Unfortunately, Ransomware is Just Getting Worse

ransomware

Ransomware is a top threat, and it’s definitely not going anywhere anytime soon. To help you best combat it, let’s take a look at what you can do to keep ransomware from disrupting your organization and its operations. We’ll provide a brief overview of what ransomware is and what you can do to take the fight to it. 

What is Ransomware: A Review 

Ransomware is a type of malware that locks down a device or system until a ransom has been paid. It’s been around for quite some time, and it has only grown more dangerous since. Trend Micro reports that 84 percent of organizations have experienced either phishing or ransomware in the past year, with the two often going hand-in-hand. 

There are plenty of innovations that modern ransomware has brought with it, along with countless ways for it to weasel its way past even the most carefully-laid defenses. Instead of simply infecting devices, hackers now use ransomware to steal and leak data if the ransom is not paid, which creates a lot of problems from a compliance standpoint. Furthermore, some cyber criminals offer ransomware-as-a-service to anyone willing to pay for these attacks. Sometimes hackers will even fake ransomware attacks just to make a quick buck, claiming that they have infected a PC when in reality they simply haven’t. 

So, how does your business take the fight to ransomware? We hope to answer that question here. 

What to Do to Face Down Ransomware 

The precautions taken against ransomware have been consistent, but more advanced variants require more complicated measures. The best way to combat ransomware used to be storing a data backup off-site, but now that ransomware has started using the above-outlined double-extortion methods, this is not always guaranteed to be effective. While we always recommend data backup in the first place, a backup is not the best way to protect against ransomware anymore. The best way to secure your business is to utilize multiple measures, including the following: 

Keeping Defenses Up-to-Date 

Ransomware can be stopped by some basic security solutions, like firewalls and antivirus programs, so don’t neglect these protections. It’s important to keep them up-to-date. The same goes for any patches or security updates to your business’ chosen solutions. Of course, we do recommend using more advanced protections, as well. You should implement a monitoring solution to keep tabs on your infrastructure—especially with email. If possible, have your IT resource configure your email gateway to scan ZIP attachments and block executable files. Long story short, the fewer ransomware attempts that your employees are exposed to, the less likely you are to suffer from one. 

Educating and Evaluating Users 

On that same note, you need to make sure your team is aware of these threats and how to address them. Ideally, your staff will never encounter a ransomware attempt, but we rarely run business in an ideal world. Your employees will be the last line of defense against these attacks, so be sure they are armed with the knowledge to spot one. You should also make sure that you are regularly testing your employees to ensure they can put this knowledge into practice. Simulated attacks against your infrastructure can help to identify personnel who need a refresher on how to appropriately handle security issues with your business. 

Following Zero-Trust Policies 

There is always the possibility that one of your users will accidentally fall victim to a threat. This is why it is so terribly important to minimize the damage done as a result of an attack. A zero-trust policy is one way you can make sure this happens, as you are effectively limiting network access until you can guarantee the identity of the user. Furthermore, we also recommend enabling multi-factor authentication whenever possible. This gives you more of a buffer between threats and their targets. 

Maintaining Backup Practices 

Some attacks will take advantage of businesses that properly back up their data, but not all of them will. In any case, it never hurts to have data backup in place. It’s one cybersecurity practice that all companies should use, no matter what. 

Ransomware is a Challenging Threat—We Can Help You Address It 

4 Corner IT can help your business keep itself safe. To learn more, reach out to us at 954-474-2204. 

Contact Us Today and Check Out Our Blog!

Phishing Email Subject Lines You Should Know

phishing credit card data with keyboard and hook symbol 3d illustration Phishing Email Subject Lines

Even the best employees will encounter situations where they might accidentally put your organization at risk due to a phishing attack. What are some telltale signs of a phishing scam, and how can you tell when you need to be cautious? Certain phishing email subject lines can be indicative of their threat level. Let’s take a look.

Expel published a report on the most common subject lines of phishing emails. The consensus was that they all urged the reader to take action of some sort. For employees who are impulsive and don’t think twice about their activities, this can be devastating. Also, that’s not to mention the businesses who employ them.

The study examined 10,000 known malicious emails and found keywords used in phishing emails. Many of them used a sense of urgency to convince the reader that action was necessary. This tactic is nothing new for phishing scams. Especially considering this language is also used in marketing emails. Therefore, it’s no wonder that the lines get so blurry with this topic.

Ben Brigida, Director and SOC of Operations at Expel, had this to say regarding the matter: “Attackers are trying to trick people into giving them their credentials. The best way to do this is to make the email look legitimate, prompt one clear action, and lace it with emotion – urgency or fear of loss is the most common. The actions are as simple as ‘go to this site’ or ‘open this file,’ but the attacker wants you to be moving too fast to stop and question if it’s legitimate.”

In other words, simple and more direct subjects for phishing emails make for an easier hacking experience. This is reflected in the keywords utilized. You’ll notice that these subject lines also mimic those used by legitimate businesses. Here are three of the most common:

  • RE: INVOICE
  • Missing Inv ####; From [Legitimate Business Name]
  • INV####

Imagine receiving an invoice from a company with the threat of shutting down an important service that your business relies on. You might have so much going on in your business that you don’t even think twice and assume that you haven’t made the payment. Naturally, this is what the hacker is counting on. Take a step back and consult the appropriate resources before making a payment or clicking on a link. Sure, it could be legitimate—many invoicing companies and automated software use similar language—but it could also be a scam.

Other common phishing subject lines include words like “required,” “verification required,” or stem from file sharing, action requirements, or service requests. The tags that often get assigned to emails, like New or Update, don’t exactly help matters.

What are your thoughts on these phishing email subject lines? Would you or your employees click on them accidentally? Don’t take any chances with your network security—get in touch with 4 Corner IT today.

Using Windows Hello to Add Security

Signing in Windows 10 on Surface Pro tablet PC using Windows Hello, which is a face recognition feature which allow users to log in by scanning their faces.

Authentication is a tricky thing for businesses. While people want to be secure, they also want to make that security as convenient as possible. Developments involving solutions like Windows Hello, a biometrics authentication system used by Microsoft, have been pushing this trend forward. Let’s take a look at Windows Hello and see what kinds of authentication features it brings to the table.

What is Windows Hello, Anyway?

Simply put, Windows Hello is an authentication technology that Windows users can utilize to authenticate their identities. This is done through the use of biometrics rather than a password. The key feature here is that Hello is designed to be more user-friendly than passwords. Meanwhile without putting security on the line. Biometric technology uses proof of a physical attribute, i.e. something you are and compares that to a previously stored record. So, you scan your face, fingerprint, or iris, and if it matches the saved record closely enough, then you are granted access to the device.

How It Works

Passwords have long been considered the standard for computer security, but there are many flaws with them that need to be taken into consideration. Of course, we would never say that you ditch passwords entirely; all we are saying is that there are a lot of best practices to think about in regards to passwords. For example, if a user has over 100 passwords, then each of them must be complex and follow established best practices, which is a lot for your average user to consider when it is so easy to just reuse the same old one multiple times. These types of insecure decisions can lead to poor security as a result.

Windows Hello aims to make security easy through the use of biometrics. It even has a built-in anti-spoofing technology that can keep hackers from tricking the system into admitting them.

Does Windows Hello Belong in Businesses?

If you choose to implement Windows Hello in the workplace, we recommend that you supplement it with other security precautions and features. Microsoft has suggested that this feature will carry over to Windows 11, and password access will be reinforced by other built-in protections.

If you need assistance with implementing a comprehensive security strategy for your organization, 4Corner IT can help. We have the tools you need to keep your network safe. To learn more, reach out to us at (954) 474-2204.

Why It’s Important to Lock Your Computer and Phone

adobeLocked steel padlock in a drilled hole of the black laptop on dark background. Concept of protecting personal data on a computer. A laptop is locked with a lock. Closeup, selective focusstock. locking your phone and computer

Network security is not always about implementing new encryption protocols and using state-of-the-art tools to protect your business. Sometimes, it’s the small things that can make a massive difference. So, if your collective staff can implement this one easy trick, you might be surprised by how beneficial it can be for your network’s security. This practice? Locking your computer and phone.

What Is Locking Your Phone and Computer?

Essentially, your phone and computer can go into a sort of sleep mode when they’re not being used. You do this every time you close the screen on your phone. When your phone “wakes up” to be used, there should be a password required to get back into your phone. Otherwise, anyone can swipe the screen and start reading.

Locking your phone is second nature, and many people have complex passkeys or fingerprints required to do so. Computers are a different matter. Most office workers will stand up and leave their desks without locking their PC. The better practice is to lock your PC. Either perform the lock sequence that will prompt the next user for a password or put it into sleep mode that requires a password upon your return.

Let’s take a quick look at the benefits you get from locking your phone and computer.

Keeping Private Documents Out of Sight

The chances that corporate espionage is going to take place at a medium-sized landscaping company might be small compared to a large media conglomerate. Nevertheless, private documents on phones and computers often hide passwords and personal information.

Allowing those resources to be compromised can harm your reputation. Additionally, can leave you open to many problems, including lawsuits.

Your Work Phone and Computer Are Vectors for Malware

Hundreds of people can come and go from a large workplace daily. It’s not like you can keep track of them all. Unfortunately, it only takes one person with bad intent to find a computer or work phone that is connected to your company’s network and upload malware.

The most common vector for malware these days is email, and many of your company’s resources are geared towards stopping that threat as long as it’s from an external source. However, if someone sends an internal email from a trusted worker’s account and CCs everyone in the building, then it’s safe to say most people would let down their guard enough to open that email.

All it takes is a single terminal to remain unlocked and someone can wreak havoc on your business. Locking your computer and work phones can deter this threat or make at least delay the intruder long enough for them to be caught.

The benefits of locking your phone and computer at work go beyond malware and corporate espionage, though. It stops workers from learning about promotions, pay rates, and internal investigations. Locking your computer can also prevent data from being altered on a project without your knowledge.

Implementing this change is simple, and it does not require a lot of time. Get your team together, teach them how to lock their computers and phones, and test them once in a while to make sure they’re compliant. Not only will this increase security, but it will make your workers feel more like true stakeholders in the well-being of your business.

Check out our blog posts here for weekly content on business, technology, best practices, and more!

Phishing Attacks in 2021 Trending Due To Pandemic

credit card phishing - piles of credit cards with a fish hook on computer keyboard

Hackers have made some nefarious choices over the past several months. Many of which involve using the COVID-19 pandemic to spread their influence and steal data through phishing attacks. Let’s explore how these cybercriminals have leveraged a global disaster to their benefit and some ways that you can keep your business secure.

According to SecureList, spam and phishing trends in Q1 of 2021 were heavily influenced by the COVID-19 pandemic, and not in a good way. Here are a few examples of the major threats that surfaced during this time.

Stimulus Payment Scandals

Early 2021 saw many initiatives by government agencies to suppress the financial burden placed on individuals and businesses. This was done through the use of economic impact payments and business bailouts. Hackers, of course, wanted to capitalize on this and began using phishing messages to trick people. Targets received messaging that was often specific to their bank and utilized similar branding to official websites. These efforts were all elaborate tricks to convince users to hand over their credentials. Users would unsuspectingly enter their credentials into forms on these fake websites and put their sensitive information at risk.

The Vaccine Race

Back when the COVID-19 vaccine was in short supply or the supply itself was limited to specific groups of people, there was a bit of a race to get to it. This rush created an opportunity for hackers to capitalize on peoples’ desires for security and safety. Thus, they leveraged phishing schemes that used the vaccine to their advantage. They would use language and branding of official health organizations to convince users to click on links in emails. Then, they would redirect users to fake websites for harvesting credentials or banking information. Even those who got the vaccine received surveys offering free goods in exchange for information.

What You Can Do

It’s no surprise that cybercriminals are using these tricks to subvert security measures. These types of attacks are just more of a string of phishing attacks that must be kept up with in order to maintain network security. Here are a couple of ways that you can make this happen.

  • Utilize Spam Protection: While they aren’t 100 percent effective all the time, spam filters are great for keeping threats out of your inbox. The most advanced phishing attacks could still make their way into your inbox. Therefore, we recommend taking multiple measures of network security.
  • Train Your Employees: If messages do make it past your spam filter, you will want those who are reading the messages—your employees—to be able to identify the threat and avoid it at all costs. This is where training comes in.
  • Implement Unified Threat Management: Unfortunately, even the best employees will make mistakes, so you will want to have a contingency plan in place for when accidents happen. A UTM gives you just that with a single all-in-one security solution for your network security.

4Corner IT can help your business approach network security in a responsible manner, implementing the best solutions and constantly testing your employees’ awareness of important security practices. To learn more about how we can help you protect your business, reach out to us at (954) 474-2204.