ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

 

RANSOMWARE - WannaCry

 

Last Friday a new malware worm was released based on the leaked NSA exploits from earlier this year. This paired the cryptolocker variants with a way to automatically spread itself on an infected network and hold personal & business files hostage until a bounty is paid.

This attack has been so damaging, that Microsoft has issued special patches for legacy operating systems including Windows XP & Server 2003. Going forward this is not guaranteed however, so please reach out to ZR Systems if you still have legacy systems running so we can work on a migration path for you.

As ZR Systems Managed customers, we are pleased to let you know that we have had zero security incidences as a result of this attack. We work to protect you on multiple fronts depending on the technology you have chosen to utilize:

Sonicwall Gateway Protection – Customers with active subscriptions or on ZR Systems Firewall as a Service program have been protected at the gateway since mid April. For additional information on how sonicwall identified the issue, you can checkout their blog

Fortinet Gateway Protection – Customers with active Fortinet subscriptions have also been protected as of last week’s security update.

Webroot SecureAnywhere Antivirus – Every endpoint (Servers & Workstations) managed by ZR Systems has Webroot SecureAnywhere installed which utilizes a realtime scanning engine that captures new variants in real time before they spread across your network.

ZR Systems Group, LLC

Proactive System Patching – Patches are installed weekly for all systems under management, and monitored regularly by our Network Operations Center. The vulnerability used by this attack was patched by Microsoft back in March and was pushed out to all of our agents. Below is our global compliance statistics for our client base.

ZR Systems Group, LLC

System Backups – The last line of defense against these types of attacks are backups. ZR Systems works with every client to make sure they have backup technologies in use to ensure we can recover files, system data, and applications. There is also a premium service available that can run your systems on premise or in the cloud in case of any issues that arise.

Please be advised that even with these all in place, you and your staff are the most important line of defense in securing your business from threats like WannaCry. If you have any questions about a suspicious e-mail or website, please contact our Help Desk at (808) 369-1000.

Thank you,

ZR Systems Group, LLC

 

Additional References:

http://www.telegraph.co.uk/news/2017/05/12/nhs-hit-major-cyber-attack-hackers-demanding-ransom/

http://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday

Continue reading
0 Comments

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Alert: LastPass Vulnerability Found. Is Any Password Manager Safe?

Thanks to one of Google’s researchers with the Zero Day Project, it has been discovered that LastPass has a major vulnerability as a result of a major architectural problem. This news comes on the heels of many other flaws the same researcher discovered within LastPass. However, based on what the researcher claims, these vulnerabilities were much less serious than his latest discovery.

Continue reading
0 Comments

Exploits From the NSA are Now on the Black Market

Exploits From the NSA are Now on the Black Market

If you panic in the event of a hacking attack, imagine how the National Security Agency (NSA) feels knowing that some of its exploits are for sale on the black market. While there isn’t any proof that the NSA has been breached, there’s evidence to suspect that their exploits are available for purchase on the black market. This means that a willing hacker could get their hands on government-grade hacking tools--a dangerous concept.

Recent Comments
Jemima Carter
Officials of the state must take quick actins for resolving of this problem from many people face troubles. Hirers of paper writin... Read More
Wednesday, 10 October 2018 07:15
Ursa Lloyd
Black market is a major problem for owners of legal markets that lead them to get losses in businesses. Officials of the whole wor... Read More
Thursday, 01 November 2018 07:15
Continue reading
2 Comments

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

Continue reading
0 Comments

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Alert: Microsoft’s Latest Patches Address 27 Vulnerabilities

Microsoft recently issued security patches to fix 27 vulnerabilities, many of which are critical in nature. The vulnerabilities are significant and popular titles are affected like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. Microsoft users that ignore these security patches are putting their system at unnecessary risk.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Technology Best Practices Cloud Business Computing Hosted Solutions Backup Windows 10 Network Security Hackers Microsoft Office Software Business Hardware Workplace Tips Disaster Recovery Computer Email Upgrade Server Data Business Continuity Efficiency Quick Tips Windows Malware VoIP IT Services Microsoft Office Alert Mobile Devices Save Money Network Managed IT Services Outsourced IT Small Business Employer-Employee Relationship Ransomware Miscellaneous Business Management Passwords Cybersecurity Browser Hacking Social Engineering Internet Productivity Operating System Remote Computing communications Managed IT Services User Tips Facebook Social Media WiFi Windows 10 Mobility Password Virtualization Productivity IT Support Cloud Computing Innovation Telephone Systems Communication Health Office 365 Managed Service Provider Application Risk Management Spam IT Support Customer Relationship Management Google Private Cloud Encryption Gmail Holiday Smartphone Smartphones Cybercrime Artificial Intelligence Best Practice Recovery Office Tips Education Data Management Law Enforcement Marketing IT solutions Processor Meetings DDoS Tech Support HaaS Internet Exlporer Phishing Networking Flexibility Work/Life Balance Staff Bandwidth Collaboration Data Breach Display Data Backup Big Data Internet exploMicrosoft Phone System Cryptocurrency Employer Employee Relationship Mobile Device App Politics Bring Your Own Device Manufacturing Help Desk Telecommuting Hard Drives Emergency Advertising Wireless Managing Stress Lithium-ion battery Maintenance Cryptomining Social Networking Hiring/Firing BDR Keyboard Mobile Device Management Cabling Employee/Employer Relationship Remote Work Memory Patch Management Consultant Database Worker Scalability Current Events USB Mobile Computing Chrome Cables Infrastructure Identity Theft Transportation Public Cloud Best Available Black Market Notifications Avoiding Downtime Shortcut Rootkit Users Wi-Fi Going Green Settings SharePoint Virtual Private Network Credit Cards Computers Hybrid Cloud Vendor Management Applications Paperless Office IT Infrastructure Network Congestion Troubleshooting Windows 8 Vendor eWaste Remote Workers Fraud Entrepreneur Firewall SaaS Computing Infrastructure Retail Business Technology Windows 7 Books Tablet Government Managed Service Environment Managed IT Service OneNote Two Factor Authentication Android Windows Server 2008 R2 Bloatware Managed Services Provider Evernote Techology Assessment Worker Commute Remote Monitoring Shadow IT Biometric Security Spam Blocking Tools Files Website Two-factor Authentication Electronic Medical Records Television Automobile Budget Saving Money Hard Drive Business Intelligence User Error Distributed Denial of Service Workers Save Time Public Computer VPN Data Storage Data recovery Tablets End of Support Fax Server WIndows 7 Customer Service Telephone System Social Legal Entertainment Excel Wireless Technology Training