Network Monitoring Methods

Network monitoring is an essential responsibility for businesses of all sizes.  Medium-sized and large companies typically have a network monitoring system in place either onsite or offsite in the cloud but what about small businesses?  This is exactly what hackers are asking when they are seeking to breach a network.

In the last few years small businesses have become (more…)

Scareware – Look before You Click

With the increased use of the Internet the FBI has become a very busy national security organization.  This is due to a new digital age of sophisticated criminals that are well versed in computer programming.  They use their skills to extort money from unsuspecting users and in other cases commit identity theft.  One of the primary ways they do this is by creating ‘scareware’

How Scareware Works

If you understand how cyber criminals operate then there is no need to be afraid of scareware.  First, let’s explain what scareware is and how it is used to scare you (more…)

Data Backup: A Life Saver

Lightning can strike any time, and in any form. It can be a power surge leaving your hard disk useless or an over flooded bathroom sink leaving your equipment blown out. It can also be as simple as lack of attention. Whatever the deal is, it will certainly bring one question to your mind – do you have a backup of your data? Sadly the answer usually is no. Many people lose several months and sometimes years of work in such situations.

Why you need a Backup

A backup is your safety net in case of a disaster. Data can be lost due to corruption such as unauthorized access, viral spyware, accidents and mistakes. Any of these can happen any time and cause you problems and not to mention – mental stress. To avoid such difficult situations it is best to get a (more…)

The Innocent User & His Kingdom of Viruses

Thrive Tech Blog - Facebook VirusIf you’re a Facebook user, odds are you’ve seen it. Joe Smith posts a new status that says something to the effect of, “Check out the picture I found of you.” It is followed by a link consisting of a series of random letters and numbers. Now, the dilemma ensues.

OMG! Joe has a picture of me?! OMG! I just have to see it. I know it looks shady and it might be a virus, but if there is even a chance that there is some random picture of me out on the Internet, it is totally worth the risk of costing my company countless IT engineering dollars too fight a potential virus.

The user can’t resist and decides to click the link. It produces a “Page Not Found” error. “Well maybe if I click on it 7-8 more times it will come up.”

At this point, that little bot that was downloaded on the first attempt now has 7-8 little bot friends. In a couple days they are going to have a web browser pop-up party on the user’s screen and their Google home page will be redirected to some site of questionable moral fiber.

The user isn’t going to report it right away because they are so embarrassed. When they do report it, they have been doing NOTHING but work for the past 2 weeks and would not even think of surfing Facebook during work hours. It is officially the anti-virus software and the IT administrator’s fault. Lengthy Safe Mode scans with software like Malwarebytes or SuperAntiSpyware find numerous infections in repeated scans eventually prompting the need for a full rebuild of the PC.

 

How can this be prevented

(more…)