would provide maximum usefulness to a business.

Google Drive is designed to be like Drop Box. You install a small client piece onto a computer, and then anything saved into its folder is quickly replicated to Google’s servers. From there it can be accessed via a web-browser, for remote document access, or even synced to the user’s home (or other) computer. Documents stored on Google Drive have versioning turned on as well, so you can easily access an earlier version of the document if you need to. In short, Google Drive can function as both an online backup system and a remote-access service. Not only that, but you can share documents with others, allowing them to read or even edit those documents, remotely. And the pricing structure is reasonable too. You can get small amounts of space for even $3.00 / mo. 200Gb only costs you $14.95/mo. That’s a decent amount of storage for a very small price-tag.

Security is… well, it’s as strong as your credentials. If you don’t share your username/password with others; if you don’t use easy-to-guess passwords, then the data is not accessible by the bad guys… unless, of course, they work for Google. Google’s servers, applications and ergo their system admins can technically get into your data and read your proprietary data. Their Privacy Policies say they won’t, but you ultimately have to trust them not to poke around in your data, or not be worried if they do. And if access to your data is subpoenaed, they can and will give it to the courts. So you have to be okay with that. If you’re not, this is certainly not for you.

But there are some other things about it that make it significantly less valuable to a small business, at least in my opinion. For one thing, the data must be housed in a \GoogleDrive folder substructure. You can point it at whatever base folder you like, but it will create a \GoogleDrive folder for its own use. That seriously limits some of the innate utility of the service, like using it to back up all your documents online. For many small businesses, 200Gb is plenty, and you can get more if you need it. But what difference does it make to Google whether I’m pointing it to C:\SharedDocs\GoogleDrive or pointing it to C:\SharedDocs? If the customers are paying for the data storage, they should be able to have it copy whatever data they want copied, right?

And then there’s the fact that it won’t run on a Windows Server OS. One of my clients has about 100Gb of data on his server’s data volume. He would like to have access to that data when he’s not in the office, and be able to allow some of his staff to access it remotely as well. We thought Google Drive might be a solution for him. But since we can’t run it on the server, we’re not really able to get this to work for him. Not only that, but when we try to run it from his workstation (WinXP SP3), and point it at the server shared drive, the client crashes. So it doesn’t work at all. I don’t know whether this would be more stable in Windows 7, but even so, he would have to leave his workstation on all the time, because we can’t run it directly on the server anyway.

So in summary, Google Drive has it’s place, but for many small businesses, it’s another almost-really-useful product by Google.