IMPORTANT BULLETIN FROM CCSI : Client Network Security Protection March 23, 2015
In an ongoing effort to bolster the protection of its client networks, Creative Computer Solutions has formed a partnership with two leading security defense companies.
The OpenDNS system provides a service that allows CCSI to detect known threats to a client network before they can cause harm. In the event that a new threat or variant gets released, OpenDNS can help keep harm to a minimum by blocking the infected computers access to the Internet or do more harm. The OpenDNS system works on PCs, Macintosh and Mobile Devices. For more information visit https://www.opendns.com/
Webroot is being added to the CCSI arsenal against viruses and malware. Webroot is a revolutionary Anti-Virus program that can work alongside other traditional Antivirus products. Now we can have two programs actively engaged on each client system to help prevent malware and viruses. For more information about Webroot visit http://www.webroot.com/.
Webroot is being bundled for free with all CCSI Managed Services Plans and OpenDNS is being offered as an add-on for a small monthly fee.
For more information about the new products and how they can help your company give me a call.
IMPORTANT BULLETIN FROM CCSI : CRYPTORLOCKER VIRUSES November 19, 2014
We have been seeing a huge upswing in the number of incidences of the Cryptolocker type of viruses.
I did some research a few months back and there are a bunch of ways we can all act to help keep the number of threats down.
The one common way to help protect from viruses was through user education and having proper office policies to limit access to personal email and personal websites such as Facebook and Social Media.
The #1 way to protect your networks from a virus is through user education. Please let all of your staff know that there is an upswing in virus activity and to be extra vigilant.
For the clients we have on external Hard drives with Backup Assist or other software, you are vulnerable and need to make sure that you are swapping the drives out daily. The external drives only take you back a few days, so they are not the optimal way to back up your data. Our clients on the Vault and Anchor systems are best protected out of all of our clients as we have good point in time recovery.
Below is a sample email that you may want to use with your staff, or modify to suite your needs:
There has been a huge upswing in virus activity on the internet as of lately with many companies being attacked by a Crypto-virus. This type of virus attacks the user computer, then goes after the networks that it is attached to. It encrypts all files so that they are no longer recoverable.
Here are some ways to protect yourself
- Do not open emails from people that you do not know
- If you are not expecting a file attachment from someone in email, do not open it.
- Do not Open music or video files if you are not expecting them from others
- Never pass along an email that you are not sure where it came from. The Holidays are fast approaching and the “Holiday” funny greeting cards are notorious for passing viruses along. Along with that. Do not open “Holiday” funny emails.
- Do not perform an any updates on software that you are not sure about
- When going to a website, if another website opens other than the one expected, immediately close your browser
- If you receive a pop up that your computer is infected and it asks if you want to clean it, immediately shutdown your computer and let your local IT contact know to submit a ticket to email@example.com
- If you are unsure, ask your network administrator or call CCSI and we can help you decide
<End of Bulletin>
IMPORTANT BULLETIN FROM CCSI REGARDING YOUR BACKUP SYSTEMS
The following bulletin is for the purpose of education of our clients and to continue or start conversations around data integrity, backup and recovery of your critical systems. Most of our client have these conversations on a regular basis with us, but we need to share our the news.
Many of our clients use USB drives and or Network Attached Storage to backup their computer networks.
- Verify that you are taking a full backup of your data offsite each day. If you are not the person responsible for that task, have a conversation with them about the importance of having the disks taken offsite every day.
- Test your backups regularly, offsite and on another computer other than your server
- Increase the number of drives that you are taking offsite each day, we are recommending that you have four FULL copies at a minimum moving forward. One at your office and three full copies offsite. How far back would you like to go back if all of your data disappeared tomorrow? How much would it cost you to re-enter all of your information?
- Please consider putting money into your budget to replace your USB based backup system with an automated offsite system that requires no user intervention
Why this bulletin now?
There has been a new variant of a well known virus called Ransomware or Citadel released that when a server is infected, it encrypts all of the files on the server and all the files on any attached drives. This includes your data and any backup drives that are attached to the server. It may also be a dormant attack where the files are all encrypted, and it is just waiting for a time and date to activate. This would cause all of your backups to be useless after that date. It is imperative that you have a conversation about your backup system with us immediately if you have a USB or NAS based backup system. There is no recovery from this threat. All data would be gone and all attached backups would be destroyed.
If you are taking drives off-site, you need to both increase the number of drives you are using for backup, and you need to ensure that a backup is taken off site each day. The virus is very virulent, and there is no way short of a full backup set recovery and server rebuild to recover from this threat. Your server and all of it’s data would be destroyed if you were to be infected.
There really is no 100 percent protection against computer based threats, malware and data destruction. It is about mitigation of risk, how much risk do you allow your company to be exposed to, and your budget for protecting your company assets from harm.
For more information about this virus, backup systems and data protection please call our office to discuss with myself, your primary network engineer, or any of our other staff.
Resources are also available online to educate yourself of the latest threats at the following sites:
Federal Bureau of Investigation at www.fbi.gov
Internet Crime Complaint Center (ic3) at www.ic3.gov
Internet Crime Complaint Center Latest Bulletins http://www.ic3.gov/media/default.aspx