Archive | Security RSS for this section

Unscheduled critical Windows Server update released

While last week was the scheduled “patch tuesday” for November and saw major exploit patched, another has been patched today. The patch will fix the unnamed Elevation of Privilege issue for Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2. We recomend all clients apply the patch. The bulletin ID is MS14-068.

Flash and AIR updates available as Adobe addresses 18 vulnerabilities

Users of Adobe Flash should download the latest version 15.0.0.223, after numerous bugs were patched, many of which were given a priority rating of “1”, which means that the vulnerability has a higher risk of being targeted by an attacker

Source: Adobe

The weakest link in Two Factor Authentication: Your Phone

When we configure Two Factor Authentication for customers the most convenient way to do it is using SMS or an app on their phone. You almost always have your phone with you and its easy to use as second form of authentication. However many users do not have their phone secured. If your phone has any authentication methods tied to it, or has any important data on it for that matter you need to secure it with a PIN. While a PINB adds a delay in accessing your phone it ensures someone who picks up your phone cannot easily use it to circumvent your Two Factor Authentication.

Two Factor Authentication, what it is and why you should use it

Think no one can guess your password? Maybe not but the likelihood is more on the side of “maybe so.” Adding a “Two-Factor Authentication” will better protect you and your online life. Enabling these services adds an extra layer of protection to your accounts.

You can also think of them as deadbolts to your online house. These features significantly improve the security of your accounts because they require something only you will know or have, like a personalized code or PIN and your phone.

Even if your password gets stolen, it will be more difficult for someone to access your account if you’ve enabled these services.

Two-factor authentication (also referred to as two-step or multi-factor authentication or verification or 2FA) is an overly technical-sounding term for a simple solution.

It’s a security tool that uses multiple verification techniques to prove that the person attempting to log onto an account is really them.

Some of these methods include:

  • Something you know: a password, code, passphrase or PIN
  • Something you have: a physical token, chip, fob, or phone

These methods provide an extra layer of security. Most people only have one layer – their password – to protect their account. But combining something you know (your password) with something you have (your phone, token, etc.), makes your account even more secure.

There’s no universal method, but most web services that offer account protection beyond the password require the use of a phone, email account, physical device (token, chip, fob, etc.), texting service, your knowledge of a social networking account, etc.

Here’s how many services typically work:

  1. You enter a phone number or an alternate email. (This is a way for the online service to contact you when you want to access your account.)
  2. The service provider generates and sends you a verification code. This code is only good for one use – otherwise it would be just like a password!
  3. Once you receive the code, you enter it in, along with your username and password and gain access to your account. (This step can vary depending on the web service you’re using.)

Here are step-by-step instructions on some popular platforms:

Email Providers:

Social Networks:

Change your DropBox password immediately

Dropbox users should update their passwords and enable two-factor authentication. A hacker is claiming to have collected 7 million usernames and passwords.

To change your password, log in to your Dropbox account, click on your name and choose “settings.” Then, click on the security tab. If you have not already configured it, configure for two factor authentication.

At this time Dropbox states they have not been hacked and that any information collected is from third party apps.

 

OneDrive for iOS8: PIN Support and more

A majority of mobile phone users are storing at least some data in the Cloud, with the explosion of growth Office365 many of our customers are storing sensitive information there and accessing it from their iPads and iPhones.

Microsoft has recently updated OneDrive for iOS8 to support a PIN. Enabling this feature will add another layer required to access your files with your OneDrive app for iOS. We cannot strongly enough stress the importance of securing company data that is accessible from private devices that can be easily lost or stolen.

In addition to this change Microsoft has made the app make better use of the new larger 4.7″ and 5.5″ iPhone 6 screen sizes.

Source: OneDrive Blog

My computer is infected with what??

We have been asked for a cheat sheet to quickly explain some of the terms our staff and other companies staff are using are when explaining your workstation is infected:

Common types of Malware designed to harm your computer, such as viruses, worms, Trojan horses and rootkits.

  • A computer virus is a program that attaches itself to an application or “host file” and then spreads by making copies of itself. Some type of human action (e.g. opening an attachment) is always required for a virus to take effect. Once a virus gets onto your computer it might modify, delete, or steal your files, make your system crash, or take over your machine.
  • A computer worm is like a virus, but it infects other computers all by itself, without human action and without a host file. It usually infects other computers by sending emails to all the names in your email address book.
  • A Trojan horse is a program that tricks you into running it by appearing useful or harmless. However, once it is run it damages your computer, usually by providing “back door” access to the computer. This allows hackers to control or use your computer, destroy or steal files, install viruses or spyware, or run arbitrary programs.
  • A rootkit is a program that allows an intruder to gain access to your system without your knowledge by hiding what it is doing on the system. The intruder can then install difficult-to-detect back doors into your system to seize control.

Cyberattacks & Malware: The Culprit are working with you.

Everyone is aware of Malware and cyberattacks today. The media covers every credit card breach and every security loophole discovered. But the reality for many businesses is that the blame for security breaches lies inside the office. Criminals in faraway countries may design and launch the attacks, but their success is often due more to human error than technology.

While your business can and does implement technology to limit the companies vulnerability to a wide variety of attacks, technology isn’t your only line of defense. Numerous studies indicate that cyberattacks are often successful because company employees let the attackers in.

A 2014 study conducted by IBM found that in 2013, human error was involved at some level in more than 95 percent of security incidents. The most common “mistake” was an employee clicking on a malicious email link that compromised the corporate defenses in some way.

The very best defense today is employee vigilance. We cannot stress enough that each employee with access to company resources be aware of Malware and that you company have an email policy that helps employees determine unsafe emails.

Apple releases OSX patches for Bash bug vulnerability

Today Apple has released patches for each version of OS X, these should applied ASAP:

OS X Mavericks

OS X Mountain Lion

OS X

Beware of Ransomeware

The rate of malware (ransomware) attacks on small businesses climbs at an alarming rate. The security firm McAfee warns that soon, attacks that come through social platforms will be “ubiquitous.”

You get an email that looks legitimate say from a FedEx, UPS, USPS or any other lookalike that has a zip file attachment in it. Inside the zipped file, like an unsuspecting nightmare, hides a double-extension file such as .pdf.exe. This is not a PDF document but an executable that if clicked on, will allow CryptoLocker to run on your computer.

CryptoLocker01

Now you might be asking what damage does this thing do? Once installed on your computer, CryptoLocker encrypts files on your computer’s local and mounted network drives by using RSA public-key cryptography while the private key is actually stored on the servers controlled by the malware. In other words, once the file is encrypted, you cannot access it. It is like putting all of your important stuff into a safe that is impossible to open without a key and then hiding the key so you can’t access the contents. In order to get the files decrypted and accessible again, CryptoLocker displays a “ransom” payment message with a strict deadline. If you pay with Bitcoin or a prepaid voucher within the deadline, your files get decrypted. On the other hand, if the payment is not made within the deadline, the price for decryption increases or your files stay forever encrypted. The encryption is so complex that experts say that it is close to impossible to break, so if you do not have a proper backup, the files are non-recoverable. It is discouraged to pay the ransom because it encourages the attackers to continue to do harm. There have been reports that files unlocked become relocked after a period of time.

The best thing to do is prevent the infection in the first place by not opening any emails and attachments if you are not sure where they came from or if they look suspicious. FedEx or UPS is not going to ask you to download a zip file, so if something appears strange, it probably is. If you do accidentally click on something, make sure to pay attention to the file and do not open a double-extension file (such as recipt.pdf.exe). As always, having updated antivirus software is extremely important.