Author Archives: Maria Koblish

Two-Factor Authentication: What Is It and Why Use It?

And the more security layers you have, the better.

Enabling two-factor authentication (2FA) adds a potent layer, making it harder for hackers to get into your accounts.

In a typical 2FA scenario, after a user enters a password, they will receive a one-time code via SMS on their phone which they will have to enter to proceed.

Although no security is 100% foolproof, 2FA can dramatically cut down the chances a hacker makes it into one of your accounts.

If you need food for thought, here are some cybersecurity statistics that may alarm you.

  • 61% of people use the same password across multiple accounts.
  • 81% of breaches are a result of weak password.
  • 47% of phishing emails are successful.

When you consider stats like these, the typical network appears ripe for a successful hacker attack.

By enabling two-factor authentication, you take back the advantage.

 

Get a free two-factor authentication consultation

Ready to learn how two-factor authentication can significantly improve your company’s network security? Get a free phone or video consultation with the cybersecurity experts at Thrive.

Facebook Quizzes = Identity Theft Risk?

Enjoy taking social media and Facebook quizzes? Beware of giving away too much personal information.

Even before the stay-at-home life we’re living now, social media quizzes have been very popular.

They typically take a nominal amount of time to complete, and it can be fun to compare your answers with those of all the other people who’ve taken the same quiz.

Now that many people have increased free time on their hands, these quizzes can be even more irresistible.

“While these social media and Facebook quizzes can seem harmless, these should typically be avoided,” said Aaron Allen. “These quizzes can ask for things like the name of your first pet, your childhood best friend, or your birth city. If you think about it, these are same types of things that are used for your security questions when you’re setting up, say, an online bank account.”

A popular questionnaire invites you to share a picture of every car you’ve ever owned. Tread carefully, because a common security question is, “What was your first car/vehicle?”

Other questions that could provide scammers personal content include:

  • What is your mother’s maiden name?
  • What is your date of birth?
  • What is your favorite color?
  • In which year did your graduate high school?
  • What is the name of the street you grew up on?

Quizzes aren’t the only place where you can overshare.

Blog posts, social media, and any public online forum are areas where you may unwittingly provide too much personal information.

“Always be vigilant online,” stressed Allen. “If you have a funny feeling about something, avoid it. You never know how information you share will be used – or abused.”

The FBI Warns of Increased Cyber Risks Surrounding the Coronavirus Pandemic

As the world’s population continues to be gripped with fear and anxiety over coronavirus, hackers are taking advantage of the climate to orchestrate a variety of cyber attacks.

The FBI recently issued a public service announcement warning of an increase in these attacks. These not only include email and fraud schemes mentioned in a previous public service announcement, but also attacks on remote desktop and virtual environments, as well as distance learning and education platforms.

“Cyber attackers take advantage of chaos,” advised Brian Walker. “And these unprecedented times can certainly be considered chaotic. These criminals are opportunistic, and they are taking advantage of the current climate to launch a wide assortment of campaigns. We ask our colleagues and clients to be prepared for an increase in scams and attacks.”

Remote environment vulnerabilities

There’s been a dramatic surge of employees working from home for companies with remote capabilities. And you bet cybercriminals are aware.

“For companies scrambling to get the required remote infrastructure set up to enable work-from-home for their employees, care must be taken when selecting software and hardware,” said Aaron Allen. “Only obtain these from trusted sources.”

“Thrive can help you set up your remote environment, as well as manage it and keep it secure against attacks.”

For companies who already have remote work capabilities for their employees, be on the lookout for scammers trying to gain access. Criminals have numerous tactics, including:

  • Phishing emails that try to get users to provide account credentials.
  • Attacks on remote desktop access vulnerabilities.
  • Brute force attacks.

Whether your company is setting up a remote environment or managing one, diligence and common sense – as well as an awareness of the variety of attacks that can be unleashed against your network – can help you stay safe.

Education technology attacks

Because most citizens have been ordered to stay home during this pandemic, schools have had to quickly shift to distance learning models. These provide convenient ways for students to continue their studies.

Unfortunately, these provide other vectors of attack for cybercriminals.

The FBI announcement described a 2017 attack on multiple United States school districts, where attackers breached networks and obtained sensitive records. These were used to threaten and extort students and their families.

Besides breaching networks, criminals can also focus on social engineering and email attacks to gain access.

As with any IT environment, security needs to be a number one priority.

“Thrive uses best-of-breed hardware and software to facilitate distance learning,” explained Walker. “Security is a prime consideration in everything we do. Unfortunately, criminals are targeting young students, who may not have the necessary experience to avoid sophisticated social engineering and phishing attacks.

“Both parents and teachers need to be aware of the attacks that are happening right now, so they can help students stay aware.”

Per the FBI’s Internet Crime Complaint Center (www.ic3.gov), here are some tips for staying safe.

Remote Working Tips:

Do:

  • Select trusted and reputable telework software vendors; conduct additional due diligence when selecting foreign-sourced vendors.
  • Restrict access to remote meetings, conference calls, or virtual classrooms, including the use of passwords if possible.
  • Beware of social engineering tactics aimed at revealing sensitive information. Make use of tools that block suspected phishing emails or allow users to report and quarantine them.
  • Beware of advertisements or emails purporting to be from telework software vendors.
  • Always verify the web address of legitimate websites or manually type it into the browser.

Don’t:

  • Share links to remote meetings, conference calls, or virtual classrooms on open websites or open social media profiles.
  • Open attachments or click links within emails from senders you do not recognize.
  • Enable remote desktop access functions like Remote Desktop Protocol (RDP) or Virtual Network Computing (VNC) unless absolutely needed.

Education Technology Tips:

Do:

  • Closely monitor children’s use of edtech and online services.
  • Research edtech service user agreements about data breach notifications, marketing, and/or selling of user data, data retention practices, and whether users and/or parents can elect to have student data deleted by request.
  • Conduct regular internet searches of children’s information to monitor the exposure and spread of their information on the internet.
  • Consider credit or identity theft monitoring to check for any fraudulent use of their child’s identity.
  • Research parent coalition and information-sharing organizations available online for those looking for support and additional resources.
  • Research school-related, edtech, and other related vendor cyber breaches, which can further inform families of student data and security vulnerabilities.

Don’t:

  • Provide exact information on children when creating user profiles (e.g., use initials instead of full names, avoid using exact dates of birth, avoid including photos, etc.)

View the full FBI Public Service Announcement – Alert #I-040120-PSA here:

https://www.ic3.gov/media/2020/200401.aspx

The public service announcement also gives tips for repelling Business Email Compromise attacks, and offers general vulnerability details to help keep you safe.

For more information, schedule a free consultation with Thrive! Get started by contacting Thrive today.

5 Cybersecurity Tips for Remote Workers

Working outside of the confines of your office – and internal network – may actually be liberating to many. The change of scenery may boost productivity and even allow you to be a tad bit more flexible in your work schedule.

While remote, you’ll need to keep maintain a high degree of focus and digital hygiene to help keep your data safe.

Here are five easy-to-follow cybersecurity tips for remote workers to help stay secure while working outside the office walls.

1. Be vigilant about Coronavirus-related attacks

Cybercriminals take advantage of unfortunate situations, and the current pandemic is no different. Attackers can pose as health officials requesting personal information. These can be in the form of calls, emails, and even texts.

2. Keep your devices and security software up to date.

Updates for hardware and software oftentimes contain security patches. Thus, it’s important to keep everything updated. If not, you run the risk of having vulnerabilities that can be exploited.

3. Utilize Multi-Factor Authentication.

Have the option to utilize Multi-Factor Authentication? Do it! Multi-Factor Authentication is essentially another layer of defense when it comes to accessing accounts. Every additional layer makes it that much harder for attackers to get at your data.

4. Be careful when using public Wi-Fi.

When out and about, don’t just blindly connect to the first available Wi-Fi connection. Take a moment to carefully review your options. If you’re in an establishment, ask an employee for the correct network and, if needed, the necessary credentials.

5. Don’t forget about physical security.

While staying vigilant about your digital security, don’t forget about physical security. When taking a break, don’t leave your laptop or mobile devices out in the open.

 

 

How To Quickly Shift To A Work-From-Home Business Model To Maximize Productivity In Today’s Coronavirus Environment

As a business owner today, you are now facing unprecedented challenges to help deal with the coronavirus pandemic. You are asked to self-isolate and practice social distancing to “flatten the curve.” You are asked to allow your employees to work from home to reduce possible exposure and slow the spread of COVID-19.

These are all reasonable requests. However, as a business owner, you also need to maximize productivity, bring in revenue and try to grow your business in these demanding times. How can you accomplish these goals when your office is now a ghost town and productivity has fallen off a cliff?

The answer lies in setting up your office to function remotely. If you’ve never implemented a work-from-home policy before, it may seem like a whole different world. Managing an entirely remote workforce goes far beyond giving your employees a laptop and reminding them to check in every once in a while. After all, there are many factors most business owners haven’t ever had to consider, such as:

  • What technologies do I need?
  • How can my employees work from home without compromising the security of our network?
  • How can I make this new work environment as easy, comfortable and productive as possible?

We understand these are unique times. We know that “business as usual” is going to be quite different for an undetermined amount of time.

But together we can help you adjust to today’s new normal by giving you the tools, technologies and insights to create a secure and productive work-from-home business environment.

Here are three important considerations to getting you set up and running a successful work-from-home business:

  1. Don’t allow employees to use home computers or devices. Their mindset may be, “Well, I’m working from home so I may as well use my home computer.” This is a dangerous mistake. Our team works hard to ensure your company computers and network are secure and protected from malware, viruses and cyber-attacks. Their home computers and devices could be littered with tons of downloaded music, videos, images and more. Because it’s more exposed, it can invite malware into your network. Rather, provide a company-approved and secured computer/laptop for employees to use at home.
  2. Secure their WiFi access point. Without a secure WiFi access point, you’re essentially leaving a back door open to hackers. That’s because WiFi signals are often broadcast far beyond your employees’ homes and out into streets. Yes, drive-by hacking is popular among cybercriminals today.
    • A few tips for securing your employees’ WiFi access points:
      • Use stronger encryption and a more complex password
      • Hide your network name
      • Use a firewall
    • These security measures are not difficult to set up. But if you have any questions or need assistance, we will be happy to help get your employees set up remotely.
  3. Use a two-factor authentication VPN. VPN stands for virtual private network. It’s essentially a private, encrypted tunnel that goes direct to your IT network in your office. Ideally, you’ll want your VPN to support two-factor authentication. This means it’s doubly secure because your employees will need to call in to access the network. If you don’t have a VPN for your employees to use, you can consider other services. Be sure to give us a call and we will help you choose the best option for you and your company. While these other options are not as secure, at least they keep your home network from being exposed.

As business owners ourselves, we too are having to pivot and work differently than we ever have before. However, because we have the technology and infrastructure in place, we are still surprisingly productive.

In fact I’m writing this article today from my new home office.

Our team wants to help your business survive and thrive during today’s unique environment. If you and your IT team need extra hands right now…or solutions to help your employees work SECURELY from home…we have software tools, expert staff and resources we’d like to offer you to keep your business as productive as possible.

Please know that this is not a sales call but simply an outreach to help our fellow business owners stay afloat.

Maze Ransomware

Maze ransomware? A new ransomware strain? Well, that’s nothing new. Ransomware has been evolving for years, mutating into even more insidious versions and keeping business owners and security professionals on their toes.

But this new strain has been particularly troublesome.

So much so that the FBI recently warned against this so-called Maze ransomware. The threat actors have been known to threaten to publicly posting data stolen during its attacks if the victims refused to meet their demands. And that is what’s happening.

The hackers behind the attacks are known to pose as government agencies or even, ironically, security vendors. They have been targeting US organizations since late 2019. They’re M.O. differs from the run-of-the-mill ransomware attack, which typically just seeks to encrypt the data. With Maze, the criminals will exfiltrate the data before encryption.

“So, what do I do about this ransomware threat?” you might be asking.

Here are some tips you can follow to help keep your systems safe from maze ransomware and other threats:

  • Keep all systems patched and up-to-date. This helps ensure known vulnerabilities are shored up.
  • Multi-factor authentication can add a potent extra layer of security. Extra additional security checkpoints make it harder for someone to hack into a system.
  • Network monitoring can provide system-enhanced vigilance against unusual activity.
  • Provide cybersecurity awareness to your employees. If you use a Managed Service Provider or Managed Security Provider, invite them to your office(s) to provide training sessions on the latest cyber threats.
Don’t Lose Your “Green” to Cyber Thieves on St. Patrick’s Day

Relying on a four-leaf clover when it comes to your company’s cybersecurity can certainly lead you to trouble. The fabled “luck o’ the Irish” can only take you so far in the IT realm. (Yes, not very far.)

Take matters into your own hands!

Cybercrime is at an all-time high

Phishing. Ransomware. Data breaches.

Cybercriminals are out to steal your credentials, data and profits. It’s their “business.” And business has been good.

According to Cybersecurity Ventures, cybercrime is expected to reach $6 trillion in annual damages by 2021.

And even if your network is breached, you may not know it right away.

Per IBM, the average time it took organizations to identify a breach in 2019 was 7 months!

Imagine the damage that could be caused during that time. And when the news hits the public and your clients, the damage to your reputation could be a big blow, one from which it could take a long time to recover.

Oh, and don’t forget regulatory fines, cleanup costs, data restoration fees, and other expenses that can really add up. A lesson learned from the Atlanta ransomware attack is that the costs in the aftermath can far overshadow any initial losses, such as ransom payments for ransomware.

 

Don’t rely on luck for your cybersecurity

Thrive offers a Managed NextGen Firewall and UTM service, among other cybersecurity safeguards. 

“We know cybersecurity is important, and we also know it’s a highly complex issue,” said Brian Walker. “That’s why we put together an incredible, comprehensive security offering to help businesses that want to stay secure but may not have the extra manpower nor expertise to fully defend against the ever-evolving cyberthreats coming in from all angles.”

Thrive’s Managed NextGen Firewall covers all the cybersecurity bases for your organization. Because it’s fully managed by us, you can keep your focus on what you do best — your business.

“Managed services are getting more and more popular with business owners,” explained Aaron Allen. “You can promptly start reaping the benefits of an IT service — in this case cybersecurity — without the need for a protracted ‘ramping-up’ process, where you have to build up the infrastructure, hire the necessary talent, and get everything working as a cohesive unit.”

“There’s no luck involved here,” added Walker. “We’re serious about security.”

Get protected!

There’s no better time than now to get started protected your data, your business, and your people.

Contact us today for a free cybersecurity consultation.

 

Coronavirus and the Need to Accommodate a Flexible Workforce

Thrive has been closely monitoring the coronavirus situation. Due to a variety of factors, many businesses now face the challenge of accommodating a flexible workforce.

While employees of these companies may be looking forward to the irregular scheduling and a change of scenery during the work week, business owners and IT staff know this scenario will put their remote access, management and security to the test.

Some businesses are equipped with remote access capabilities; many are not.

Companies equipped for remote computing may only be set up to let just a select portion of their staff work remotely. A sudden upsurge of people needing to work from home or elsewhere can tax IT personnel, who will need to rapidly provision and provide appropriate security to support these new remote workers.

Speaking of security, this may become a big issue to organizations. After all, cybercriminals thrive on chaos, and they may launch cyber attacks — such as phishing emails and other deceptive communication — to gain account credentials, breach the network, or install nasty malware like ransomware.

Thrive is here to help.

Our team is here to help support your business. Please contact us today if you need assistance, support, or the guidance to make smart IT choices during these unpredictable times.

Comprehensive Cybersecurity, from Endpoints to Inboxes

Ransomware…

Phishing…

Data breaches…

Business Email Compromise…

It seems there’s always something in the news about a new strain of malware, or a breached network, or a computer system locked down and held for ransom, or an email deception that’s led to a loss of hundreds of thousands of dollars…

The threats are real.

The losses are mounting

Cybercrime is at all-time high.

And there’s no sign of slowdown.

Comprehensive cybersecurity is a corporate priority

More and more business leaders are recognizing the need to up their security game.

But the threats coming from around the globe are constantly evolving. It takes vigilance, a dedicated team, best-of-breed hardware and software – as well as a continual effort to analyze the latest trends and tactics of the enemy.

This all takes time and money. And you have a business to focus on.

“Thrive provides complete security for your whole network,” said Brian Walker.

“We realize security is one of the biggest challenges our clients face, and we’ve put together a comprehensive offering that will keep them protected from the unimaginable threats coming from all angles.”

“Per Gartner, cybersecurity spending worldwide is expected to hit $133.7 billion in 2022. We want to provide cybersecurity that’s both extremely effective and cost-effective. Thrive offers a fully managed service that includes all of our cybersecurity-based offerings, and is perfect for small- to medium-sized businesses across all industries.”

 

Anyone can be a target

You may have seen the stories of the large corporations getting hit by cyberattacks. While these companies may be very attractive to attackers, the truth is the SMB sector bears the brunt of the assault.

Because of time, budgetary, or personnel constraints, small and medium businesses may not have the most up-to-date or insurmountable network security. And hackers are very aware.

“Other big targets include those organizations with valuable data,” explained Walker. “Health professionals deal with patient data. Likewise, law firms work with plenty of sensitive information. And financial businesses can literally be a treasure trove if their networks are breached. Security is of utmost importance to these professionals. But the truth of the matter is, anyone can be a target.”

 

Overlapping layers of security

“One of the best ways to defend against the numerous cyber threats out there is a series of layered defenses,” said Aaron Allen. “Managed NextGen Firewall is comprised of overlapping layers of security, encasing your network with powerful protection. If one layer should ever fail, the other layers will be ready to deflect the attacks.”

These Iayers for comprehensive cybersecurity include:

  • Proactive monitoring
    State-of-the art monitoring allows Thrive’s cybersecurity team to detect anomalies and trouble signs so they can proactively address issues before they lead to downtime and big trouble.

  • A secure and managed network
    With increasingly complex user computing demands and the threat of business-ending ransomware and other cyberattacks, the task of managing a company’s network can certainly be formidable. Thrive can configure and manage cutting-edge firewalls and switches, and keep your access points secure, to ensure your staff stays safe and ultra-productive.

  • Email protection
    Email is a huge attack vector. Malicious hyperlinks and innocuous-looking attachments with nasty payloads lurk in inboxes, ready to be clicked and opened. Thrive’s Managed NextGen Firewall utilizes advanced protection, including protection at the DNS level, to help keep your users safe. By severing pathways to malicious sites and ransomware command & control servers, Thrive’s Managed NextGen Firewall effectively neuters many email-based attacks.

  • Defense, in and out of the perimeter
    Properly protecting each device in your network can be challenging. Thrive’s highly skilled techs and sophisticated infrastructure provide the expertise and economy of scale to effectively manage and monitor your whole network, whether you’re a small, focused group or a larger team spread across multiple sites. Thrive’s advanced monitoring allows our team to protect your personnel – whether they’re in the network or beyond in the field.

 

Ready to get cyber-secure with comprehensive cybersecurity?

“Our security experts maintain all your cybersecurity hardware and software, and they stay on top of the latest trends and attacks.”

“This allows you to remain laser-focued on your business and mission. Should you ever need assistance, you’ll have a dedicated rep as well as access to our 24×7 help desk personnel.”

Ready for the ultimate in fully managed network protection? Contact Thrive today.

“We’d love to help you develop a game plan to get secure,” said Walker. “From endpoints to inboxes, we’ll have you covered with comprehensive cybersecurity.”

 

PwndLocker Ups the Ante in Ransoms

We’ve written about Big Game Hunting, where cybercriminals focus on attacking high-value targets instead of a host of smaller targets. We’ve also noted the increasing amounts of ransoms demanded in ransomware attacks in recent years.

A segment of attackers has certainly been on a quest for bigger and bigger ransoms. A new ransomware, dubbed PwndLocker, follows this disturbing trend.

PwndLocker has been hitting local governments and large enterprise targets, requesting eye-watering bitcoin ransoms ranging from $175,000 to over $660,000, per Bleeping Computer.

Also per Bleeping Computer, using a sample shared by renowned security researcher MalwareHunterTeam: PwndLocker, upon being unleashed on a network, attempts to shut down various Windows services. These include Microsoft SQL Server, IIS, Veeam, as well as popular security applications like Sophos, McAfee, and Malwarebytes.

Other targets for shutdown include backup applications, database servers, and commonly used applications such as Word, Excel, and Firefox.

After shutting down processes and apps, and clearing out Shadow Volume Copies that could help with restoring data, the PwndLocker ransomware will start encrypting files.

The ransom note left behind includes payment details and even allows for the complimentary decryption of two files as a show of good faith!

 

Security is a priority

Network security is of utmost importance when ransomware like PwndLocker is being used by attackers.

“Whether you have a small business or a large corporation, you need to make security a priority,” said Brian Walker.

“While the attackers behind PwndLocker are apparently going for larger targets, many cybercriminals are quite indiscriminate.”

“In fact, small and medium businesses can be favored targets because they may not have the level of security that larger organizations typically have. Most smaller businesses won’t be able to pony up extremely large ransoms like the mega-corporations can, but if the attackers can successfully disable multiple smaller companies and make them pay, it can add up.”

“Layering your security is one of the best things you can do to protect your data and your people,” said Aaron Allen. “Attackers will use a variety of tactics, including social engineering, where they utilize campaigns of deceptive emails and messages to infiltrate a network.

“By having multiple defenses — including comprehensive backups of vital data — you create a much more powerful defense than just relying a single security appliance or software.”

“It’s time to strengthen your security,” stressed Walker. “Schedule your free consultation by filling out the form below. We’ve just recently been recognized in the ‘Elite 150‘ managed service providers by CRN. Whether you want us to manage a portion of your security or all of it, we’re here to help you stay safe.”