Office 365 & Email Security

Spam email

As an IT Expert, I get client calls and emails asking me about various emails they receive and whether that particular email is fake or real – almost all time the emails are fake.

To help my clients and others in a similar situation I’ve put together a video that goes through some security tips on how to protect your self from hackers and phishing attempts. The video goes through:

  • First alerts of being attacked.
  • How scammers and hackers try to fool you.
  • How to tell if an email is fake or not.
  • The Do’s and Don’ts.
  • How to tell if you’ve been hacked.
  • What to look for after you have been hacked.
  • How to prevent and protect from hackers.
  • What is 2-step and MFA?
  • What to do after you’ve been hacked.
  • Screenshot examples of phishing emails.

Check out the video below and leave any comments in the fields below.

Eleven Best Security Practices To Stop Ransomware

Ransomware and most malware attacks start in two main ways. A booby-trapped email with a malicious attachment or via a compromised website; which then work their way down to your endpoints and servers.To stop these attacks, it is critical that you have a multi layered approach to security.

This starts with a training your employees and patching your devices right through to cloud based malware filters, dedicated hardware firewalls and corporate grade security applications on each device.

The eleven best security practices to apply now are:

  1. Employee training
    Regular training for employees is essential. Employers need to inform their staff on what to look out for and don’t trust the contents of every email they receive.
  2. Patch early, patch often
    The sooner you patch Windows the fewer holes there are for ransomware to exploit.
  3. Backup
    Backup regularly and keep a recent backup copy off-line and off-site. Offline and off-site means ransomware can’t get to it. With recent backups data loss can be minimized.
  4. Implement corporate grade security software
    A free antivirus program might be ok for home use but do you really want a free program protecting your confidential business data and financial information?
  5. Install a firewall or UTM
    You probably don’t just rely on a cheap door lock on the front door of your house so why rely on a basic firewall on the electronic entrance to your business?
  6. Enable cloud based email filtering
    Don’t rely on your local antivirus software detecting and stopping malware within your email application. Block it before it even enters your network by using using a cloud based filter – one that uses multiple filters is even better.
  7. Enable file extensions.
    Enabling extensions makes it much easier to spot file types that wouldn’t commonly be sent to you.
  8. Disable Macros
    Don’t enable macros in document attachments received via email. A lot of infections rely on persuading you to turn macros on, so don’t do it!
  9. Be cautious about unsolicited attachments
    If you aren’t sure – don’t open it. Check with the sender if possible.
  10. Admin Login Rights
    Don’t have more login power than you need. Having administrator rights may bake things easier for administration but they also give malware free ranges on your computer and network. An infection which may be able to be contained to one device could become a network disaster is the malware exploits admin rights.
  11. Keep applications up to date.
    Stay up-to-date with new security features in your business applications
    For example Office 2016 now includes a control called “Block macros from running in Office files from the internet”.

How to Tell if Your Computer Has a Virus?

How to tell if your computer has a virus?Sometimes computers do crazy things that ring alarm bells and make users think it is a virus. Next thing you know the boss is telling everyone to run scans and demanding people come clean about their browsing habits. Fortunately, not all weird occurrences are viruses related – sometimes your computer is simply overloaded, overheating or in desperate need of a reboot.

Here are some of the tell-tale signs that your computer maybe infected with malware:

Strange Error Messages

Does your computer have messages popping up from nowhere that make no sense, are poorly worded or just plain gibberish. Take note of anti-virus and security warnings too, check that the warning is from YOUR anti-virus software and looks like it should occur. If a message pops up that isn’t quite right then don’t click it – not even to clear or cancel the message. Close the browser or shut down the computer, then run a full virus scan.

Suddenly Deactivated Anti-virus / Malware Protection

The best way past a security guard is to sneak it when they are not around. Certain malware infections are programmed to disable the security systems first, leaving your computer open to infection. If you reboot and your protections are not enabled you may be under attack. Attempt to start the anti-virus manually and if that doesn’t work, backup your data and try and reinstall your security software.

Social Media Messages You Did Not Send

Are your friends replying to messages you never wrote? Your login details may have been hacked and your friends could be tricked into giving up personal information or money. Change your password immediately and advise your contacts of the hack.

Web Browser Acting Strange?

Perhaps your homepage has changed, it is using an odd search engine or opening/redirecting your to unwanted sites. If your browser has gone rogue it is definitely malware which could be trying to steal your personal or financial details. Skip the online banking and email until your scans come up clear and everything is working normally again. Once you are certain your machine is clean, change all your passwords.

Sluggish Performance

If your computer speed has slowed, boot up takes an eternity and even opening programs takes forever, it is a sign that something is wrong. It is not necessarily a virus though. Run your anti-virus scan and if that resolves it, great, if not, your computer may have a hardware issues or your computer needs a tune-up or service.

Constant Computer Activity

You are not using the computer but the hard drive is going nuts, the fans are whirring, and the network lights are flashing like a disco? It is almost like someone IS using the computer! Viruses and malware attacks use your computer resources, sometimes even more than you do. Take note of what is normal, and what is not and seek help if it looks like something is amiss.

If you have a virus that you can’t get rid of or need a service on your computer give us a call at 08 8326 4364 or at su*****@dp*********.au.

Why Do People Create Viruses?

Why Do People Create Viruses?Writing a computer program is hard and writing a virus is even harder (BTW you don’t even need programming skills as viruses templates can be bought online), so why do people do it? In the majority of instances it comes down to 3 reasons:

  • Money
  • Bragging rights
  • Simply being a jerk.

While bragging or being a jerk is pretty self-explanatory, the money side is more interesting. Here are some of the ways people make money with viruses:

Bank account theft: As with real bank robbers virus creators are more than happy to help themselves to the money in your bank account. Once they have your login details (obtained via a key logger) they simply transfer your funds away or use your credit card details to go on a shopping spree. Sometimes they’ll leave the fun to another person by selling your details to the highest bidder.

Ransomware: Sometimes a virus will encrypt your files and demand money for a key to unlock you own data. Without a true backup procedure in place you are at their mercy.  Once you have paid the nightmare may not be over as they now know you are an easy target and request even more money.

Ad swappers: A very cheeky technique which you may never know is happening to you. This scam is when a virus puts annoying ads on websites you visit or places affiliate codes on pages. When you buy something legitimately – eg, from Amazon – the affiliate codes allow the hacker to get a percentage as a ‘referral fee’. Their kickback doesn’t make your purchase cost more and you may not even know you are infected.

Bitcoin mining: You have heard of digital currencies being used for payments but did you know you can also earn money via bitcoin mining? You can earn this money by running specialized software on your computer but sometimes this means paying more in running costs than you would actually make – unless you were very clever and sneaky, and used a virus to use the processing power on other people’s computers.

Botnets: If infected with a botnet, a computer can be remotely controlled to do whatever the virus creator wants. In most cases they’ll usually set the infected computers to overwhelm a target computer and blackmail the owners of that computer – the ‘Botmaster’ says “pay me thousands of dollars or I’ll crash your computer.”

Account stealing: Subscription accounts like Netflix and Hulu are often hijacked allowing other users a free ride by using your accounts. Gaming accounts open up another world of financial incentives with those digital items that people work hard for in the games worth a pretty penny on the black market.

These are just a few of the ways people make money through viruses and malware. If you know of any others please leave a comment below.

Give us a call at 08 8326 4364 to make sure your computer is secure and protected.

WannaCry Ransomware Explained: Is Your Business At Risk?


With all the media attention last week you would be hard-pressed to not of heard about the WannaCry cyber-attack. Businesses of all sizes and even hospitals and police departments found themselves crippled with out warning.

Here in Australia we looked to have missed a large part of the attack due to the time zone differences and the fact that a kill switch was found for the malware. We shouldn’t rely on these factors going forward though. This articles details what the malware is, why it caused so much damage and how to protect ourselves moving forward.

What is WannaCry?

The WannaCry cyber-attack was a type of malware (the collective name for malicious software which includes viruses, worms and spyware) called ‘ransomware’. Just like the name suggests, it actually demands money from the owners of the computers infected. Like all ransomware attacks, WannaCry encrypts your files and holds them hostage until payment is made –  in this case, the price was set at $300 payable with the internet currency Bitcoin (and you had 3 days to pay before it doubled). If you don’t pay the ransomware threatens to permanently delete all your files. It is not yet known how much money the WannaCry hackers have earned with their latest attack – but you can be sure that plenty of people have paid the ransom. Even the FBI recommends paying the ransom – especially if the ransomed files are of a sensitive nature or weren’t backed up.

How It Spread So Fast

WannaCry self-replicates and spreads. So far, no common trigger has been identified, as is normally the case with phishing links (a phishing attack needs to be activated – usually with a click). WannaCry moved rapidly from system to system, spreading out through the entire network, including all connected backups and storage devices. At the same time it infected other networks, who then spread it further and further. Given the nature of the internet it had spread widely within hours.

Why Some Businesses Were Safe

WannaCry took advantage of a specific vulnerability in Windows of which Microsoft patched months ago. Thus only systems that have fallen 2 months behind in their Windows updates were infected. Without that patch, the ransomware could waltz right past the firewall, past the anti-virus and directly into the system (the NHS were reportedly running Windows XP – which is no longer supported by Microsoft). Those running Windows 10 or a fully patched, recent version of Windows were completely unaffected as the virus literally had no way in

This outbreak shows the importance of staying up to date with security patches on your systems. We haven’t yet seen a second spike in WannaCry attacks yet, but that doesn’t mean there won’t be one. A quick Windows update could protect your business from weeks of downtime and lost revenue making attacks like this a non-issue.

With our regular maintenance plans we can make sure you stay up to date and protected. Give us a call today at 08 8326 4364 to discuss ways we can help your business stay safe.

Should I Pay For Antivirus Software?

Its the age old question that I regularly hear – is free antivirus software as good as a paid for solution?

In a perfect world the best way to avoid a computer virus is by using common sense – but that doesn’t always work with even the most careful users finding themselves infected in an instant. This is why antivirus software exists to help us not get infected – but should you choose free or paid antivirus? Here we list some of the differences between the two:

Advertising: Much like a free game making its fortune with advertising and in-app purchases, free antivirus software will push you for payment. Expect popup boxes pestering you to sign up to the paid version. Some free options will also try to change your browser home page and default search engine, an inconvenience you may be stuck with. Paid options are more respectful and largely invisible unless they have detected a problem.

Effectiveness: It is fair to expect your antivirus to detect malware, and testing shows that in a head-to-head battle free and paid are roughly equal at catching known infections. Generally free antivirus needs to have recorded a virus to its library before it can detect it. Paid antivirus is more likely to identify and stop new viruses – they can detect suspicious behavior, source and attributes and are a far more effective method of detection.

Features: Free antivirus is usually a cut down version of a paid version. In a paid version you can expect advanced features like spam filters, firewalls, parental controls and secure web browsing. Some paid antivirus packages also update your other software applications, forming a more secure protection against attack.

Support: Free antivirus options are very popular because they are free! This means there is generally no support available. If there’s a problem or conflict with another program, you may find yourself without protection until it can be resolved. Paid antivirus options usually include telephone suppor and other forms of support, ready to help with problems ranging from installation to system diagnostics.

Ease of use: Free antivirus packages are generally easy to install and use, but are  limited in their flexibility. They come as-is, meaning you can’t pick and choose what it monitors or how it reacts. For example, users occasionally find it necessary to disable ALL protections in order to install a network game. Paid versions are more likely to allow you to adapt the way it runs, switching features on and off as required.

In summary free antivirus software is fine for very basic protection, those on a budget or with an older PC – in these cases, something is always better than nothing. But we generally recommend you go with a paid antivirus solution to defend you from the new attacks that are released daily and to ensure you have solid protection that will make a real difference to your digital safety.

Talk to us about upgrading to the best security options for your needs.

Will Clicking That Link Cost You Thousands?

Ransomware has been a huge security threat in 2016. No-one was safe. Hackers targeted everyone and everything – including office networks and home PCs. In fact anything connected to the Internet (including smart TV’s and surveillance cameras) was fair game for them. They were very successful, with reports of upwards of $US846million reported just from incidents in the US. With this sort of monetary gain business is booming for hackers, with thousands of attacks each day bringing in an average of $US640 per target. Even more alarmingly is that the cost to the end user is on the rise with hackers demanding more and more money each time.

Some hackers even offer to help and rescue you from the issue that they caused – for a fee of course! One method is to trick you into thinking you have a virus or malware issue that will spread rapidly if you don’t pay them money to remove it. Another scarier method is that they pretend to be from a law enforcement agency (ie the Federal Police, FBI or a similar type of organisation) and say your computer was involved in a crime (anything from money laundering to child pornography). If you pay them a certain amount of money quickly you can avoid going to prison.

The real bad malware that is spreading rapidly at the moment are the crypto range of viruses. These viruses cause users to be locked out of their own data by encrypting files on users computers and servers. Folders of business documents, pictures, photos, music and even financial records are all held hostage until a ransom is paid. The encryption is such that it is unbreakable and unless you have a good backup paying the ransom is often seen to be the only solution.

The way these evil hackers get into your computer is deviously simple. They convince users to click on an email attachment/link or pop-up. For example you receive an email or pop up that:

  • supposedly tracks an undeliverable package.
  • is a bill or credit from a utility company.
  • alerts you to a virus that was found and needs to be removed.
  • an invoice from a company you have never heard of and / or for goods you never ordered.
  • advises you of a recent traffic or some other type of fine.

They make the message so tempting to click through for more details (this is what the hackers count on). Their messages and pop-ups aren’t obvious threats and so can easily slip under our radar and through various spam and virus filters.

Paying the hackers to solve or unencrypt your files is not recommended as they are not the most trustworthy bunch. That one payment may lead to demands of more and more money with no solution in sight.

To make things worse, the malware can encrypt your backups too. Having a backup is very important in any situation, but in cases like this, the right backup is needed – with several other backup copies not connected to your network and stored safely offsite. An online backup is also recommended. Before restoring your backup remember to check that the malware isn’t lurking in the background, ready to not just re-infect your restored files but also the backup drive itself.

To avoid finding yourself dealing with ransom demands we recommend being wary of all email attachments. Even if they are from business associates, friends and family – if you are not sure what the file is don’t click it. The sender may not have sent that email intentionally and their compromised system may be automatically emailing everyone in their address book.

You should also be wary with any popups that appear out of place, especially ones that try to make you panic or do something you are wary of doing. If the message doesn’t sound or look right then don’t click it. Ransomware is just too dangerous to risk.

Also make sure your backups are working correctly and regularly test your backups.

Call us on 08 8326 4364 to set your computer up with protections against ransomware / malware / viruses, and put backups in place that will keep your important files safe.

Should You REALLY Click That Button?

All of us have had that pop up that just won’t leave. It’s hounding you to upgrade your software or change some sort of setting and clearly it has zero intention of giving you a rest. That software wants to be upgraded or that setting changed and it wants it now.

update

Begrudgingly you click the “Yes” or “Ok” button and let it upgrade in the background or change that setting. Maybe now it will leave you alone to get some work done but instead of doing something positive you quickly discover it’s given you the exact opposite. Your essential hardware no longer works, you’ve got errors all over the place, and that application no longer runs at all.

The urgent popup was more of an instant downgrade.

Before you click that nagging upgrade button, consider the following:

Is the popup for legit software?

Do you have that software already installed on your machine? Does the popup look dodgy with poor spelling or grammar? If so it may be a virus or piece of malware trying to install on your machine.

Will this upgrade benefit your business?

Some upgrades are only cosmetic. They look great and the developers pitch them as the latest and greatest, but without additional innovation on offer – you’re better off waiting for a version with some actual benefits.

Is the upgrade going to work with your current systems and processes?

If your project management software no longer talks to your scheduling software, you’ve got a problem. It’s reasonable to expect the upgrade to have gone through robust testing and bug fixes, but even the mega corporations are caught out in an instant.

Is your current solution still an option?

Developers cease support of older software versions after a certain date. In these cases, continuing to use an outdated version leaves your system vulnerable, without patches and security updates. If your software is at the end of its cycle, you’ll need to upgrade regardless. This, however, gives you the perfect opportunity to revise your selection and make some experienced decisions – upgrade or replace.

On the other hand, if the upgrade is going to have a positive effect on productivity, efficiency or customer satisfaction, definitely put it on your to-do list. Hold off for just a few days or weeks while your IT technicians research any conflicts that might arise.

Being an early adopter isn’t always the best idea. Sometimes you need to let your other software packages catchup – compatibility issues will always be an issue. It’s more important than ever before to take your time and research the upgrade to see how others have fared – before things come crashing down.

Call us for a quick compatibility check BEFORE you click any popups.

Don’t Fall For Phishing Scams

PhishingWhat is a Phishing Attack

Phishing is an attempt to trick you in giving out personal information such as bank accounts, passwords and credit card numbers.

They work by someone contacting you pretending they are from a legitimate business. They then ask you to provide or confirm certain confidential information.This contact can come in a variety of formats such as email, social media, phone call or text message. The messages are designed to look genuine and often use copied logos and branding from the legitimate company.

Once the scammer has this information they can then use this to carry out fraudulent activities such as emptying your bank account or using your credit cards.

How to Avoid a Phishing Attack

Some tips to help you avoid a phishing attack are:

  • Don’t reply to any suspicious looking emails or messages that ask you to confirm or update any information about your account whether they are from a coworker, finance company, friend, bank etc.
  • Don’t click or visit any links contained in suspicious emails or messages. Even if the website looks legit it will most likely infect your computer or do something worse.
  • Legitimate businesses, organisations and government departments will never send you a message to ask for your login information or sensitive personal information. If in doubt ring the organisation in question but don’t ring any numbers listed in the suspicious message.
  • Ignore emails that try to convey a sense of urgency and / or are requesting you to “Verify your account” right away due to ‘security issues’, ‘suspicious activity’ or ‘failed login attempt’ or the like.
  • Do not copy website links from suspicious messages and paste them into your web browser.
  • Never open or save any documents or attachments that come from possible spam and / or virus mails.
  • Never send confidential information about any of your accounts in an email.
  • If you’re unsure or suspicious about an email from a ‘friend’ or ‘colleague, call them  (ie don’t respond to the suspicious email) to see if that really was a legitimate message.

Further information is provided at the Australian Government’s Scam Watch website – http://www.scamwatch.gov.au/