How to handle Suspicious E-mail

Phishing, pronounced “fishing,” is a type of online identity theft that uses e-mail and fraudulent Web sites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. Follow these guidelines to help protect yourself from phishing scams sent through e-mail.

Read more

Published with permission from TechAdvisory.org. Source.

TAGS: , ,

What to do if you’ve responded to a phishing scam

If you suspect that you’ve responded to a phishing scam with personal or financial information or entered this information into a fake Web site, take these steps to minimize any damage.

Read more

Published with permission from TechAdvisory.org. Source.

TAGS: , ,

Manage and Collect Data Better with FormSpring

For businesses of all types and size, managing data online is critical to the smooth operation of a website. However, incorporating data collection programs can be time consuming, especially if any of your data is “time bound” – meaning it’s only valid and useful during a specific period of time.

Here’s a solution. FormSpring provides free and paid website data collection services that eliminate the need for additional programming or the purchase of additional software.

If your website includes contact or event registration forms, surveys, and the like, FormSpringprovides services ranging from a basic free option to more feature-intensive offerings with custom made forms based on your unique requirements. There’s no long-term registration contract, and you may cancel at any time. FormSpring also offers a 30-day money back guarantee.

It’s worth noting that the data is stored on FormSpring’s servers, so if you have special compliance requirements for privacy or security you might want to check to ensure you remain compliant.

Overall, FormSpring is a very useful website for companies or groups that need a hassle-free way to collect data through their website. Check out their free version of the plan or use the 30-day money back guarantee to explore whether FormSpring meets your data collection needs.

Published with permission from TechAdvisory.org. Source.

TAGS: , , ,

Beware the Kneber Botnet

A malicious piece of software making the rounds of news websites this week is believed to be behind the compromise of over 75,000 systems in over 2,500 international organizations – many of which are government agencies and large Fortune 500 companies.

Called the Knebner botnet after the name in the email used to register the initial domain used in the campaign to propagate the malware, the software infects computers and captures user login access to online financial services such as Paypal and online banks, social networking websites such as Facebook, and email. Infected computers can be centrally controlled from a master computer, which presumably harvests the data captured for nefarious means.

The Knebner botnet itself is not new. It’s based on the ZeuS botnet, and has gained prominence lately because it’s slipped under the radar of so many organizations. However, there are ways to prevent compromises from botnets – one of which is to have a proactive security system and policy in place. Our Managed Security customers have this assurance in place since we continuously protect their system from botnets and other malware. If you’re not sure that you’re protected, talk to us today.

Related articles:

Published with permission from TechAdvisory.org. Source.

TAGS: ,

Beware of Vulnerabilities in Windows and Office

Microsoft recently released a number of security bulletins and patches addressing vulnerabilities in Windows and Office that are of high risk to users. It’s widely believed that many will be exploited by hackers within the next 30 days. One of them could potentially allow hackers or malware authors to easily compromise systems by tricking users to download malicious AVI-formatted files. Others require nothing more than just visiting a website.Another specifically targets Powerpoint Viewer 2003, and opening a malicious .ppt file could affect your system.

This latest round of patches and vulnerability updates is really nothing new – although the sheer number made public in one day is notable. This highlights the need for a comprehensive security policy, because vulnerabilities do exist in even the most mundane or old versions of software. Customers under our Managed Services plan can rest easy since we monitor and update their computers as soon as these patches and advisories are released. Find out more about what we do to make your systems safe and secure. Contact us today.

Related links:

Published with permission from TechAdvisory.org. Source.

TAGS: , ,

SaaS Characteristics and Integration

SaaS has several characteristics that set it apart from other services:

  1. SaaS allows the access and use of commercially available software through a remote, network, or internet connection. This means that the software is not installed in the subscriber’s computer, but rather on the SaaS provider’s server. This also makes the software accessible to the subscriber regardless of his or her location.
  2. SaaS provides commercially available software, not custom made software, meaning that a particular software service is made available to multiple clients, so customization is limited to only what the software or SaaS provider allows.
  3. The SaaS provider shoulders the responsibility of updating the software, and subscribers can request updates, upgrades, and additional features.

Regarding implementation, SaaS architecture is classified into four “maturity” levels based on factors such as configurability, multi-tenant efficiency, and scalability.

  1. Level 1 is the “ad-hoc/custom” level, in which a modified version of a particular piece of software is offered to subscribers, which is then run on the provider’s host server. This level is requires the lowest maintenance.
  2. The second level offers more customization and allows subscribers to configure the metadata of a program. This then allows a customized version of the same software, based on the needs of the subscriber.
  3. Multi-tenant efficiency is added to the third maturity level, which means that the SaaS servers are made more conducive for subscribers to use separate instances of a single application.
  4. The fourth and most “mature” SaaS architecture offers all four factors, with the service reaching optimum efficiency.

Considering SaaS for your business? Let us help you sort through the details.

Published with permission from TechAdvisory.org. Source.

TAGS: , ,

Mariposa Botnet Masters Arrested

Spanish authorities report that they have arrested the masterminds behind a string of online criminal activities using the botnet dubbed Mariposa. Mariposa is the original name of a commercially distributed Do-it-Yourself malware kit, sold online for 800/1000 EUR for “wannabe” hackers.  Along with the arrest, authorities seized sensitive data belonging to about 800,000 users in 190 countries, gathered from an estimated 12M+ infected host computers on the Internet.

What’s particularly interesting is that the cybercriminals arrested were not themselves the author of the malware, nor were they any more techincally adept than many ordinary users. They simply had access to malware widely available on the Internet, and were able to conduct a crime of such a wide scale and reach.

This illustrates that it’s become easier for many cybercriminals to conduct their nefarious deeds online, and highlights the need for more vigilance on the part of law-abiding netizens in keeping their network secure from hackers and malware.

Is your network safe? Contact us to find out.

Related articles:

Published with permission from TechAdvisory.org. Source.

TAGS: ,

Is Your Disaster Recovery Plan Up To Date?

Businesses are constantly changing. Is your disaster recovery plan changing, too? It should be.

Every company can experience a business-altering event at any time:  floods, explosions, accidents, computer malfunctions—the list is endless.

If you have a disaster recovery plan, you’re prepared to prevent such events from disrupting your normal operations—or at least you were at the time you created the plan. But how long ago was that?

As your business has grown, it’s likely that your products and services, or at least the way you deliver them, has changed as well. For example, the increase in technology-based processes over the past few years has likely increased your reliance on the availability of systems and information for your business to function effectively.

These changes might necessitate a change in your disaster recovery plan. As a result, we recommend a regular review of your plan. If you make changes, these change should be tested and new processes documented so all employees can be trained accordingly.

Finally, keep in mind that reviewing your disaster recovery plan isn’t a one-time event. Because changes to your products and services, or the way you deliver them, are likely to continue, reviewing your disaster recovery plan should be a regular process.

If you’d like a professional review of your disaster recovery plan (or if you don’t have one in place at all), contact us today. We can help save your systems and data from the unthinkable.

Published with permission from TechAdvisory.org. Source.

TAGS: , , ,