ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

 

RANSOMWARE - WannaCry

 

Last Friday a new malware worm was released based on the leaked NSA exploits from earlier this year. This paired the cryptolocker variants with a way to automatically spread itself on an infected network and hold personal & business files hostage until a bounty is paid.

This attack has been so damaging, that Microsoft has issued special patches for legacy operating systems including Windows XP & Server 2003. Going forward this is not guaranteed however, so please reach out to ZR Systems if you still have legacy systems running so we can work on a migration path for you.

As ZR Systems Managed customers, we are pleased to let you know that we have had zero security incidences as a result of this attack. We work to protect you on multiple fronts depending on the technology you have chosen to utilize:

Sonicwall Gateway Protection – Customers with active subscriptions or on ZR Systems Firewall as a Service program have been protected at the gateway since mid April. For additional information on how sonicwall identified the issue, you can checkout their blog

Fortinet Gateway Protection – Customers with active Fortinet subscriptions have also been protected as of last week’s security update.

Webroot SecureAnywhere Antivirus – Every endpoint (Servers & Workstations) managed by ZR Systems has Webroot SecureAnywhere installed which utilizes a realtime scanning engine that captures new variants in real time before they spread across your network.

ZR Systems Group, LLC

Proactive System Patching – Patches are installed weekly for all systems under management, and monitored regularly by our Network Operations Center. The vulnerability used by this attack was patched by Microsoft back in March and was pushed out to all of our agents. Below is our global compliance statistics for our client base.

ZR Systems Group, LLC

System Backups – The last line of defense against these types of attacks are backups. ZR Systems works with every client to make sure they have backup technologies in use to ensure we can recover files, system data, and applications. There is also a premium service available that can run your systems on premise or in the cloud in case of any issues that arise.

Please be advised that even with these all in place, you and your staff are the most important line of defense in securing your business from threats like WannaCry. If you have any questions about a suspicious e-mail or website, please contact our Help Desk at (808) 369-1000.

Thank you,

ZR Systems Group, LLC

 

Additional References:

http://www.telegraph.co.uk/news/2017/05/12/nhs-hit-major-cyber-attack-hackers-demanding-ransom/

http://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday

Continue reading
0 Comments

Monsters aren’t Real, But Ransomware Sure Is!

Monsters aren’t Real, But Ransomware Sure Is!

Halloween is a time when creatures like ghosts and goblins are celebrated rather than feared. Even adults use the holiday to lighten up and enjoy themselves, as they’re well aware that the monsters so often seen and heard about in stories are fictional. Unfortunately, the fact remains that there are monsters hiding in plain sight all around us, playing on the fears and misfortune of others--namely, hackers.

Continue reading
0 Comments

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

Continue reading
0 Comments

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

b2ap3_thumbnail_ransomware_hostage_400.jpgModern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called CryptoJoker makes it borderline impossible to recover your files.

Continue reading
0 Comments

CryptoLocker Strikes Again: This Time, It Hits Gamers Where It Hurts

b2ap3_thumbnail_cryptolocker_400.jpgCan you believe it’s already been two years since Cryptolocker, a particularly nasty strain of ransomware, was released into the online environment? By encrypting files on a victim’s computer, and forcing them to pay a fee for their safe return, Cryptolocker has been a significant threat to both business and personal environments. Now, however, a particular strain of Cryptolocker is making gamers look like cybersecurity rookies.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Technology Best Practices Cloud Business Computing Hosted Solutions Backup Windows 10 Microsoft Network Security Hackers Office Software Business Hardware Workplace Tips Disaster Recovery Email Computer Upgrade IT Services Business Continuity Server Windows Malware VoIP Data Efficiency Quick Tips Ransomware Cybersecurity Microsoft Office Alert Mobile Devices Save Money Managed IT Services Productivity Network Small Business Outsourced IT Employer-Employee Relationship Operating System Remote Computing communications Miscellaneous Business Management Passwords Browser Hacking Social Engineering Internet Managed IT Services Office 365 Managed Service Provider Windows 10 Facebook User Tips Social Media IT Support WiFi Cloud Computing Mobility Password Virtualization Productivity Phishing Innovation Telephone Systems Communication Health Networking Flexibility Work/Life Balance Patch Management Bandwidth Collaboration Risk Management Application Spam IT Support Customer Relationship Management Google Private Cloud Encryption Gmail Holiday Smartphone Smartphones Processor Cybercrime Artificial Intelligence Best Practice Managed Service Staff Office Tips Recovery Education Data recovery Data Management Law Enforcement Marketing Data Breach IT solutions Data Backup Meetings Tech Support HaaS DDoS Internet Exlporer Saving Money User Error Hiring/Firing Cryptomining Cabling BDR Distributed Denial of Service Employee/Employer Relationship Remote Work VPN End of Support Worker Fax Server Tablets Database WIndows 7 Cables Legal Current Events Customer Service Social Excel Infrastructure Entertainment Identity Theft Wireless Technology Transportation Internet exploMicrosoft Rootkit Users Phone System Mobile Device Virtual Private Network Politics Credit Cards Bring Your Own Device Computers Advertising Vendor Management Wireless Hard Drives Paperless Office Managing Stress IT Infrastructure Network Congestion Lithium-ion battery Maintenance Social Networking Remote Workers Keyboard Fraud Mobile Device Management Firewall Business Technology SaaS Memory Consultant Windows 7 Scalability Two Factor Authentication Mobile Computing Managed IT Service Chrome USB OneNote Best Available Android Public Cloud Shortcut Windows Server 2008 R2 Avoiding Downtime Black Market Notifications Going Green Settings Managed Services Provider Wi-Fi Evernote Biometric Security Hybrid Cloud Assessment SharePoint Applications Spam Blocking Electronic Medical Records Vendor Windows 8 Compliance Troubleshooting Two-factor Authentication Television eWaste Entrepreneur Retail Hard Drive Computing Infrastructure Business Intelligence Government Save Time Tablet Books Workers Public Computer Environment Data Storage Bloatware Telephone System Training Techology Remote Monitoring Display Worker Commute Shadow IT Big Data Files Employer Employee Relationship Tools Website Cryptocurrency Manufacturing App Budget Help Desk Automobile Telecommuting Emergency