Little Dog Tech Logo
CALL US
515-422-1995
5946 Ashworth Rd.
West Des Moines, IA 50266
  • Home
  • Remote Support
  • Services
    • Residential Services
    • Business Services
  • Pricing
  • About
  • Reviews
  • Contact Us
  • Blog
  • Partners

What Hackers Target In Small Businesses

March 10, 2020 by Paul Schwegler

Hackers today have many ways to attack small businesses and business owners. Many attempt to use technology to send malware, viruses, or phishing attacks; or use information to con owners and employees into handing over more information than they should.

One or more of these techniques can be combined with gaining physical access to steal from vulnerable firms. Identifying precisely how criminals target businesses and what they deem most valuable can help to protect from the most devastating attacks out there.

Remaining vigilant and informed is one of the most vital things you can do as a business owner to protect your assets and reputation.

Extortion

Different types of attacks tend to rise and fall in popularity. Fifteen years ago, computer worms were the most common attack that businesses faced. Security software wasn’t as advanced or as widely used at it is today. Computer worms were, at the time, an exceptionally low-cost and efficient way to inflict the maximum amount of damage for minimum cost.

Today ransomware has seen an unfortunate boom in popularity. This technology aims to encrypt the target’s files on their personal computer. This technique denies the victim access and charges a large fee in exchange for the key to retrieve the victim’s own data.

The attack has worked so often because it requires minimal effort and can be used again and again. Many businesses have no option but to pay because the data is worth far more than the ransom demand the hackers have made.

The best defense against ransomware attacks, in addition to strong online security, is an up-to-date offsite backup — one that is tested to work reliably.

Targeting Customer Records

One of the most important things for your firm to take care of is your customer data records. Records which include names, dates of birth, and other personally identifying details. These details are extremely valuable to hackers or criminals who, either use them personally or sell them on to someone who will.

Many regions have strict laws and guidelines about how this information must be stored, accessed and protected. Failing to follow these can result in severe penalties that could devastate any company.

Targeting Financial Information

Like personal information, a small business must take extreme care when storing customer financial information. Sensitive details such as credit card or banking information are a key target for hackers looking to steal money fast.

The impact on your business reputation following a breach of financial data will be severe and devastating. Even a simple mistake can require years of advertising and great PR to repair. Many firms have failed to recover after losing the trust of their customers.

Social Engineering

Most firms today run good IT security packages to protect against online attacks and other forms of malware. Attackers often know to take their methods offline to achieve the best results.

Whether posing as a supplier, customer, or interested party; attackers can seek to gain information that you may be less than willing to hand over to a stranger. Small businesses can often be used to gather information on vendors and suppliers they do business with in order to attack them too.

Be particularly cautious of the information you provide when discussing business with individuals you haven’t spoken to before.

Keeping Small Business Safe

Each of these targets and attacks are just some of the most popular and hard-hitting attacks out there now. The list is forever changing, and the methods we use to protect against them always needs to change too.

Some can be defended against with great security, backups, and software. Others, such as social engineering, need you and your staff to stay up-to-date and remain vigilant about the major attacks affecting small business today.

If you need help tightening your businesses security, give us a call at (515)422-1995.

Filed Under: Business, Security Tagged With: Hackers, Malware, phishing, small business, Virus

Share:

More Than A Virus, Common Malware to Watch Out For

January 7, 2020 by Paul Schwegler

The term “virus” is often used to describe many different types of infection a computer might have. Virus, when used as a blanket term, can describe any number of potential computer programs. What these programs have in common are they are typically designed to cause damage, steal data, or spread across the network.

Malware describes software designed to act maliciously on a personal computer. The name ‘malware’ is a shorthand for ‘malicious software’ and describes exactly what it is. A computer virus is a single type of malware that can cause harm to your PC, but it is only one of many.

Adware

Short for advertising-supported software, adware is a type of malware that delivers advertisements to your computer. These advertisements are often intrusive, irritating, and often designed to trick you into clicking something you don’t want. A common example of malware is pop-up ads that appear on many websites and mobile applications.

Adware often comes bundled with “free” versions of software that uses these intrusive advertising to make up costs. Commonly it is installed without the user’s knowledge and made excessively difficult to remove.

Spyware

Spyware is designed to spy on the user’s activity without their knowledge or consent. Often installed in the background, spyware can collect keyboard input, harvest data from the computer, monitor web activity and more.

Spyware typically requires installation to the computer. This is commonly done by tricking users into installing spyware themselves instead of the software or application that they thought they were getting. Victims of spyware are often be completely unaware of its presence until the data stolen is acted on in the form of fraudulent bank transactions or stolen online accounts.

Virus

In technical terms a computer virus is a form of malware that is installed inadvertently, causing damage to the user. A typical virus may install a keylogger to capture passwords, logins, and bank information from the keyboard. It might steal data, interrupt programs, and cause the computer to crash.

Modern virus programs commonly use your computers processing power and internet bandwidth to perform tasks remotely for hackers. The first sign of this can be when the computer sounds like it is doing a lot of work when no programs should be running. A computer virus is often spread through installing unknown software or downloading attachments that contain more than they seem.

Ransomware

A particularly malicious variety of malware, known as ransomware, prevents the user from accessing their own files until a ransom is paid. Files within the system are often encrypted with a password that won’t be revealed to the user until the full ransom is paid.

Instead of accessing the computer as normal, the user is presented with a screen which details the contact and payment information required to access their data again.

Ransomware is typically downloaded through malicious file attachments, email, or a vulnerability in the computer system.

Worm

Among the most common type of malware today is the computer worm. Worms spread across computer networks by exploiting vulnerabilities within the operating system. Often these programs cause harm to their host networks by consuming large amounts of network bandwidth, overloading computers, and using up all the available resources.

One of the key differences between worms and a regular virus is its ability to make copies of itself and spread independently. A virus must rely on human activity to run a program or open a malicious attachment; worms can simply spread over the network without human intervention.

If you would like us to make sure your systems stay safe from malware, give us a call at (505)422-1995

Filed Under: Residential, Security, Tips Tagged With: infection, Malware, Virus, worm

Share:

Why Spam is a Small Business Nightmare

March 12, 2018 by Paul Schwegler

15 years after the world united to crack down on spam emails, we’re still struggling with overloaded inboxes. All that unwanted email continues to flood the internet, much of it targeted to small businesses, and the impact goes wider than you might think. Here’s the full breakdown of how modern spam works and how it’s hurting your business.

What is spam? Generally speaking, spam is any unwanted message that lands in your email, comes via text, social media messaging, or other communication platforms. It might be sent to your main business account, eg your ‘contact us’ email, or directly to your employees. Most of the time, spam is annoying but relatively innocent messages from another business inviting you to buy/do/see something. They’re newsletters (!), reminders, invitations, sales pitches, etc. You may know the sender and have a previous relationship with them, or they might be a complete stranger. Occasionally, spam may even be part of a cyber attack.

Why you’re getting spammed. Maybe you or your employee signed up for a newsletter or bought a $1 raffle ticket to win a car. Perhaps you got onto the mailing list accidentally after enquiring about a product, not knowing that simply getting a brochure sent through would trigger a spam-avalanche. Often there’s fine print that says they’ll not only use your details to send you their marketing, but they’ll share your details with 3rd parties so they can send you messages too. That single email address can be passed around the internet like wildfire, and before you know it, you’re buried under spam. Sometimes, and more than we’d like to think, your details are found illicitly, perhaps through a hacked website for example, like the recent LinkedIn or Yahoo leak. More often though, your email is simply collected by a computer ‘scraping’ the internet – scouring forums and websites for plain text or linked emails and selling them as prime spam targets. It’s easy to see how individual office employees receive an average of 120 emails daily, over half of which are spam!

More than annoying. We all know spam is annoying, but did you know it’s also resource hungry? Your employees are spending hours each week sorting their email, assessing each one for relevance and deleting the spam. Too often, legitimate emails from clients and customers get caught up and are accidentally deleted. Add in the temptation to read the more interesting spam emails and productivity drops to zero. On the other side of the business, your email server might be dedicating storage and processing power to spam emails, occasionally to the point where inboxes get full and real mail is bouncing out. While most spam is simply an unwanted newsletter or sale notice, there’s also the risk that any links may be a cyber-attack in disguise. After all, one click is all it takes to open the door to viruses, ransomware, phishing or other security emergencies.

Spam is a HUGE vector for Infections. Past being just annoying and wasting your time, e-mail spam has become a very effective vector for spreading malware or otherwise stealing information. You may be aware that you shouldn’t open unsolicited attachments, but that is not the only way to cause problems. Lately, I have seen a lot of messages that contain no malware, and don’t even link to a virus. This way, they can’t even be caught by spam or virus scanners. What they do however is take you to a fake login site like Facebook or Google that then asks for your credentials to log in and see a shared document…These can look very convincing but DON’T FALL FOR IT!

How to stop the spam. The 2003 Can Spam Act (a global set of anti-spam laws) requires all marketers to follow certain rules, like not adding people to mailing lists without permission, and always including an ‘unsubscribe’ link. So firstly, make sure you’re not accidentally giving people permission to email you – check the fine print or privacy policy when you sign up for a service. Next, look for the unsubscribe link at the bottom of the email. If the message is from a reputable company (Amazon, Facebook, Little Dog Tech…), it is best to use this unsubscribe link rather than mark it as spam. Unfortunately, not all of them include the link, or they hide it somewhere impossible to see. In that case, mark it as spam! I practice this daily and as a result only 1 or 2 spam messages a day.

Some other advice for avoiding spam:

  • Business e-mail should NOT be a free service such as Hotmail, Yahoo, AOL, or even Google. Not only are they not as secure as most businesses need, those are known domains and regularly attacked and spammed. If you set up a custom domain (like littledogtech.com), you are instantly creating an address that is completely unknown and new. Spammers can’t send mail to a domain they don’t know about! Setting up a custom domain is not as hard or expensive as it used to be.
  • Once you have that custom domain, format your business e-mail addresses to NOT have common names like ‘admin’ or ‘sales’ or ‘support’. These are easily guessed and added to lists. Also, include more than just the first name of your employees to make the address harder to guess. Use Robert.Johnson@company.com rather than bob@company.com.
  • Utilize a 3rd party mail filtering service to scan and categorize all mail for viruses or spammy content BEFORE it reaches your inbox. These systems can also filter out potential phishing messages by recognizing that something that may look like it is coming from a co-worker is not. Our clients that are on such a system enjoy GREATLY reduced spam in their inbox.

Filed Under: Cloud, Security, Tips Tagged With: e-mail, Malware, spam

Share:

WannaCry Ransomware Explained: Is Your Business At Risk?

June 12, 2017 by Paul Schwegler

WannaCry Ransomware Explained: Is Your Business At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning.

Among the most prominent victims were many NHS hospitals in the UK, affecting up to 70,000 individual devices such as essential MRI scanners and blood-storage refrigerators. But by the time it hit the news, it was too late – either your system was protected, or it was infected. Here’s how it all went so wrong.

What is WannaCry?

The WannaCry cyber-attack was a type of malware (the collective name for computer viruses & bad juju) called ‘ransomware’. Just like the name suggests, it’s actually a demand for money. Like all ransomware attacks, WannaCry encrypts your files and holds them hostage until you pay. In this case, the price was set at $300, payable with internet currency Bitcoin, and you had 3 days to pay before it doubled. If you didn’t pay, the ransomware threatened to delete your files permanently. It’s yet unknown how much money the WannaCry hackers have earned with their latest attack, but you can be sure plenty of people have paid the ransom. Even the FBI recommends paying the ransom, especially if the ransomed files are of a sensitive nature or weren’t backed up.

 

How It Spread So Fast

It seems WannaCry may be a ‘computer worm’ that self-replicates and spreads, rather than a phishing attack that needs to be activated with a click. So far, no common trigger has been identified, as is normally the case with phishing links. WannaCry moved rapidly from system to system, spreading out through the entire network, including all connected backups and storage devices. At the same time, it spread out to infect other networks, who then spread it further, and so on. Given the nature of the internet, it was everywhere within hours.

Why Some Businesses Were Safe

WannaCry could ONLY infect systems that have fallen 2 months behind in their Windows updates. This is because it was created to take advantage of a specific vulnerability in Windows, one which Microsoft patched months ago. Without that patch, the ransomware could waltz right past the firewall, past the anti-virus and directly into the system (the NHS were reportedly running Windows XP – no longer supported). Those running Windows 10 or a fully patched, recent version of Windows were completely unaffected – the virus literally had no way in

It just goes to show the importance of staying up to date. We haven’t seen a second spike in WannaCry attacks yet, but that doesn’t mean there won’t be one. A quick update could protect your business from weeks of downtime and lost revenue, making attacks like this a non-issue.

With our managed services, we can make sure you stay up to date – and protected. Give us a call today at 515-422-1995

Filed Under: Security Tagged With: Malware, Ransomware, security, Virus, WannaCry

Share:

Contact Form

Before submitting your question, you must review and agree to the Little Dog Tech Terms of Service.

Search for Something!

Click to see our BBB Report

FOLLOW US

VISIT US

Privacy Policy

Copyright © 2023 · Little Dog Tech · 5946 Ashworth Rd. , West Des Moines, IA 50266