ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

 

RANSOMWARE - WannaCry

 

Last Friday a new malware worm was released based on the leaked NSA exploits from earlier this year. This paired the cryptolocker variants with a way to automatically spread itself on an infected network and hold personal & business files hostage until a bounty is paid.

This attack has been so damaging, that Microsoft has issued special patches for legacy operating systems including Windows XP & Server 2003. Going forward this is not guaranteed however, so please reach out to ZR Systems if you still have legacy systems running so we can work on a migration path for you.

As ZR Systems Managed customers, we are pleased to let you know that we have had zero security incidences as a result of this attack. We work to protect you on multiple fronts depending on the technology you have chosen to utilize:

Sonicwall Gateway Protection – Customers with active subscriptions or on ZR Systems Firewall as a Service program have been protected at the gateway since mid April. For additional information on how sonicwall identified the issue, you can checkout their blog

Fortinet Gateway Protection – Customers with active Fortinet subscriptions have also been protected as of last week’s security update.

Webroot SecureAnywhere Antivirus – Every endpoint (Servers & Workstations) managed by ZR Systems has Webroot SecureAnywhere installed which utilizes a realtime scanning engine that captures new variants in real time before they spread across your network.

ZR Systems Group, LLC

Proactive System Patching – Patches are installed weekly for all systems under management, and monitored regularly by our Network Operations Center. The vulnerability used by this attack was patched by Microsoft back in March and was pushed out to all of our agents. Below is our global compliance statistics for our client base.

ZR Systems Group, LLC

System Backups – The last line of defense against these types of attacks are backups. ZR Systems works with every client to make sure they have backup technologies in use to ensure we can recover files, system data, and applications. There is also a premium service available that can run your systems on premise or in the cloud in case of any issues that arise.

Please be advised that even with these all in place, you and your staff are the most important line of defense in securing your business from threats like WannaCry. If you have any questions about a suspicious e-mail or website, please contact our Help Desk at (808) 369-1000.

Thank you,

ZR Systems Group, LLC

 

Additional References:

http://www.telegraph.co.uk/news/2017/05/12/nhs-hit-major-cyber-attack-hackers-demanding-ransom/

http://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday

Continue reading
0 Comments

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

Continue reading
0 Comments

Exploits From the NSA are Now on the Black Market

Exploits From the NSA are Now on the Black Market

If you panic in the event of a hacking attack, imagine how the National Security Agency (NSA) feels knowing that some of its exploits are for sale on the black market. While there isn’t any proof that the NSA has been breached, there’s evidence to suspect that their exploits are available for purchase on the black market. This means that a willing hacker could get their hands on government-grade hacking tools--a dangerous concept.

Recent Comments
Jemima Carter
Officials of the state must take quick actins for resolving of this problem from many people face troubles. Hirers of paper writin... Read More
Wednesday, 10 October 2018 07:15
Ursa Lloyd
Black market is a major problem for owners of legal markets that lead them to get losses in businesses. Officials of the whole wor... Read More
Thursday, 01 November 2018 07:15
Continue reading
2 Comments

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

Continue reading
0 Comments

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Hosted Solutions Windows 10 Backup Office Hackers Technology Microsoft Disaster Recovery Business Network Security Business Computing Software Email Upgrade VoIP Business Continuity Workplace Tips Mobile Devices Save Money Data Alert Employer-Employee Relationship Malware Ransomware Hardware Efficiency Quick Tips Passwords Browser Hacking Social Engineering Server Small Business Computer Windows Remote Computing IT Services Microsoft Office Social Media WiFi Telephone Systems Network Mobility Password Managed IT Services Virtualization Internet Innovation Health Operating System Managed Service Provider communications Business Management Facebook Productivity Artificial Intelligence Customer Relationship Management User Tips Best Practice Google Cloud Computing Gmail Office Tips Data Management Law Enforcement Smartphone Smartphones HaaS DDoS Internet Exlporer Productivity Office 365 Flexibility Data Breach Work/Life Balance Recovery Marketing IT solutions Risk Management Communication Tech Support Outsourced IT Networking Private Cloud Encryption Bandwidth Cybersecurity Holiday Application Cybercrime OneNote Social Networking Managing Stress eWaste Computing Infrastructure Books Memory Government Consultant Managed IT Services Evernote Electronic Medical Records Environment Mobile Computing Chrome Shortcut Assessment Education Big Data Best Available Settings Spam Blocking Avoiding Downtime Two-factor Authentication Save Time Techology Shadow IT Television Worker Commute Emergency Files Meetings Business Intelligence Workers Windows 8 Retail Public Computer Automobile Patch Management Entrepreneur User Error Data recovery Telephone System Employer Employee Relationship Distributed Denial of Service Tablet VPN End of Support Fax Server Data Backup Hiring/Firing Legal Collaboration Bloatware Wireless Technology App Entertainment Internet exploMicrosoft Telecommuting Worker Mobile Device Remote Monitoring Tools Bring Your Own Device Website Budget BDR Politics Transportation Advertising Wireless Remote Work Lithium-ion battery Mobile Device Management Saving Money Current Events Keyboard Computers Miscellaneous Identity Theft Customer Service Rootkit Scalability Tablets USB Firewall Social Public Cloud WIndows 7 Credit Cards Vendor Management Black Market Excel Notifications Wi-Fi Going Green Network Congestion Fraud Two Factor Authentication Spam Hybrid Cloud SharePoint Phone System IT Support Maintenance SaaS Applications Troubleshooting Hard Drives IT Support

Blog Archive