Computer Network Security

2021 ransomware figures reveal a profound threat for SMBs worldwide

The security company SonicWall has reported just about 500 million ransomware attacks through September 2021 – a 148% increase compared to the data from the same time period last year. It is very alarming that approximately 714 million attempted ransomware attacks are expected by the end of 2021, a 134% surge overall of 2020. This

2021 ransomware figures reveal a profound threat for SMBs worldwide read more »

10 Tips for National Cybersecurity Awareness Month (October 2020)

This month, October 2020, is Cybersecurity Awareness month, co-led by the National Cyber Security Alliance (NCSA) and the Cybersecurity and Infrastructure Agency (CISA). Its theme, “Do Your Part. #BeCyberSmart.” is designed to empower individuals and organizations to own their role in protecting cyberspace. A key message of this theme is “If You Connect IT, Protect

10 Tips for National Cybersecurity Awareness Month (October 2020) read more »

How To Setup Your Workforce With a Secure Remote Access

COVID-19 pandemic made working remotely the new norm. Because of advances in mobile and networking technologies, employees are increasingly working from various locations, connecting to their offices online. This ability to work from anywhere can be a great benefit for employees who are looking for work-life balance as well as organizations that are committed to

How To Setup Your Workforce With a Secure Remote Access read more »

Did you know? Tax preparers must develop a written Information Security plan

Every tax professional in the US is a potential target for well-funded and technologically sophisticated cybercriminals who aim to steal your clients’ data. Often their goal is to steal data to steal your EFINs or CAF numbers and impersonate their victims and to file fraudulent tax returns. Cybercriminals use several avenues, including email, fax and

Did you know? Tax preparers must develop a written Information Security plan read more »

New Jersey Healthcare provider Hackensack Meridian hospital paid ransom to hackers to stop a cyberattack

The targeted ransomware event at Hackensack Meridian Health brought the computer network systems down last week, resulting in interruptions across its IT network, including Carrier Clinic in Montgomery and three sub-acute facilities. The Edison-based healthcare company said it had insurance to help cover the costs associated with cyberattacks, including payment, remediation, and recovery efforts. The

New Jersey Healthcare provider Hackensack Meridian hospital paid ransom to hackers to stop a cyberattack read more »

Businesses suffer brand damage, loss of productivity, and vicious costs of cyberattacks

Cyberattack cleanups now come with a sticker shock: increase of 52% now brings the estimated amount to $1.1 million, with potential to increase even further, to a staggering $1.67 million, according to a recent Radware’s 2018-2019 Global Application and Network Security Survey Report, which analyzed vendor-neutral data from 790 IT executives. Cyberattacks not only kill

Businesses suffer brand damage, loss of productivity, and vicious costs of cyberattacks read more »

Beware of Man-in-the-Middle (MitM) Attacks: Network Traffic Hijacking

Mass hijackings of network traffic and it’s abuse is not new, but with the evolution of technology, so do Man-in-the-Middle type of attacks. A man-in-the-middle attack is an exploit that occurs when an outside attacker intercepts communications between two parties, often a website and an end user. The intruder will usually use the information to

Beware of Man-in-the-Middle (MitM) Attacks: Network Traffic Hijacking read more »

What SMB Owners Should Know About Patch Management protocol in IT Security

As a small/medium business owner, patch management may be a somewhat foreign topic reserved for your IT personnel. The following provides a summary-level background of patching, which is relevant to business owners in maintaining appropriate security disciplines in their companies. What is a patch? A patch is a set of changes to a computer program

What SMB Owners Should Know About Patch Management protocol in IT Security read more »

How Do You Ensure Your Business Email Does Not End Up In The Wrong Hands?

Communication is one of the most important key aspects of any properly functioning company or organization, and businesses today rely on email as a principal method of communicating with staff members, partners, and clients. While your email infrastructure plays a critical role in the operation of your business, it is also a gateway that can allow

How Do You Ensure Your Business Email Does Not End Up In The Wrong Hands? read more »

Do You Have a Cybersecurity Program for Your Small/Medium Business?

As a small/medium business owner or manager, it is imperative that you have an awareness of cybersecurity related-risks and implement infrastructure and processes to mitigate those risks.  According to Verizon’s 2018 Data Breach Investigations Report, 58% of breach victims are categorized as small businesses.  Roughly 75% of these breaches are perpetrated by outsiders, while approximately

Do You Have a Cybersecurity Program for Your Small/Medium Business? read more »

[ALERT] 500,000+ Consumer Routers Infected with VPNFilter Malware

Hackers are possibly working for an advanced nation have infected more than 500,000 home and small-office routers around the world with malware that can be used to collect communications, launch attacks on others, and permanently destroy the devices with a single command, researchers at Cisco warned Wednesday. The malware named VPNFilter is a modular, multi-stage

[ALERT] 500,000+ Consumer Routers Infected with VPNFilter Malware read more »

Bad Rabbit affecting networks and data across the globe

Bad Rabbit, a new ransomware, has been quickly spreading across networks in Europe. If this sounds familiar, you are correct – Bad Rabbit is almost identical to previously infamous malware variants WannaCry and Petya infections that wreaked havoc across networks in Europe earlier this year. If you weren’t affected by those before, you probably know someone who was, or have heard

Bad Rabbit affecting networks and data across the globe read more »

How printers can be the weak links in security – and how to address it

It’s easy to overlook printers when planning for cybersecurity for your business. Consider this: In 2016, HP reported that 18% of respondents to their survey reported security issues associated with printing devices, while 91% associated the risk with PC devices, 77% – with Mobile devices, and 77% with server devices. However, in reality 64% printers had

How printers can be the weak links in security – and how to address it read more »

Ignore these 4 aspects, and your Computer Network is vulnerable to cyber attacks

Cybercriminals are always looking for the weakest link in a network to crack the security of your business, hack your systems, and get confidential information. Some hackers do it because they can – and enjoy – spreading malware and damaging systems and data, while others do it for bragging rights, or to demand ransom. Regardless of

Ignore these 4 aspects, and your Computer Network is vulnerable to cyber attacks read more »

Be on alert: a new Ransomware outbreak quickly spreads throughout the world

In May of 2017, a WannaCry Ransomware – a malicious computer virus – affected over 200,000 systems in 150 countries all over the globe. A type of virus such as WannaCry blocks access to files on a computer while cybercriminals demand a monetary ransom to decrypt the files and grant access to user data. On June

Be on alert: a new Ransomware outbreak quickly spreads throughout the world read more »

White House Cybersecurity Executive Order: Risk Mitigation by SMBs

On May 11, 2017, President Trump issued an Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure designed to bolster security associated with the U.S. federal government’s information technology. Abdul Hammad, powersolution.com’s Chief Information Security Officer (CISO) and a member of the U.S. Secret Service New York Electronic Crimes Task Force,

White House Cybersecurity Executive Order: Risk Mitigation by SMBs read more »

Growing Cybercrime Trends Every Business Should Be Aware of

When you hear the word “cybercrime”, what comes to mind? Credit card numbers theft? Hacking into your computer? There are several different types of cybercrime, and they are growing at an alarming rate. Hackers are no longer some anti-social loners who crack the code for bragging rights – hacking came of age and is maturing

Growing Cybercrime Trends Every Business Should Be Aware of read more »

U.S. Government Seeks 35% Increase in Fiscal 2017 Cybersecurity Budget

Earlier this year, President Obama submitted a proposed budget increase of 35% to $19 billion of Federal resources as part of the  Cybersecurity National Action Plan. The administration’s comments included stating that cyberthreats “could lead to widespread vulnerabilities in civilian infrastructures and U.S. government systems.” The Pentagon is looking for $34.7 billion for the period

U.S. Government Seeks 35% Increase in Fiscal 2017 Cybersecurity Budget read more »

2015 demonstrated how vulnerable organizations are to hacking – [Charts]

As most of you know, the HIPAA Breach Notification Rule, 45 CFR §§ 164.400-414, requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information. Similar rules apply to vendors of personal health records and their third party service providers, pursuant to section 13407 of the HITECH

2015 demonstrated how vulnerable organizations are to hacking – [Charts] read more »

How to Secure Your Small or Medium Business Data? Utilize Layered Security Techniques

Securing small or medium business data has become increasingly challenging as malicious cybercriminals and hackers have become more sophisticated and ubiquitous.  Routinely, press articles are releasing stories of data breaches, lost customer records, financial losses due to cyberattacks, and company embarrassment.  Additionally, hacking techniques have evolved to multi-stage techniques.  This means that an initial system

How to Secure Your Small or Medium Business Data? Utilize Layered Security Techniques read more »

Another wave of fake American Express security emails phishing for your personal information

Just in the recent days, I have received a large number of emails (most are not even addressed to me) that represents a small drop in millions of fraudulent, phishing emails that are circulating the web, hitting unsuspecting users’ email inboxes. I have inquired with few of my friends and colleagues, and searched the interned

Another wave of fake American Express security emails phishing for your personal information read more »

Got an innocent-looking email? Businesses and even local government are falling prey to this one!

You may have received an innocent-looking email. Something that feels official. Like a bill, or an account update, or your bank’s notice. It looks legit. But once you open it, a ransomware takes control over your computer, demanding a sum of money in exchange for your data. Our IT Support Plan secures your Business Computer

Got an innocent-looking email? Businesses and even local government are falling prey to this one! read more »

Virus and scam alert: beware the “Your spouse was found in the Ashley Madison list” subject line

As you may know from the news broadcasts, last week 36 million names, addresses and phone numbers of registered users at the Ashley Madison site (which makes it easy to cheat on your spouse) were posted on the Internet. All these records are now out in the open, exposing highly sensitive personal information. Internet criminals

Virus and scam alert: beware the “Your spouse was found in the Ashley Madison list” subject line read more »

Are you ready to pay the Ransom for your private or business data?

In 2014, CryptoWall, a new and improved copycat version of CryptoLocker has exceeded  in infection rates, and now in 2015 they are making new waves around the globe, infecting more computers. Crypto virus family is a malicious program known as ransomware, making rounds typically hitting computers via email attachments or via botnets, demanding money from

Are you ready to pay the Ransom for your private or business data? read more »

7 reasons to worry about Trojan viruses, and 1 more reason to worry right now

I am typically busy during my day, sending and receiving tons of email and browsing multiple resources on the web during my research hours.  I feel my computer is safe while I am at it – I have a killer anti-virus protection on my computer network (Thanks to our partner ESET for keeping it safe,

7 reasons to worry about Trojan viruses, and 1 more reason to worry right now read more »

How to Minimize Risk with your Employees BYOD – laptops, phones and tablets

Some of today’s BYOD – “bring your own” mobile devices are not always company-owned. You may think it saves you money by not buying devices for your employees – but it also means that your IT department can’t always control what takes place when your employees use the devices – at work or at home.

How to Minimize Risk with your Employees BYOD – laptops, phones and tablets read more »

Small Business Falls Prey to Cyber Crime – Pizza shop hacked in Ohio

Here is a perfect illustration to Mistake #5 from our previously published Are You Too Trusting? 5 Common Computer Security Mistakes every SMB owner makes blog article. For those of us who think that small business owners should not worry about becoming cyber-crime victims, a news comes from Marysville, Ohio: a report from a private

Small Business Falls Prey to Cyber Crime – Pizza shop hacked in Ohio read more »

Ransomware – fake FBI Moneypak SOPA virus malware

Ransomware (also known as cryptoviruses, cryptotrojans or cryptoworms) comprises a class of malware, or a virus which restricts access to the computer system that it infects. In addition it demands a  payment, which is basically a ransom in order for the restriction to be resolved. Complexity of ransomware varies:  from basic HTML pages acting as

Ransomware – fake FBI Moneypak SOPA virus malware read more »

So, you think your “Hard-To-Guess” passwords are safe?

2 years ago, in 2010 Imperva report identified the most commonly used passwords; here are top 5 that discovered by analyzing 32 million passwords exposed in the Rockyou.com breach. 123456 12345 123456789 Password iloveyou Now, in 2012, Eset released a new report based on the 6 million, and top 5 include: password 123456 12345678 1234

So, you think your “Hard-To-Guess” passwords are safe? read more »

Fixes recently implemented for some of Chrome’s security vulnerabilities

As you may have heard/read by now, Chrome fixed 20 security vulnerabilities for it’s 20.0 version. 20/20, if you will. But wait! Aren’t you  amazed (I know I am) that one-digit decimal is no longer heard of when it comes to new releases of software. As consumers, we are used to things that can be

Fixes recently implemented for some of Chrome’s security vulnerabilities read more »

Mac Users, Beware: the Return of Flashback Mac Trojan

Security firm Intego is warning about new variants of an “insidious” Trojan that aims to steal information that can exploit user identity details from Mac users. How  Flashback Mac Trojan infects Macs Methods of infections depend on the version of the Flashback. The previous version of malware has several methods of infection, and aims at

Mac Users, Beware: the Return of Flashback Mac Trojan read more »

BYOD – a compromise between security and convenience.

Bring Your Own Device (BYOD) is here. 60% of companies are enabling BYOD, according to a July 2011 Forrester Research survey. There is an explosion of mobile devices in the enterprise – devices both corporate- and personally-owned. Mobility boosts employee productivity, but it also opens the doors for security, legal and privacy concerns. Devices security,

BYOD – a compromise between security and convenience. read more »

Major Computer Attack – warns DHS

Cybersecurity experts have long warned that computer hackers could potentially target electric power sources, such as power plants and electrical grids, and that these attacks could affect vital infrastructures, including hospitals and water treatment plants. Department of Homeland Security Secretary Janet Napolitano said at the cybersecurity event sponsored by the Washington Post, that a major

Major Computer Attack – warns DHS read more »

Spitler Pleads Guilty – 16,000 New Jerseyans Affected by Hacker

As reported today by various sources, on June 23, 2011 in Newark, Daniel Spitler, 26, of San Francisco, California, pleaded guilty in federal court  to hacking into AT&T’s computer servers last year and stealing the e-mail addresses and personal data of about 114,000-120,000 Apple iPad users, out of which 16,000 belong to New Jersey users.

Spitler Pleads Guilty – 16,000 New Jerseyans Affected by Hacker read more »