Recently, the FBI has discovered a hacking threat that affects at least half a million wireless routers and other devices across the world. This malware creates a "botnet", a group of connected devices that can launch an attack simultaneously, and also allows these devices to steal website credentials or can shut the appliance down completely. Because these devices do not have an Intrusion Protection System (IPS) or an anti-virus solution, they are easily exploited. Small home and office products as well as network-attached storage devices are affected.
The FBI recommends:
- 1) Reboot these devices to disrupt and help identify affected appliances.
- 2) Disable remote management settings.
- 3) Secure appliances with a new, strong and encrypted password.
- 4) Keep firmware up-to date.
- 5) Optional: Completely reset the device.
If you are not sure if one of your devices is affected, we can evaluate for best practices up to and including replacement of your network appliances with one of our recommended products. Contact us to schedule service.
LeeShanok takes IT security seriously and it is our duty to inform our clients about potential threats and vulnerabilities that can affect your business. LeeShanok is monitoring the current status of available updates and will continue to inform its clients of any new information.
If you have any questions or need assistance with checking and updating your devices, please don't hesitate to contact us.
Your Technology Partner,
The LeeShanok Team
LeeShanok Network Solutions will be hosting a booth at the Arizona Multihousing Association Phoenix Trade Show May 10, 2018.
Ransomware encrypts files and demands ransom. Malware-facilitated blackmail uses a different strategy, delivering trojan-class malware to mobile devices that gathers information and transmits it outside the network, then threatens to make public some private information unless you pay a fee, classic blackmail. More Information
In most cases, you can avoid malware by downloading apps only from Google Play Store, Microsoft Store and The Apple Store. But two apps in Google's Play Store (Wallpapers Blur HD, Booster & Cleaner Pro) were infected with malware that demanded $50 to stop a leak of photos, Facebook messages, web browsing history, emails, and location history to all contacts in the device and in breached cloud accounts like Facebook.
Before this malware initiates it's malicious activity, it must obtain permission to manage calls, read and send messages and have access to contacts. Why would a wallpaper app or an app that boosts a devices' performance need access to these areas? It doesn't, and should never have been given these permissions. Here is a familiar app and the permissions it has been granted:
So what can you do? First, read reviews of any app you are considering, though there can be fake reviews mixed in. Second, after download and installation, you will be asked to grant access permission to areas of your device and data. This is the time to stop, read and think through each granting. If any seem odd, then deny access and uninstall the app. Then do some research about the app, and only when satisfied should installation be completed. Third, mobile devices can be further protected with one of the free antivirus and firewall apps for Android and iPhone devices:
LeeShanok has been nominated for a second time to be part of the Cisco Small Business Executive Advisory Board (SBEE). Cisco executives and senior management teams will meet with board members to encourage quality, interactive dialogue on the development of small business products, solutions, services, marketing programs, tool and initiatives.
The cornerstone of the SBEE is the opportunity to influence Cisco’s overall strategy and future direction in the small business segment.
“This is a great opportunity to partner with Cisco Systems, a leader in the technology industry, in support of providing new technologies that makes sense to small businesses. Being part of SBEE is a great opportunity to allow us to be the spokesmen on the technology needs for small businesses to Cisco”, LeeShanok said.
About LeeShanok LeeShanok Network Solutions has provided professional IT consulting services in Arizona since 1997.
About Cisco Cisco (NASDAQ: CSCO) is the worldwide leader in networking that transforms how people connect, communicate and collaborate.
For more information, media contact: [Eric LeeShanok, LeeShanok Network Solutions (520) 888-9122, firstname.lastname@example.org]
The PCI Security Standards Council maintains and promotes security standards for the Payment Card Industry, providing tools to assess, train and certify companies involved in eCommerce. Credentialing of vendors help industries like Property Management reduce exposure by identifying PCI Compliant vendors. Don't worry, your selection of LeeShanok Network Solutions was a wise move, as we are PCI compliant and a member in good standing of The Compliance Depot.
On June 30, 2018, the eCommerce industry will say goodbye to SSL and early versions of TLS, and so should you.
SSL and TLS are cryptographic protocols used to create secure communications between two systems, authenticating them, and protecting the confidentiality and integrity of data passing between. SSL and early versions of TLS have vulnerabilites that cannot be patched and put organizations at risk of being breached.
Here is what you can do:
1. Attend a webinar to better understand the issue and recommendation, and if it affects your firm and payment card transactions - https://info.pcisecuritystandards.org/webinar-migrating-from-ssl-early-tls-video-2018 2. Enlist the help of your IT services vendor. If you are a Managed-IT client of LeeShanok, we've got you covered. If not, we can help you evaluate exposure and guide your conversion. 3. Migrate your devices to TLS 1.2, configure it securely, and keep it updated.
Contact us to discuss your situation, exposure and migration