Computer Network Security

Remote Work - Businessman using Laptop

Whether your team works remotely or in an office, the line between personal and work tasks can become blurred when working on a business computer. If they are in front of a monitor screen for most of the workday,  it’s not unusual for them to push boundaries when using the company’s computer. Chances are, most …

5 Things Employees Should Never Do, But…

Remote Access VPN

COVID-19 pandemic made working remotely the new norm. Because of advances in mobile and networking technologies, employees are increasingly working from various locations, connecting to their offices online. This ability to work from anywhere can be a great benefit for employees who are looking for work-life balance as well as organizations that are committed to …

How To Setup Your Workforce With a Secure Remote Access

The targeted ransomware event at Hackensack Meridian Health brought the computer network systems down last week, resulting in interruptions across its IT network, including Carrier Clinic in Montgomery and three sub-acute facilities. The Edison-based healthcare company said it had insurance to help cover the costs associated with cyberattacks, including payment, remediation, and recovery efforts. The …

New Jersey Healthcare provider Hackensack Meridian hospital paid ransom to hackers to stop a cyberattack

As a small/medium business owner, patch management may be a somewhat foreign topic reserved for your IT personnel. The following provides a summary-level background of patching, which is relevant to business owners in maintaining appropriate security disciplines in their companies. What is a patch? A patch is a set of changes to a computer program …

What SMB Owners Should Know About Patch Management protocol in IT Security

Communication is one of the most important key aspects of any properly functioning company or organization, and businesses today rely on email as a principal method of communicating with staff members, partners, and clients. While your email infrastructure plays a critical role in the operation of your business, it is also a gateway that can allow …

How Do You Ensure Your Business Email Does Not End Up In The Wrong Hands?

As a small/medium business owner or manager, it is imperative that you have an awareness of cybersecurity related-risks and implement infrastructure and processes to mitigate those risks.  According to Verizon’s 2018 Data Breach Investigations Report, 58% of breach victims are categorized as small businesses.  Roughly 75% of these breaches are perpetrated by outsiders, while approximately …

Do You Have a Cybersecurity Program for Your Small/Medium Business?

Hackers are possibly working for an advanced nation have infected more than 500,000 home and small-office routers around the world with malware that can be used to collect communications, launch attacks on others, and permanently destroy the devices with a single command, researchers at Cisco warned Wednesday. The malware named VPNFilter is a modular, multi-stage …

[ALERT] 500,000+ Consumer Routers Infected with VPNFilter Malware

There are 12,000 or so laptops found in US airports each week and 62,000 lost electronic devices recovered from New York’s metropolitan buses, taxis, trains, and stations each year!  The bottom line is no matter how careful you are with your laptop, mistakes occur and losing a laptop (or having one stolen) is likely to …

So, Your Business Laptop Got Stolen… Now what?

Bad Rabbit, a new ransomware, has been quickly spreading across networks in Europe. If this sounds familiar, you are correct – Bad Rabbit is almost identical to previously infamous malware variants WannaCry and Petya infections that wreaked havoc across networks in Europe earlier this year. If you weren’t affected by those before, you probably know someone who was, or have heard …

Bad Rabbit affecting networks and data across the globe

On May 11, 2017, President Trump issued an Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure designed to bolster security associated with the U.S. federal government’s information technology. Abdul Hammad, powersolution.com’s Chief Information Security Officer (CISO) and a member of the U.S. Secret Service New York Electronic Crimes Task Force, …

White House Cybersecurity Executive Order: Risk Mitigation by SMBs

There are a lot of totally different ways in which cyber attackers can get to their victims however Netgear may be making it even simpler for them. For over a year now (from August 2016 and January 2017 and forward) there were some vulnerabilities in some Netgear routers. While routers may not seem to be …

Your Netgear Router May Be Open To Hack Risk

When you hear the word “cybercrime”, what comes to mind? Credit card numbers theft? Hacking into your computer? There are several different types of cybercrime, and they are growing at an alarming rate. Hackers are no longer some anti-social loners who crack the code for bragging rights – hacking came of age and is maturing …

Growing Cybercrime Trends Every Business Should Be Aware of

With all the hacking virus threats we see in the news feeds today, internal threats seem to have fallen off the list of priorities for many business owners. If you watch industry development trends and recent studies on insider threats, many companies are unaware of or underestimate corporate data leaks – the most dangerous threat …

Internal IT threats to small business

Earlier this year, President Obama submitted a proposed budget increase of 35% to $19 billion of Federal resources as part of the  Cybersecurity National Action Plan. The administration’s comments included stating that cyberthreats “could lead to widespread vulnerabilities in civilian infrastructures and U.S. government systems.” The Pentagon is looking for $34.7 billion for the period …

U.S. Government Seeks 35% Increase in Fiscal 2017 Cybersecurity Budget

Protect your computers, your data, your identity and your money from online criminals 1. Have computer security programs running and regularly updated to defend from  the latest threats. Consider using  a firewall to prevent unauthorized access to your computer, and install antivirus software to protect against malware that can take your data hostage (ransomware), or …

7 Tips for Everyday Cybersecurity

Securing small or medium business data has become increasingly challenging as malicious cybercriminals and hackers have become more sophisticated and ubiquitous.  Routinely, press articles are releasing stories of data breaches, lost customer records, financial losses due to cyberattacks, and company embarrassment.  Additionally, hacking techniques have evolved to multi-stage techniques.  This means that an initial system …

How to Secure Your Small or Medium Business Data? Utilize Layered Security Techniques

The Exploit Comcast, a large internet provider for many home and business users, was the target of a sophisticated social engineering / malware attack. The new tech support threat, outlined by MalwareBytes, tricks users into thinking they have an infection on their computer and that they should call a fake Comcast tech support number to …

Threat Alert: Comcast Tech Support Scam

A new rise of IT risks are on the loose, an email scam requesting a fake wire transfer and a new variant of CryptoWall. It is estimated that the fake wire transfer scam has stolen around $1.2 billion and CrytpoWall 3.0, a CryptoWall variant released in January 2015, has already extorted an estimated $325 million. …

Rise of Email Scams and CryptoWall

In 2014, CryptoWall, a new and improved copycat version of CryptoLocker has exceeded  in infection rates, and now in 2015 they are making new waves around the globe, infecting more computers. Crypto virus family is a malicious program known as ransomware, making rounds typically hitting computers via email attachments or via botnets, demanding money from …

Are you ready to pay the Ransom for your private or business data?

Dawn of the USB Drive Flash drives are ubiquitous in today’s digital society. It is an easy, cost-effective way to transfer large amounts of data from computer to computer. With devices reaching 256GB of storage, users are storing more and more data on these small handy plastic devices. But what happens when that device is …

Encrypt That Flash Drive

As you may have heard, a major security vulnerability dubbed “Heartbleed,” was  discovered some time ago in OpenSSL. Here is what you need to know right away: 1. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. The Heartbleed bug allows anyone on the Internet to read the memory of …

The Heartbleed Bug – 5 things you need to know

An interesting article was posted today at Computer Weekly, titled “Upfront security better and cheaper, says expert“. The main takeaway for the business owners can be summed up in this quote from the founder of application security firm DigitalBodyGuard: A secure infrastructure can be developed for the same cost in the same time as an …

Do not underestimate benefits of Upfront Security

A team of hackers has managed to crack more than 14,800 supposedly random hashed (encrypted) passwords -90% from a list of 16,449. This act was part of a hacking experiment for a technology website Ars Technica. So, you think you have a strong password? The success rate for each hacker ranged from 62% to 90%, …

Hackers crack 16-character passwords in less than 60 minutes

Privacy day is here! Here is you homework for today: When signing up or using any sites that store any of your data – READ the privacy policy. Most places share your data with their “affiliates” and if you did not read fine print, it can have some undesirable consequence. Check privacy and location data …

Privacy Day is a good reminder to do Data Maintenance

Ransomware (also known as cryptoviruses, cryptotrojans or cryptoworms) comprises a class of malware, or a virus which restricts access to the computer system that it infects. In addition it demands a  payment, which is basically a ransom in order for the restriction to be resolved. Complexity of ransomware varies:  from basic HTML pages acting as …

Ransomware – fake FBI Moneypak SOPA virus malware

Few days ago, a court in the United States has announced a judgment of more than $163 million against defendants in the FTC case agains “scareware” operation. This case had started on December 2, 2008, the U.S. Federal Trade Commission (FTC) filed a Complaint in federal court against Innovative Marketing, Inc., ByteHosting Internet Services, LLC, …

Beware of Scareware Computer Viruses

2 years ago, in 2010 Imperva report identified the most commonly used passwords; here are top 5 that discovered by analyzing 32 million passwords exposed in the Rockyou.com breach. 123456 12345 123456789 Password iloveyou Now, in 2012, Eset released a new report based on the 6 million, and top 5 include: password 123456 12345678 1234 …

So, you think your “Hard-To-Guess” passwords are safe?

A new trend is starting to emerge across all corporate networks, employees bringing their own, consumer based devices into work and requesting that they be attached to the corporate network. This new trend is known as Bring Your Own Device (BYOD). Users are shifting away from corporate issued smart phones, which have typically been Blackberry devices, to devices they …

BYOD… Not just for Restaurants

Security firm Intego is warning about new variants of an “insidious” Trojan that aims to steal information that can exploit user identity details from Mac users. How  Flashback Mac Trojan infects Macs Methods of infections depend on the version of the Flashback. The previous version of malware has several methods of infection, and aims at …

Mac Users, Beware: the Return of Flashback Mac Trojan

We provide computer network security assessment for businesses in our service area, including New Jersey, New York metro region. The goal of this assessment, (also known as a security audit or security review), is to ensure that necessary controls are integrated into the design and integration of a network. A properly completed security assessment should …

Computer Network Security Assessment

What does year 2012 hold for us in terms of improving IT security? Here are just a few topics: Log Management & Analysis As we begin to understand how such information can be used to benefit security, log analysis is being included in security products by many vendors, for example, LogLogic,  Logrhythm,  and Tripwire.  Both …

IT Security Solutions for 2012

Small Businesses Vulnerability Most hackers are looking for the easiest way to break in – and majority of small businesses storing valuable data are an easy target. Some of the vulnerabilities are granted by lack of security budgets or by pure ignorance to the issues of computer network security. Small businesses are more likely to …

Growing Computer Network Security Concerns for 2012

Bring Your Own Device (BYOD) is here. 60% of companies are enabling BYOD, according to a July 2011 Forrester Research survey. There is an explosion of mobile devices in the enterprise – devices both corporate- and personally-owned. Mobility boosts employee productivity, but it also opens the doors for security, legal and privacy concerns. Devices security, …

BYOD – a compromise between security and convenience.

Cybersecurity experts have long warned that computer hackers could potentially target electric power sources, such as power plants and electrical grids, and that these attacks could affect vital infrastructures, including hospitals and water treatment plants. Department of Homeland Security Secretary Janet Napolitano said at the cybersecurity event sponsored by the Washington Post, that a major …

Major Computer Attack – warns DHS

As reported today by various sources, on June 23, 2011 in Newark, Daniel Spitler, 26, of San Francisco, California, pleaded guilty in federal court  to hacking into AT&T’s computer servers last year and stealing the e-mail addresses and personal data of about 114,000-120,000 Apple iPad users, out of which 16,000 belong to New Jersey users. …

Spitler Pleads Guilty – 16,000 New Jerseyans Affected by Hacker

Creating a strong password may seem like a pretty simple concept. In fact, many websites even tell you when your password is “good” or “strong”. Unfortunately, many people still overlook the vital rules to creating a strong password. Always make your passwords longer than six characters Include a blend of uppercase, lowercase, numbers and special …

Are your passwords secure enough?

Scroll to Top