How to Protect Your Business from the Locky Ransomware

As TrendMicro predicted, hackers are increasingly using ransomware to encrypt businesses’ files and hold them for ransom. As a result, headlines about these attacks abound in print and electronic media, making them seem almost routine. However, the ransomware known as Locky warrants attention. It encrypts just about every commonly used file type, including PDF, text, image (e.g., JPG, PNG, TIFF), …

Is It Better to Shut Down Desktop Computers or Let Them Sleep?

The end of workday is near and your employees are about to leave for the day. Is it better to have them shut down their desktop computers or simply let the machines slip into sleep mode? This question has been the subject of debate for many years. If you search the Internet, you will find discussions supporting both practices. So, …

How to Avoid Creating Weak Passwords

You have likely heard that using strong passwords is an integral part of protecting a company’s data. But do you know what makes a password strong or weak? To find out, here is a quick quiz: Take a look at the list of passwords below. (The quotes are not part of the passwords.) Which of the following are strong passwords? …

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

February 5, 2016, started out like any other day for the doctors, nurses, and other staff members at the Hollywood Presbyterian Medical Center in Los Angeles, California. But by the end of the day, many of them could no longer access or update patients’ medical records. Nor could they send or receive emails. When the hospital’s IT department investigated, it …

How to Avoid Falling Victim to Macro-Based Malware Attacks

Macro-based malware attacks are as tenacious as dandelions. Just when you think they are gone for good, they keep popping up. These days, they are popping up in the form of bogus shipping notices, supposedly from the United Parcel Service (UPS) or United States Postal Service (USPS), according to Webroot. Macros: The Good, the Bad, and the Ugly For more …

How to Back Up Data Using the File History Feature in Windows 10

There are many ways you can lose files and other valuable data. Your computer might crash or be attacked by malware. Your hard drive might fail. Even dropping a laptop or spilling coffee on it can lead to data loss. Experts recommend that you back up your data locally as well as to an offsite location, such as the cloud. …

How to Keep Your Files Safe from CryptoJoker

A new form of ransomware called CryptoJoker was discovered in January 2016. It uses the AES-256 algorithm to encrypt victims’ files and then demands a ransom for their release. CryptoJoker affects computers running Microsoft Windows operating systems. Although CryptoJoker is not widely distributed at this time, security experts have started warning people about it. Besides using a strong encryption method, …

What You Need to Know about Dorkbot to Keep Your Business Safe

The U.S. Computer Emergency Readiness Team (US-CERT) — a division within the U.S. Department of Homeland Security — issued a security alert about Dorkbot in December 2015. This botnet has infected more than 1 million computers running Microsoft Windows in over 190 countries, according to Microsoft. A botnet consists of a large number of computers and other devices under a …

Fitness Tracker Vulnerabilities and How to Deal with Them

If Fitbit Charge users were wearing their fitness trackers when they heard the news about Fitbit user accounts being hacked, they probably saw their heart rates increase. On January 6, 2016, BuzzFeed News broke the story on how cybercriminals hacked multiple Fitbit user accounts. They changed email addresses and usernames as well as tried to swindle Fitbit out of replacement …