Do you know what one of the biggest threats to your office's IT infrastructure is? Here are a few hints to help you guess if you don't already know. Almost every office across the world has at least one. It's that loner over in the corner that doesn't talk to anyone unless you talk to it first. It likes to communicate using a series of beeping sounds to let you know it's awake and ready to go. Perhaps the weirdest clue of them all, sometimes it likes to eat paper. What's your best guess? If you guessed the new person who started last week, you may want to get them some help because we were actually describing your office multifunction printer! Over the years, your printer has brought forward loads of convenience, but its enhanced abilities have also increased potential risks to your business security.
If you've followed along with the Elf on the Shelf tradition in recent years, you know that the elf is supposed to be reporting to Santa on the behavior of those they are watching over. This year, SumnerOne joined in on the fun and we added Peppermint the Elf to our payroll! Peppermint was our newest employee and we were so excited to welcome her to the SumnerOne family, even if the fun had to be short-lived. After all the fun and games, we knew Peppermint would have to be headed back to the North Pole. We can't wait to see what she will have up her sleeve for next year.
As we wrap up National Cyber Security Awareness Month (NCSAM) we're also welcoming Halloween! This is the time of the year that the fictional monsters come out to play, but what about the monsters hiding behind a keyboard all year long? That's right, cyber criminals are the monsters who are out and about 365 days per year, disturbing the peace and unleashing chaos on end users. Here are our 7 scary facts about cyber security:
To pay or not to pay, that is the end-user's question. When the situation calls for whether someone should pay up in a ransomware attack, our IT expert, Jeff Groby suggests not. People who decide to pay the ransom can actually end up doing more harm than good. You are putting a big target on your back when you pay up by letting the cyber criminals know you're willing to pay. We joined the crew over at The Big 550 KTRS for Tech Talk to chat about polymorphic ransomware in theme with our topic for National Cyber Security Awareness Month!
Practicing strong email safety goes beyond using a good password and being cautious about opening a message that looks spammy. Malicious emails are looking more and more like the real deal every day. This practice is called phishing. Before we can help you to keep your eyes peeled for phishing attacks, it's sensible to explain the nature of those domains for people who have not encountered the term in the past. Phishing is a straightforward concept many hackers will use to steal email and account information by tricking individuals into handing over their details.
Adding smart technologies to your home has increasingly grown in popularity in recent years, and so have the mounting security-related issues that follow. Whether you use a home monitoring system, a smart thermostat, high-tech baby monitors, or something else, the need to secure your technology is crucial. Our IT expert, Jeff Groby, joined the crew at The Big 550 KTRS to talk about smart home security for Tech Talk on the Guy Phillips Show last week. This technology can make life easier, but it's only as good as the security you have set up around it.
Ransomware is the leading cyber security threat in 2018. In a recent podcast, Hal Lonas, CTO of the security software provider Webroot, offered a succinct explanation of how ransomware has flipped the security threat paradigm on its ear. “It used to be that the bad guys wanted data because it was valuable to them,” he said. “With ransomware, they’re essentially asking: ‘your data isn’t valuable to me, but how much is worth to you?’ It’s scary how smart it is.” New types of ransomware will continue to surface. Hackers are constantly modifying ransomware code to evade detection by defense technologies, such as security software. This year, we’ve witnessed a surge in “polymorphic” malware, which is malware that changes automatically to appear unique to different endpoints. Security software often fails to discover these variants. To decrypt files, hackers typically request payment in the form of bitcoin or other cryptocurrencies.