NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

windows-protectedRansomware has been wreaking havoc throughout the business world for the past decade. With no signs of stopping, security experts have been troubled as to what to advise to clients.

What specific steps have you likely taken already?

Patched your computers?—while experts have been hounding users for years, several businesses that stay vulnerable to attacks—including those throughout healthcare—lack even the most basic updates (updates that Microsoft and other software companies release free of charge) to keep hackers from penetrating their networks. If you’re powered by Dynamic Edge, rest assured we patch and test patches on ALL of your machines.

Train users to understand consequences of clicking on suspicious links?—I’m sure by now you are well-aware of the necessities in keeping your users up to speed on the latest types of attacks. In fact, many criminals still depend completely on users to give them the keys to your data. If you are a Dynamic Edge client, you should expect training as a part of our service to you (either in person, online or just chatting with a technician). We understand that training is a big part of the puzzle to keep your business and its sensitive data safe.
continue reading

virus-on-windows-machineEarlier this year in January and February, Microsoft issued emergency security updates for vulnerabilities in Windows 7 and Server 2008 R2 machines. These patches were to counter the chip vulnerabilities found in Intel x64 processors late last year. This series of patches were coined the Meltdown patches.

The problem?

Unfortunately, in hustling to get a patch ready, Microsoft left major vulnerabilities to your network if you or your IT support team had simply applied the Meltdown patch!

In fact, these patches blew gaping holes in your entire Windows operating system.
continue reading

The number of cyberattacks has been increasing at an unprecedented rate. I wish this statement—which we’ve been making for years now—was no longer true. But the sad and cold reality is that cyberattacks continue to hit businesses of all sizes. Recent headlines showing the entire city of Atlanta hit by ransomware underscores the heightened threat matrix our businesses are currently confronting.

This Q1 of 2018 has increased to previously unimaginable rates—by nearly 80% in some areas of healthcare this year.

Two reason for increased attacks?

Attacks are more far-reaching today than ever. One of the easiest means for hackers to penetrate networks now is increasing their reach. Their malware is able to spread further and faster than ever before. With networks remaining unpatched and users still susceptible to even common phishing attacks, it’s easier for hackers to expand their targets than morph their attack types.

While many attackers are merely increasing the volume of attacks in expectation of hitting off more victims (by the rule of numbers), some very crafty hackers are increasing their sophistication to outthink IT departments, simultaneously targeting multiple attack vectors.
continue reading

fileless-malwareThe big attack gaining traction among cyber attackers that may strike your business is hard to detect.

It’s nothing new. Fileless malware has been around for quite some time, but its popularity is quickly growing among cyber criminals with targets on business networks.

Because it’s stealthy, efficient and very capable of evading many of the conventional security systems many businesses have in place (like antivirus and conventional firewalls), fileless malware is becoming the ‘go-to’ for attacks on enterprise-grade systems.

Today I want to spend a few minutes on why fileless malware has become so big in the cybercrime community and what you can do to protect yourself from becoming the next organization to fall to its devastating effects.
continue reading

drowning-from-cyber-attackWhy you might want to make sure your credit is where you left it.

A recent consumer survey suggests that more than half of Americans still haven’t checked their credit report since the big Equifax breach late last year, which exposed Social Security numbers, dates of birth, addresses and other personal data of nearly 150 million people.

The problem here is that a good swath of people affected by the breach are keeping their heads in the sand and aren’t even checking to see if they’ve been affected.

One of the most recent very visible results of the Equifax data breach has been in fraudulent tax filings.
continue reading

disaster-recovery-parachuteWith ransom and phishing attacks on the rise in 2018, most businesses struck with an attack have no clue what to do to respond to an attack.

Now that we know that lightning strikes twice when it comes to ransom attacks (i.e., once attacked, your chances of a subsequent attack are very likely), it’s more important than ever to be prepared to completely remediate an infection and respond to an attack post-infection.

Since reinfections are becoming the norm rather than the exception, I want to take a few moments to cover how to make sure a cyberattack doesn’t happen again.

5 actions to not overlook after a cyberattack:
continue reading