Cybersecurity Throughout History

What?s the Status of Today?s Cybersecurity Industry? At the time of this writing, cybercrime certainly does pay? it takes in at least $1.5 trillion in profits per year, and that number is still growing. Some projections anticipate it causing $6 trillion in yearly damages by the time 2021 rolls around. The cybercrime industry is worth $200 billion per year, and there?s been a 67 percent increase in security breaches over the span of the last five years. Phishing has grown in popularity to reach the top spot, targeting approximately 76 percent of all businesses. Phishing is a multi-purpose attack vector for cybercriminals, delivering ransomware or other types of malware, tricking the target into handing over sensitive data, or stealing credentials that allow them to access your data at their leisure. Making it an even worse threat, many who have been phished successfully don?t realize it until the ramifications set in. These attacks are responsible for the exposure, theft, or corruption of billions of records annually. It should be pretty clear at this point why businesses need to be concerned about cybercrime. However, cybercrime wasn?t always as huge of an issue as it is now. Cybercrime?s Origins Believe it or not, the global threat that costs economies trillions each year was once a simple research project. An individual named Bob Thomas realized that a computer program could potentially be able to travel across a computer network, leaving a trail behind. He designed a computer code that he nicknamed ?Creeper.? The aptly named Creeper was meant to traverse the ARPANET, moving from Tenex terminal to Tenex terminal, carrying its message: ?I?M THE CREEPER : CATCH ME IF YOU CAN? When Ray Tomlinson – the inventor of email – took notice of it, he created what was effectively the first-ever computer worm. He then wrote another code, named ?Reaper,? which hunted down Creeper and deleted it – effectively inventing antivirus. Leveraged By Criminals Cybercrime was once much different than what can be observed today. In the 1980s, Soviet hackers considered the benign applications that academics had designed, and speculated the same concept could be used to infiltrate other networks. By 1986, a German hacker named Marcus Hess successfully hacked into an Internet gateway that the University of California at Berkeley hosted. With this connection, he had reached the ARPANET. He ended up hacking a total of 400 computers, including some Pentagon mainframes, and planned to sell the secrets he had absconded with to the Soviet Committee for State Security, which translates to Komitet Gosudarstvennoy Bezopasnosti… otherwise known as the KGB. Through cooperation between the Federal Bureau of Investigation and the government of West Germany, Hess was caught, and became the first to be convicted of a cybercrime. He was handed down a 20-month suspended sentence. This just so happened to coincide with an increase in both connectivity and the severity of viruses, making the threat that a virus could pose much more considerable. Cybersecurity Software?s Development In 1988, software engineer Robert Morris tried to measure the Internet, but it didn?t exactly work out that way. His plan was to write a program that would spread to different networks, infiltrating Unix terminals, and replicate itself. The problem is, the ?replication? aspect was so efficient, it slowed down the entire Internet and had serious ramifications. […]

Expansion of Remote Work

Communication & Collaboration Solutions Remote workers would be useless without the ability to communicate with them. What good is an employee working on a task if they are not able to send what they are working on to you? Maintaining open lines of communication between you and your employees is crucial in maintaining an effective remote workforce. Employees should be utilizing tools such as email, chat platforms, video conferencing, and VoIP.  Employees also should have collaboration solutions within reach. Employees who are able to share files or work ?side-by-side? despite being hundreds if not thousands of miles apart, will benefit your business greater than an employee who is unable to collaborate with his team.  Project Management Tools Direction is important with any project. Keeping your staff up to speed and pointing them in the right direction doesn?t have to be difficult just because they are a remote worker. In fact, if utilizing a chat platform, employees often are able to stay on task more effectively. When a project manager requests an objective to be completed, employees can use their message as a checklist. Looming deadlines, along with a fluid schedule are triggers to work-related stress. Utilizing a reliable project management solution can make remote workers feel as though they are on a team, all working towards business success.  Cybersecurity If protecting your business from cyberattacks is important to you, then your remote workers should be well equipped before they access even a byte of data. Remote workers should be utilizing multi-factor authentication measures, and all software needs to be, and remain, up-to-date. A password management system would be classified as cybersecurity, especially when remote access is involved. These systems help prevent your data from getting into the wrong hands. Time-Tracking Software An important part of remote work is time entries. Without them, it is difficult to tell if your employees are actively doing their job. Let?s take a look at a hypothetical situation from a careless business owner. Billy, founder of Uncomfortable Chairs Inc. hired a remote employee to do his accounting. The employee promised productivity and efficiency but hasn?t been delivering. One day Billy decides to remotely access his station to examine what is going on. It turns out that his employee goes idle for hours at a time, regularly. This would have been easily noticed with reliable time-tracking software. Implementing time-tracking software can simplify tasks such as payroll, allowing you to spend the saved time on other business matters.  White Mountain IT Services has experts who can help your business simplify remote work technologies, as well as make your remote practices much more secure. To learn more, reach out to us at (603) 889-0800!

Tip of the Week: Five Tricks to Identifying a Phishing Attempt

Habits to Help You Foil Phishing Attacks Fortunately, once you and your staff have developed the following habits, the likelihood of a phishing attack fooling one of you diminishes greatly? but not entirely. Attackers are always coming up with clever and new ways to pull the wool over their targets? eyes, and there?s always the chance that you or one of your team members could miss one of the warning signs. This is precisely why it is so important to turn the following activities into learned, automatic behaviors. Check Links Before You Click Them Links are a wonderfully convenient thing, when you think about it – all you have to do to go to the website you want to visit is click on the right link. However, cybercriminals will put wrong links into their messages (often disguising them) in an attempt to take advantage of this tendency. You need to get into the habit of taking a moment before clicking through any link you see and simply hovering your cursor over it. This will display the URL the link directs you to, giving you the chance to confirm that the link is legitimate before clicking through. Know How to Spot Fraudulent Links  Speaking of whether or not a link is legitimate, there are a few warning signs that hackers are counting on you to miss. Let?s assume that you receive an email that appears to come from Amazon, offering some really impressive deals on some furnishings that your business could use, or some basic office supplies that always seem to be running low. The important thing is, it is something that definitely interests you? but is it actually coming from Amazon? As we said above, the URL can help you determine whether or not the message is legitimate. Where in the URL does the last ?dot? (as in, ?dot-com?) appear? In a legitimate URL, the last dot would be the last one in the domain.  [amazon.com/deals/offers] – As the last dot is the one in ?dot-com,? this link should be safe to click through. [amazon.com.deals/offers] – This URL should not be clicked on, as there is an additional dot after the domain. Check the Sender Who does the email actually come from? Sure, it might look like any other email from Amazon, or eBay, or PayPal, or whatever the case may be, but a skilled fraudster could have replicated their design with little trouble. What would be more difficult for them to do would be to hide the email address that displays in the header. Pay close attention, as these attackers have had to become really clever with how they disguise their trickery. Sometimes they?ll omit letters, so the URL still looks close enough to the real one to pass the ?quick glance? task. Quickly skim through this list: amazon.com google.com ebay.com payal.com reddit.com visa.com Did you catch the fake? If you didn?t, look again more carefully. Since our brains are expecting certain letters to be there, we can subconsciously insert them into what we?re reading.  Similarly, we can still read words that are scrambled up, so long as all the right letters are still there and the first and last ones are in place. In fact, that list could just have easily included the URL for ?papyal.com,? or some […]

Are You On the Lookout for Payment Card Skimmers?

Payment Skimming The fact that your credit card quickly and conveniently withdraws money from an account and transfers it in exchange for consumer goods is often overlooked. Most people in fact, don?t even bother verifying their account and the transaction that went through. This is an easily targetable characteristic associated with your average card-user. The way these users are typically targeted is through skimming.  Payment skimming is the act of discretely acquiring credit card information. What an attacker chooses to do with this acquired information is up to them. However, due to the lack of attention to detail and also fraud detection on high cost purchases, most attackers will withdraw small, unnoticeable amounts of money from a large amount of victims, rather than one lump sum of change. So how do they do this? Attackers will often add their own, home-made skimming device to a location where debit or credit cards are swiped. Every time a card is swiped, the skimmer collects information and adds it to the criminal?s to-do list. The criminal can do a number of things with this information, from producing a phony card which they can swipe wherever, or just making a fraudulent purchase. Your credit card information could even be sold on the Dark Web.  These skimming devices can be found on gas pumps, ATMs, or even made to be mobile. Here are a few tips on how to recognize if a skimmer is in place. Combatting Skimmers There are a few different means of protecting yourself from skimming attacks. Many of them are put in place by the card provider themselves. Many cards are equipped with computer chips to contain data, rather than a magnetic strip. This is a much more secure option. In 2015, a new law was determined: if a store decides against utilizing this more secure chip payment method, they themselves would be liable for the fraud that took place. This ruling convinced most business owners to update their POS infrastructure. Assuming your ATM transactions are safe isn?t wise. While you might think that these sorts of attacks don?t happen in your area, this ideology is foolish. Here are a few things you can do to reduce your risk of being a victim to a skimming attack. Where You Swipe is Important Before you decide to swipe your payment card, consider your environment. ATMs in the corner of a gas station are a lot easier for a criminal to attach a skimming device to. An ATM in a bank is in a much more secure, well monitored location. Plus, you won?t have to pay those outrageous ATM fees if you are using your own bank. Payment Has Gone Touchless Paying for consumer goods has gone touchless. You can use a mobile app, or another touchless payment option. This ensures that your magnetic strip on your card never comes in contact with a potential skimming device. Keep Your Card Another simple way to keep your cards secure, is by keeping a close eye on them. This doesn?t have to mean following your waitress up to her POS system and monitoring the transaction. It means do your best to avoid situations where a merchant needs to take your card away, out of sight. They could easily swipe your card in their skimming device […]

The Uses of Document Management in Manufacturing

Introducing document management, a system that can file away all your business? data and provide you with easy data retrieval without the headache of depending on other people to physically get the data for you. If your business has been in operation for years (or decades), documents can go missing and create inefficiencies. With the integration of a Document Management System, your business will immediately move faster. What is Document Management? The Document Management system (DMS) is basically a structured repository for all of your organization’s documents. It?s a simple concept that seems difficult to implement, but with today?s solutions, it?s easy for your business can keep all of its crucial data in one secure location. Here?s How It Works Once you decide that a Document Management System is right for you, you need to address some logistical problems. The first is where are you going to store all your information. You will need to procure file storage space inside your location or in the cloud. Next you will get all of your paper documents digitized. Using either scan-to-storage or data imaging, the DMS you choose will capture a document as an image and file it away in a pre-defined location.  When scanned, the images of the new documents are saved as PDF files, it provides users a way to search the DMS for keywords and metadata found on that document. With a DMS you will never have to have another filing cabinet. All of your data is stored digitally and searchable through the DMS.  What are the Benefits? The benefits of a DMS are substantial for manufacturers. Business moves fast and no large (or small) manufacturer can afford to deal with downtime. With a DMS, business moves faster. Some DMS solutions integrate with document signing applications providing built-in contract management. This keeps the supply chain constantly working for your company, and keeps it from working against it.  A full list of benefits includes: Reduction in physical space needed for storage Enhanced security with encryption Improved compliance with regulations Easy and fast retrieval of documents Remote retrieval for enhanced collaboration Easier redundancy for your organization’s business continuity efforts If you are a manufacturer that is searching for a way to centralize all of your documents in a reliable and secure document management system, call the experts at White Mountain IT Services today at (603) 889-0800.