ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

 

RANSOMWARE - WannaCry

 

Last Friday a new malware worm was released based on the leaked NSA exploits from earlier this year. This paired the cryptolocker variants with a way to automatically spread itself on an infected network and hold personal & business files hostage until a bounty is paid.

This attack has been so damaging, that Microsoft has issued special patches for legacy operating systems including Windows XP & Server 2003. Going forward this is not guaranteed however, so please reach out to ZR Systems if you still have legacy systems running so we can work on a migration path for you.

As ZR Systems Managed customers, we are pleased to let you know that we have had zero security incidences as a result of this attack. We work to protect you on multiple fronts depending on the technology you have chosen to utilize:

Sonicwall Gateway Protection – Customers with active subscriptions or on ZR Systems Firewall as a Service program have been protected at the gateway since mid April. For additional information on how sonicwall identified the issue, you can checkout their blog

Fortinet Gateway Protection – Customers with active Fortinet subscriptions have also been protected as of last week’s security update.

Webroot SecureAnywhere Antivirus – Every endpoint (Servers & Workstations) managed by ZR Systems has Webroot SecureAnywhere installed which utilizes a realtime scanning engine that captures new variants in real time before they spread across your network.

ZR Systems Group, LLC

Proactive System Patching – Patches are installed weekly for all systems under management, and monitored regularly by our Network Operations Center. The vulnerability used by this attack was patched by Microsoft back in March and was pushed out to all of our agents. Below is our global compliance statistics for our client base.

ZR Systems Group, LLC

System Backups – The last line of defense against these types of attacks are backups. ZR Systems works with every client to make sure they have backup technologies in use to ensure we can recover files, system data, and applications. There is also a premium service available that can run your systems on premise or in the cloud in case of any issues that arise.

Please be advised that even with these all in place, you and your staff are the most important line of defense in securing your business from threats like WannaCry. If you have any questions about a suspicious e-mail or website, please contact our Help Desk at (808) 369-1000.

Thank you,

ZR Systems Group, LLC

 

Additional References:

http://www.telegraph.co.uk/news/2017/05/12/nhs-hit-major-cyber-attack-hackers-demanding-ransom/

http://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday

Continue reading
0 Comments

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

Continue reading
0 Comments

Exploits From the NSA are Now on the Black Market

Exploits From the NSA are Now on the Black Market

If you panic in the event of a hacking attack, imagine how the National Security Agency (NSA) feels knowing that some of its exploits are for sale on the black market. While there isn’t any proof that the NSA has been breached, there’s evidence to suspect that their exploits are available for purchase on the black market. This means that a willing hacker could get their hands on government-grade hacking tools--a dangerous concept.

Recent Comments
Jemima Carter
Officials of the state must take quick actins for resolving of this problem from many people face troubles. Hirers of paper writin... Read More
Wednesday, 10 October 2018 07:15
Ursa Lloyd
Black market is a major problem for owners of legal markets that lead them to get losses in businesses. Officials of the whole wor... Read More
Thursday, 01 November 2018 07:15
Continue reading
2 Comments

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

Continue reading
0 Comments

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Best Practices Cloud Hosted Solutions Windows 10 Backup Technology Hackers Office Microsoft Business Computing Business Network Security Disaster Recovery Workplace Tips Software Email Malware Upgrade VoIP Business Continuity Hardware Efficiency Server Data Alert Employer-Employee Relationship Windows Ransomware IT Services Quick Tips Mobile Devices Save Money Social Engineering Small Business Computer Operating System Business Management Remote Computing Microsoft Office Passwords Browser Network Hacking Virtualization Innovation Productivity Productivity Internet Health Managed IT Services communications Managed Service Provider Facebook Social Media Telephone Systems WiFi Mobility Password Flexibility Work/Life Balance Cloud Computing IT solutions Recovery Risk Management Marketing Communication Tech Support Private Cloud Networking Encryption Holiday Data Breach Bandwidth Application Cybercrime Artificial Intelligence Best Practice Customer Relationship Management Gmail Outsourced IT User Tips Google Office Tips Data Management Law Enforcement Smartphones Cybersecurity Meetings Smartphone HaaS DDoS Internet Exlporer Office 365 Windows 10 SaaS Windows 8 Distributed Denial of Service VPN IT Support Entrepreneur End of Support Fax Server OneNote Android Tablet Legal Collaboration Wireless Technology Managed IT Services Entertainment Electronic Medical Records Internet exploMicrosoft Evernote Biometric Security Assessment Bloatware Mobile Device Bring Your Own Device Budget Spam Blocking Politics Save Time Remote Monitoring Advertising Wireless Two-factor Authentication Phishing Television Tools Website Lithium-ion battery Mobile Device Management Business Intelligence Keyboard Miscellaneous Workers Customer Service Public Computer Scalability Saving Money Data recovery USB Employer Employee Relationship Public Cloud Telephone System Tablets Black Market Notifications Going Green Data Backup Social WIndows 7 Wi-Fi Hiring/Firing Excel Hybrid Cloud SharePoint Cryptocurrency Maintenance App Applications Troubleshooting Phone System Telecommuting Spam Worker IT Support eWaste Cryptomining BDR Hard Drives Computing Infrastructure Books Government Remote Work Social Networking Transportation Managing Stress Environment Database Shortcut Current Events Memory Consultant Education Big Data Settings Identity Theft Computers Rootkit Mobile Computing Chrome Techology Paperless Office Shadow IT Best Available Worker Commute Emergency Avoiding Downtime Files Credit Cards Firewall Vendor Management Business Technology Retail Network Congestion Automobile Patch Management User Error Fraud Two Factor Authentication

Blog Archive