COVID-19 Pandemic Exacerbating Cyberthreats

Unsecured Networks A lot of people are working remotely. In fact, one study showed that 58 percent of all knowledge workers–which are workers that deal in information–are now working remotely. With so many people being asked to work remotely, and no time to plan out a strategy to get them secured, many employees are working with unsecured access to company resources. In fact, unsecured remote desktops have risen by over 40 percent. This is a major concern, because cybercriminals can use brute force methods to gain access to a desktop. If that desktop is part of a larger computing network, they gain access to that as well. Not a good situation.  Speaking of Brute Force Attacks With so many unsecured connections out there, brute force attacks are up nearly 400 percent over numbers in 2019. Kaspersky published a report stating as much, and it really isn?t a surprise. IT administrators were given very little or no advanced notice that they were to implement all the services employees would need. This created the current situation where there are many problems securing authentication points and keeping software effectively updated. There Is Not Just One Virus Going Around Hackers and scammers are using COVID-19, and the fact people are almost universally concerned about it in one fashion or another, to overcome people?s cyber awareness. This was seen almost immediately as COVID-19-related phishing attacks were deployed en masse. In fact, in April of 2020, there were nearly 70 times more COVID-19-related phishing attacks than the previous month.  Success Rates for Hackers are Improving Since people are constantly accessing Internet-based resources, and are getting messages from all over, many people are less deliberate in their ongoing scrutiny of incoming emails, the predominant vector phishing attacks come in. The truth is that people were the weakest link in a company?s cybersecurity platform before the pandemic, but it pales in comparison to how much of a liability some are today without constant oversight.  COVID-19 is a Field Day for Scammers As mentioned earlier and understood by many security-minded people out there, hackers are opportunists. A global pandemic is just the kind of situation that hackers look to take advantage of; and they have. There are literally billions of COVID-19 pages up on the Internet, so ascertaining which are legitimate and which are nefarious is going to be difficult. Additionally, thousands of domains are added each day, of which 90 percent are scams. Not a good look for humanity when the largest health crisis in decades is met with people trying to steal money and data from others.  A Change in Perspective is Needed Technology?s job is to support the way people work, and with today?s strategies in place, more attacks are resulting in more breaches. This is largely because–even with a sharp change in strategy–companies are still trusting their users to do the right thing. They know that most of them will, and some won?t. The only way to get ahead during these uncertain times is to move to a zero trust strategy. That?s not to say that users aren?t still going to have to do the right things, but under the zero trust model, the user is allowed to access their work regardless of where they are or what machine they are using. It?s less critical […]

The Current State of Cybercrime Paints a Grim Picture for Businesses

Huge Business Losses Due to cybercriminal efforts, hundreds of millions of dollars that should be available to businesses are not. Over the past year alone, almost two billion dollars have been stolen from businesses, as compared to $600 million in 2019? and that isn?t even taking the $380 million that firms have paid in response to ransomware attacks into consideration. Hackers will commonly direct their attacks toward larger companies, often those in the financial services, energy, and manufacturing industry sectors. Why? Simple: these companies are often vulnerable, with larger losses from their downtime events. Attacks Are Up This year has been largely unprecedented, with huge numbers of people working from home. Unfortunately, many of these people are doing so without the requisite cybersecurity protections in place. As a result, cyberattacks are happening at a rate of approximately 4,000 each day? an increase of about 400 percent during the past year alone. Attack Vectors Adding to the cybercriminal?s list of attacks, the COVID-19 pandemic has given hackers increased opportunities to shape their attacks. Cybersecurity professionals are seeing a lot of attacks utilizing the current crisis to manipulate their targets, as well as focusing on the organizations dedicated to researching a COVID-19 vaccine. In addition to the critical data these organizations hold, there is a lot of pressure to overwhelm these firms? which potentially leaves them more vulnerable to attack. Many cybercriminals have jumped on this opportunity, including one group known as APT29. APT29 has been identified by both the Federal Bureau of Investigation and Interpol as a particular threat, targeting research being conducted in the US, UK, and Canada. Ransomware has also been on the rise as remote work has been more commonly implemented, as remote workers tend to be more vulnerable to these attacks. This, paired with the continued interest in recent coronavirus developments, have led to many successful strategies being deployed by cybercriminals. These strategies have included: Emails that claim to have information about COVID-19 vaccines and shortages of PPE. Messages claiming to be from the government about stimulus payments. Free downloads for video and audio conferencing solutions, a major communications strategy during the pandemic. Hackers have also become cleverer in what their ransomware attacks do, with some directing the data to the hacker after a payment is made to decrypt it so that the owner must pay up twice. How to Respond For your business to survive this pandemic, you first need to be aware of how the situation has impacted the cybersecurity space and complicated matters. Three of the biggest challenges are as follows: Many businesses were not prepared to properly implement remote work before it was required for their business to function. This only increased the difficulties that these businesses faced. Due to this, many of the preventative measures and security monitors were traded off in favor of more efficient remote capabilities. Moreover, attackers are still using COVID-19 as bait to lure their targets into their schemes. To counteract these issues, you need to take a holistic and inclusive approach to cybersecurity preparedness. Here are some elements you need to strongly consider: Training ? Your team can either be your weakest point or your strongest asset, in terms of your security. Make sure they are educated about the different ways a cybercriminal can try to manipulate […]

Backup Can Really Save Your Business? Bacon

With a BDR, you get the convenience of having a network attached copy of your data coupled with the redundancy you need to ensure that your data is protected. Best yet, the BDR can run automatically at preset intervals so that your company doesn?t risk losing more than 15 minutes? worth of data. Furthermore, BDR uses the cloud to perform data backups, which provides a significantly better system for getting back in the game following a critical loss incident. The cloud allows for faster restoration times, less downtime, and more complete data backups. The cloud utilizes snapshot-based data backup, which only updates the current backup if the files have been changed, making it truly the best way to go about protecting your organization from unforeseen threats. For those businesses that currently operate without a data backup and recovery strategy–especially if you?ve been in business for some time–you may think that it?s just another cost that you are taking on that will hurt your business? ability to turn a profit. You may not think you have enough data that you think is important enough to warrant additional investment in protecting it. You are probably mistaken, however. You have important data, and if you lose it, you stand to lose your business. In fact, 94 percent of businesses that fall victim to a major data loss incident fail within two years of the incident. If you consider six percent of all computers will fail in any given year, it stands to reason that it?s only a matter of time before you are dealing with a data loss catastrophe. Keep your business out of harm?s way with a backup and disaster recovery strategy. Call White Mountain IT Services today at (603) 889-0800 to learn more.

Tip of the Week: Using Your Android Device from Your Desktop

In order to use this function, you need to be sure of a few things: You have a Samsung Galaxy device (although more should be compatible soon) running Android 9.0 or later with the Link to Windows tool. Your computer is running the Windows 10 October 2019 Update or later (at this point, it probably should be later). You’re connected to the same Wi-Fi network on both devices. It is also important to keep in mind that this feature is not compatible with accounts designated as work or school accounts. What Does This Allow Me to Do? Simply stated, this compatibility allows you to use your Android device’s applications alongside the ones on your desktop or laptop, thereby reducing the time you waste switching back and forth between devices as you go about your day. Interacting with your applications on-screen is simple. A single click works the same as a single tap. Right clicking works similarly to the Back button. Clicking and holding is the same as touching and holding. Clicking and dragging works to select content. Scrolling allows you to move vertically and horizontally between apps. There are a few limitations to this capability?namely, the fact that some apps may not allow casting to your computer’s display, the fact that some will require the use of a touch-input PC, and the fact that sounds are not also cast to your PC. However, if you’re someone who relies on both your PC and your mobile device throughout the day, this function will likely be of some use. So, is this something you could see yourself using? Leave a comment to tell us why or why not, and don’t forget to subscribe to our blog!

Taking a Look at Budget Smartphone Offerings from Samsung, Apple, and Google

Past Flagship Phones If you are looking to pay a fraction of what you would pay for a new smartphone, you have to first look at flagships from a year or two ago. They will probably provide the best value as they typically have comparable or superior specs to the devices released in the mid-range this year while they have better cameras, better processors, and better displays. A few options to consider are the Samsung Galaxy s9 and s9+, the LG V50 thinQ, the iPhone X, or Google?s Pixel 3+. Users can expect enough software support to make buying an older flagship a solid move.  Samsung Galaxy A51 The A51 is one of the better phones in the A-series Samsung?s lineup, and users can see value as it is priced at the edge of the budget price point. It features a 6.5-inch Super AMOLED display, 4 or 8 gigs of RAM, and several features that flagships don?t support, like a 3.5mm headphone jack and expandable storage. Available in Prism Crush Black, Prism Crush White, Prism Crush Blue, or Prism Crush Pink, the Galaxy A51 can be found on most major carriers and unlocked online. Samsung Galaxy A51Body: Plastic with Gorilla Glass 3 front, plastic backDisplay: 6.5-inch Super AMOLED (~405 ppi)OS: Android 10Chipset: Octa-core Exynos 9611Memory: 4-8 GB RAMExpandable Memory: microSDXCCameras: Rear – 48 MP (wide), 12 MP (ultrawide, 5 MP (macro, 5 MP (depth); Front – 32 MP (wide)Sounds: Loudspeaker, 3.5mm headphone jackBattery (endurance rating): 4,000 mAh (86 hours)Security: In-display fingerprint readerMiscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Bixby assistantOther versions: Samsung Galaxy A-series Google Pixel 4a 5G Google may have backed off the flagship smartphone race in 2020, but for years they have been delivering solid smartphones with one of the best software experiences on the market. The Google Pixel 4a 5G, is 5G capable, if that is applicable to you, but the real value is the passable specs and the price point, found hundreds of dollars below devices with comparable specs. Available in Just Black and Clearly White, the Pixel 4a 5G is available in the Google store or from many major service carriers. Google Pixel 4A 5GBody: Plastic with Gorilla Glass 3 front and plastic backDisplay: 6.2-inch OLED, HDR (~413 ppi)OS: Android 11Chipset: Qualcomm Snapdragon 765GMemory: 6 GB RAMExpandable Memory: NoCameras: Rear – 12.2 MP (wide), 16 MP (ultra wide); Front – 8 MP (wide).Sounds: Stereo Speakers, 3.5mm Headphone JackBattery: 3,885 mAhSecurity: Fingerprint readerMiscellaneous: Accelerometer, Gyrometer, Proximity, Barometer, Compass, Google AssistantOther versions: 4G LTE version Apple iPhone SE Apple?s 2020 version of their SE device looks the same as their last one. It actually looks just like an iPhone 8, which was one of Apple?s most popular devices. The new SE runs iOS on Apple?s A13 Bionic chip, and while significantly smaller than many devices you see, delivers a solid user experience for fans of the operating system Apple iPhone SE (2020)Body: Aluminum with Gorilla Glass front and backDisplay: 4.7-inch Retina IPS LCD (~326 ppi)OS: iOS 13Chipset: Apple A13 Bionic Memory: 3 GB RAMExpandable Memory: NoCameras: Rear – 12 MP (wide); Front – 7 MPSounds: Stereo Speakers, No Headphone JackBattery (endurance rating): 4,500 mAh (87 hours)Security: Fingerprint readerMiscellaneous: Accelerometer, Gyrometer, Proximity, Compass, Siri assistant There are many other budget devices on the market, but to get the biggest bang […]