The DBIR has its own system of outlining breach types that divide events and incidents into nine categories. Information-based companies appeared predominantly in four of them, with helpful tricks to prevent such breaches from happening again. Crimeware: Perhaps unsurprisingly, one of the industries crimeware targeted most was the information industry, with the DBIR citing a rise in ransomware (39 percent of all analyzed attacks in 2015 involved ransomware). While the scope the DBIR funnels under the Crimeware title is fairly large (?This covers any use of malware that doesn?t fall into a more specific pattern?), this by no means cheapens the risks – it arguably compounds them, as it only goes to show how many pieces of crimeware exist. To defend against them, the DBIR recommends frequent patches and backups as well as monitoring changes to configurations. Web App Attacks: Considering that 95 percent of web app attacks were financially motivated in their reports, it?s no surprise that e-commerce platforms were among the most targeted by these intrusions. These attacks are often the result of a successful phishing campaign or the infiltration of a vulnerable site. The other side of web app attacks, content management system breaches, saw plenty of digital graffiti and the repurposing of infiltrated sites as phishing sites. To avoid this kind of breach, the DBIR again recommends timely patches to remove vulnerabilities, as well as utilizing two-factor authentication and input monitoring. Cyber-espionage: Usually hunting for intellectual property, cyber-espionage attacks prefer sticking to tried-and-true methods of breaching networks, only utilizing more sophisticated methods if the simple ones don?t work. Therefore, at least in this case, basic protections may be enough to divert many of these attacks, and should not be bypassed in favor of more specialized protection. As far as avoiding issues further, keeping patches up-to-date and monitoring changes to configurations will help monumentally, as will isolating compromised devices and separating them from the rest of your network. Miscellaneous Errors: This category took all of the ?Whoops!? issues that lead to compromised security into one bundle to deal with them. While Verizon reports that 40 percent of them were caused by a server issue, many others were triggered by employee mistakes – a full 26 percent included sending a message filled with sensitive data to the wrong recipient. The DBIR suggests strengthened controls on your network as a possible way to keep away from errors, such as data loss prevention software to lock down sensitive info. Additionally, Verizon recommends thorough disposal procedures to any aged-out equipment, as well as to stay focused and learn from the mistakes from your past. Helpful information, certainly, with all that and more being available for free download at the Verizon Enterprise webpage. But big picture – what takeaway can you not afford to leave on the table? Ultimately, an overwhelming percentage of incidents reported in the DBIR pointed blame, or at least prime responsibility, for many of the errors that led to security breaches to one thing: human error. Between the willingness to exploit the natural fallacies of human nature by cyber criminals and the human tendency to make mistakes independently, human beings are placed solidly as the weakest link in any cyber security chain. So, if humans are the problem, what is the solution? In short, vigilance. Strongly enforce best […]
Virtual DesktopsHave you ever used a virtual desktop before? Basically, it lets you open up multiple desktops on your machine, which can be used for different things. This is helpful if you want to spread out your use of apps and windows, rather than cram them onto one desktop screen. To open a new virtual desktop, click the Task View icon next to the Cortana search bar in the taskbar. Then, select the New desktop feature in the right corner of the screen. If you want to move an app to a different virtual desktop, just click it and drag it like you would a file. Advanced ScreenshotsIn Windows 10, you can take screenshots quickly and efficiently. One shortcut that you can use is to hold down the Windows key and press Prt Scn. This will capture the entire screen and place the file in a Screenshots folder. Alternatively, you can use Alt + Prt Scn to copy the screenshot to your clipboard, for use in an image editor. You can then use Windows 10?s built-in Snipping Tool to customize your screenshot. We want to add that this is particularly useful for communicating with tech support, as more often than not, a visual representation of what?s happening on your screen can be beneficial toward resolving whatever your problem is. Record Your ScreenWindows 10?s new Xbox app allows users to record their screen, perhaps to give a tutorial or simply to record whatever you?re doing for later review. Launch the Xbox app and open the app that you?d like to record. Once you?ve done that, all you have to do is press Windows + G. You?ll be shown the message, ?Do you want to open the Game bar?? Check the ?Yes, this is a game? option, and hit the record button. Whether it?s a game or not is irrelevant; it?s just a cheap and easy way to record something on your computer. Battery SaverIf you?re using a Windows 10 laptop or tablet, you can customize when the Battery saver mode turns on. Normally, it will kick on once the battery has reached 20 percent, but you can set your own preference. To do so, go through Settings > System > Battery saver. If you can?t take advantage of these Windows 10 features because you don?t yet have Windows 10, we want to remind you that it?s not too late to claim your free version from Microsoft. You have until July 29, 2016 to claim it, but only do so if you?ve already thought about the migration process. Otherwise, you could accidentally bring about downtime and incompatibility with legacy applications. By using these four tips, you can take full advantage of Windows 10 and perhaps even take advantage of your operating system in new and unprecedented ways. What are some of your favorite Windows 10 features? Let us know in the comments, and be sure to subscribe to our blog for more great tips and tricks.
Security researcher Yang Yu of Tencent?s Xuanwu Lab, discovered the vulnerability, earning a $50,000 reward and allowing Microsoft to release a fix in their security bulletin MS16-077. While Yu has largely remained mum on the details of BadTunnel, he plans to share more on the topic during the 2016 BlackHat Conference in Las Vegas, July 30-August 4. While little is known about this vulnerability, it has apparently been darkening the doors of Windows users for quite some time, as all versions released during the past 20 years have been affected. Scarier still, the attack doesn?t discriminate between programs or their versions, featuring ?compatibility? with all versions of Internet Explorer, Microsoft Office, Edge, numerous third-party softwares, Web servers, and USB drives. We will keep tabs on this story as it develops and keep you updated as more information becomes available. Keep reading the White Mountain IT Services blog for more security news and announcements.
The Antikythera mechanism is thought to have been discovered at the turn of the 20th century, by sponge divers off the coast of the Greek island Antikythera. It?s dated at having existed sometime between 60BC and 200BC, which makes it well over 2,000 years old. It was found aboard a shipwreck, submerged in 45 meters of water, along with several other treasures, including statues, coins, and pottery. At first, it seemed to be nothing but a pile of bronze and wood, but upon closer inspection, the machine turned out to be something quite extraordinary. Consisting of bronze gears, the Antikythera mechanism attempted to predict astronomical cycles. The device was originally found in one big clump, but the device was later split into three sections for study. It?s thought that the mechanism, in its prime, consisted of up to 30 bronze gears that operated like clockwork. Click here to view a photo gallery of the Antikythera mechanism on display. Now, the Antikythera mechanism is in about 82 different pieces, which were used in a study to determine what the cryptic text carved into it means. The inscription on the gears is so small that not even the human eye can truly decipher it – not after thousands of years of corrosion and weathering from the elements, at least. Researchers had to use x-ray and visualization technologies to make out what some of the Greek letters could mean. The Antikythera mechanism was first thought to be a device that was purely scientific, but more recent innovations have discovered that its use might also be grounded in astrological meaning. It?s possible that the color of eclipses meant something on a spiritual level to the Ancient Greeks, and that the Antikythera mechanism was a way to further understand how the world far above the surface of the Earth worked. The Antikythera mechanism is currently on display in the National Archaeological Museum of Athens, where it continues to be studied and theorized about. The thought of such advanced technology existing so many years ago brings up several interesting points. Today?s society is often credited as being the most technologically advanced of its kind, but back in Ancient Greece, the Antikythera mechanism was considered high-tech. The ability to make an astronomical clock was hundreds, maybe even thousands, of years ahead of its time. Knowledge of how to make a contraption like this was lost and wasn?t recovered again until much later on, sometime during the 14th century. It makes you wonder what other civilizations before ours came up with, and how much of it was lost to the harsh ebb and flow of time. So, what does this have to do with your business? We want to say that it presents an interesting take on innovation, but honestly, as tech geeks, we just wanted to share this cool tidbit with you. For more great technology news, tips, and tricks, be sure to subscribe to our blog.
You can download your Facebook data to your device, but your reasoning for doing so could be anything. Maybe you want to have a backup copy of your data stored locally, or perhaps you?re working on a project, like a graduation collage, that requires you to pull out every photo under the sun. Of course, the most likely reason that you?d want to do this is if you?re completely fed up with Facebook, and you want to close your account. Unless you download your data, all of your information would be lost, which means countless years of Facebook activity lost to the ages. Regardless of your reason for downloading your data, Facebook makes it easy. Although, Facebook has no reason to really make downloading your data difficult, considering how they own pretty much anything that you upload anyway, whether you download it back or not. Is it too late to suggest discretion when choosing what you post on Facebook? Anyway, to get started, log into Facebook and go to Settings. You?ll see Download a copy of your Facebook data right underneath General Account Settings. Click on it, and you?ll see Start My Archive. This lets you select a place to store your information, like if you try to download something off of the Internet. You?re choosing a folder to download your Facebook data to, so make sure that it?s a secured folder since your Facebook data probably contains at least some sensitive information. Granted, you might be wondering what kind of information is downloaded to your archive. Facebook explains: ?This includes a lot of the same information available to you in your account and activity log, including your Timeline info, posts you have shared, messages, photos and more. Additionally, it includes information that is not available simply by logging into your account, like the ads you have clicked on, data like the IP addresses that are logged when you log into or out of Facebook, and more.? Depending on how heavily you have used Facebook over the years, you might be looking at a rather large download. However, downloading all of your data in one sitting is probably going to be more valuable and convenient than going through each individual post and manually selecting what you?d like to download. For more great tips and technology tricks, be sure to subscribe to White Mountain IT Services?s blog.