Archive for the ‘Network Security’ Category

North Korea Implicated in Ransomware Attack on Major U.S. News Media

Attack Stops Wall Street Journal and New York Times Presses As reported by numerous news organizations, such as CyberheistNews and Forbes, North Korea has been implicated in a Ransomware attack that prevented the distribution of many leading U.S. newspapers, including the Wall Street Journal, New York Times, Los Angeles Times, Chicago Tribune and the Baltimore Sun. Tribune Publishing first detected the malware within corrupted files said to contain the Ryuk fingerprint of a ‘.ryk’ extension. Recommendations to protect your network. Educate Users – put them through security awareness training so they never click the link, fall for the scam, open the…

Read More »

Facebook Breach and How it Affects Your Company’s Security

The recent Facebook security breach has been covered extensively not only on technical sites but also in the mainstream news. It is estimated over 50 million Facebook accounts have been compromised. The information they accessed included the email address and password associated with Facebook accounts. What is critical is to understand how this can affect your company’s security. Though many consider Facebook an individual’s and not a company’s domain, the spillover can have direct effects on your company’s security. News agencies are reporting the Facebook hack can be directly traced to the increase in the number of compromised Microsoft email…

Read More »

Definition of Ransomware

Ransomware is a subset of malware in which the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. The motive for ransomware attacks is nearly always monetary, and unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions on how to recover from the attack. Payment is often demanded in a virtual currency, such as bitcoin so that the cybercriminal’s identity isn’t known. View full article: What is Ransomware by TechTarget

Rackspace Notification and Tips About Phishing Email Attempts

This information was provided to all Rackspace partners though it applies to any email environment. In addition there are some great tips included that again apply to all email environments. “Our team identified emails which were sent to random users on our hosted email environment.  These emails state that the email address has been flagged for suspicious activity and the user is required to click a link to authenticate the account. Please note that these emails are NOT legitimate emails sent by our email hosting service.  If you notice emails that contain suspicious links or attachments, please remind your users…

Read More »

Fortinet’s Proactive Protection

MTBW Services, Inc. takes a long hard look at each company we partner with before we ever bring a product through your doors. This recent e-mail from Fortinet is exactly why we STRONGLY recommend the enterprise bundle, which includes FortiSandbox, protection for every Fortinet product we sell. “As you may know, on May 12, hackers launched a global ransomware campaign against tens of thousands of corporate and governmental targets. The ransomware encrypts files on an infected computer and asks the computer’s administrator to pay a ransom in order to regain access. The ransomware attack is apparently spreading through a Microsoft…

Read More »

Critical Ransomware Patch: This is not a test.

The IT systems of around 40 NHS organizations across the UK have been affected by a ransomware attack. Non-emergency operations have been suspended and ambulances are being diverted as a result of the attack. Non-health focused organizations around the world are also being affected, including Spanish telecommunications firm Telefonica which reported a serious issue affecting its internal network as a result of a cyberattack earlier today. The strain is called “Wanna Decrypt0r” which asks $300 from victims to decrypt their computers. Bleepingcomputer said: “Whoever is behind this ransomware has invested heavy resources into Wana Decrypt0r’s operations. In the few hours…

Read More »

Protecting Your Network: The Human Element

A network is only as strong as the weakest link! Regardless of the implementation of all Best Practices regarding technology solutions for network security, the human element is one of the most vulnerable and commonly the most omitted. Kaspersky, one of the leading security providers in the industry, has released its Top 10 Tips for Educating Employees. It’s well worth the time perusing this document for tips on how to fortify your network from the end user perspective.

Recent Real World Experience: Combating Ransomware Infection Part I Principle of Least Privilege

Just this past weekend MTBW Services was called upon to assist in the recovery from a Ransomware infection. Though never a pleasant way to spend a weekend, from our experience assisting scores of other companies infected with this insidious Malware, we were able to clean and recover the data affected. We have released an extensive checklist regarding protections in the battle against Ransomware – Ransomware Evolutions and Derivatives – but there are a few from this most recent battle that merit reiteration. The Principle of Least Privilege is a critical component in combating the ravages of Ransomware. The Principle of…

Read More »

MTBW Recognized By International Unified Threat Management (UTM) Firm Fortinet

Large Technology Incubator Benefits From Fortinet’s Virtualized Security Solutions Frederick Innovative Technology Center Uses Fortinet’s FortiGate UTM Appliances to Improve Network Performance and Provide Partitioned Security for its Customers SUNNYVALE, Calif, – Jan 14, 2008 – Fortinet – a pioneer and leading provider of unified threat management (UTM) solutions – today announced that the Frederick Innovative Technology Center Inc. (FITCI), a technology incubator for Maryland entrepreneurs, has deployed Fortinet’s UTM security and management appliances to help improve network performance and provide an array of virtualized security services to business customers. The FITCI incubator provides a low-cost environment for start-ups to…

Read More »