ZR Systems Blog

ZR Systems has been serving the Aiea area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

 

RANSOMWARE - WannaCry

 

Last Friday a new malware worm was released based on the leaked NSA exploits from earlier this year. This paired the cryptolocker variants with a way to automatically spread itself on an infected network and hold personal & business files hostage until a bounty is paid.

This attack has been so damaging, that Microsoft has issued special patches for legacy operating systems including Windows XP & Server 2003. Going forward this is not guaranteed however, so please reach out to ZR Systems if you still have legacy systems running so we can work on a migration path for you.

As ZR Systems Managed customers, we are pleased to let you know that we have had zero security incidences as a result of this attack. We work to protect you on multiple fronts depending on the technology you have chosen to utilize:

Sonicwall Gateway Protection – Customers with active subscriptions or on ZR Systems Firewall as a Service program have been protected at the gateway since mid April. For additional information on how sonicwall identified the issue, you can checkout their blog

Fortinet Gateway Protection – Customers with active Fortinet subscriptions have also been protected as of last week’s security update.

Webroot SecureAnywhere Antivirus – Every endpoint (Servers & Workstations) managed by ZR Systems has Webroot SecureAnywhere installed which utilizes a realtime scanning engine that captures new variants in real time before they spread across your network.

ZR Systems Group, LLC

Proactive System Patching – Patches are installed weekly for all systems under management, and monitored regularly by our Network Operations Center. The vulnerability used by this attack was patched by Microsoft back in March and was pushed out to all of our agents. Below is our global compliance statistics for our client base.

ZR Systems Group, LLC

System Backups – The last line of defense against these types of attacks are backups. ZR Systems works with every client to make sure they have backup technologies in use to ensure we can recover files, system data, and applications. There is also a premium service available that can run your systems on premise or in the cloud in case of any issues that arise.

Please be advised that even with these all in place, you and your staff are the most important line of defense in securing your business from threats like WannaCry. If you have any questions about a suspicious e-mail or website, please contact our Help Desk at (808) 369-1000.

Thank you,

ZR Systems Group, LLC

 

Additional References:

http://www.telegraph.co.uk/news/2017/05/12/nhs-hit-major-cyber-attack-hackers-demanding-ransom/

http://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday

Continue reading
0 Comments

Monsters aren’t Real, But Ransomware Sure Is!

Monsters aren’t Real, But Ransomware Sure Is!

Halloween is a time when creatures like ghosts and goblins are celebrated rather than feared. Even adults use the holiday to lighten up and enjoy themselves, as they’re well aware that the monsters so often seen and heard about in stories are fictional. Unfortunately, the fact remains that there are monsters hiding in plain sight all around us, playing on the fears and misfortune of others--namely, hackers.

Continue reading
0 Comments

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Alert: Microsoft Outlook Users Be Wary of New Ransomware

Ransomware is a particularly nasty strain of malware that continues to pop up in unexpected forms. In the case of a new variant of called Cerber, it targets users of Microsoft Outlook using a zero-day vulnerability via phishing messages. To make matters worse, Cerber can also utilize DDoS attacks, which is a major cause for concern.

Continue reading
0 Comments

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

b2ap3_thumbnail_ransomware_hostage_400.jpgModern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called CryptoJoker makes it borderline impossible to recover your files.

Continue reading
0 Comments

CryptoLocker Strikes Again: This Time, It Hits Gamers Where It Hurts

b2ap3_thumbnail_cryptolocker_400.jpgCan you believe it’s already been two years since Cryptolocker, a particularly nasty strain of ransomware, was released into the online environment? By encrypting files on a victim’s computer, and forcing them to pay a fee for their safe return, Cryptolocker has been a significant threat to both business and personal environments. Now, however, a particular strain of Cryptolocker is making gamers look like cybersecurity rookies.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Privacy Technology Best Practices Cloud Hosted Solutions Business Computing Windows 10 Backup Hackers Network Security Office Microsoft Business Workplace Tips Disaster Recovery Software Computer Hardware Email Upgrade VoIP IT Services Efficiency Malware Business Continuity Server Quick Tips Windows Microsoft Office Data Mobile Devices Alert Save Money Network Ransomware Small Business Employer-Employee Relationship Managed IT Services Passwords Miscellaneous Browser Hacking Business Management Social Engineering Internet Productivity Operating System Remote Computing communications Office 365 Innovation User Tips Social Media WiFi Mobility Password Virtualization Productivity Facebook Communication Health Cloud Computing Telephone Systems Managed Service Provider Internet Exlporer Phishing Flexibility Application Work/Life Balance Spam Staff IT Support Collaboration IT solutions Customer Relationship Management Data Breach Risk Management Google Private Cloud Smartphone Encryption Outsourced IT Holiday Windows 10 Cybersecurity Recovery Cybercrime Artificial Intelligence Marketing Best Practice Gmail Office Tips IT Support Tech Support Education Data Management Law Enforcement Managed IT Services Networking Smartphones Meetings Processor HaaS DDoS Bandwidth Save Time WIndows 7 Retail Automobile Two-factor Authentication Social User Error Television Excel Patch Management Hard Drive Business Intelligence Distributed Denial of Service Phone System Workers VPN End of Support Public Computer Fax Server Data Storage Legal Data recovery Hard Drives Employer Employee Relationship Managing Stress Entertainment Telephone System Social Networking Wireless Technology Training Internet exploMicrosoft Display Mobile Device Data Backup Memory Consultant Hiring/Firing Budget Politics Cryptocurrency Bring Your Own Device Manufacturing Advertising App Mobile Computing Wireless Chrome Help Desk Telecommuting Lithium-ion battery Best Available Worker Avoiding Downtime Keyboard Cryptomining Mobile Device Management Cabling BDR Employee/Employer Relationship Scalability Remote Work Transportation Customer Service USB Database Cables Public Cloud Current Events Windows 8 Black Market Identity Theft Entrepreneur Notifications Computers Rootkit Wi-Fi Going Green Users Hybrid Cloud Tablet SharePoint Applications Credit Cards Firewall Maintenance Vendor Management Troubleshooting Paperless Office IT Infrastructure Network Congestion Bloatware eWaste Computing Infrastructure Fraud Two Factor Authentication Government SaaS Remote Monitoring Books Business Technology Windows 7 Tools Environment Website Shortcut OneNote Android Settings Big Data Saving Money Windows Server 2008 R2 Techology Electronic Medical Records Worker Commute Evernote Shadow IT Biometric Security Files Assessment Emergency Spam Blocking Tablets