There's a lot going on under the hood...
Providers of managed IT services, cloud based solutions, Helpdesk and end-user support, hardware & software sales, and business IP/PBX phone systems.
Technology consultants and provider of managed IT services, cloud solutions & hosting, and phone systems for small businesses up to 75 users.
There's a lot going on under the hood...
As we all learn how to cope with COVID-19, many in business are turning to online video conferencing solutions like Zoom. But as popularity with a certain technology grows, so does the security concerns. Many Zoom meetings are held without Passwords to make joining very easy for invited participants. Protect yourself by setting a Password on each Zoom meeting you have. And if you're using another screensharing/video conferencing app, learn how to secure the meeting with a passcode of some kind.
The world is vulnerable to a new type of trolling as people turn to Zoom video calls to feel connected amidst quarantines. Jerks are using Zoom’s screensharing feature to blast other viewers with the most awful videos from across the internet, from violence to shocking pornography. That’…
Ruh roh... Time to disable Facetime. NOW!
Go into Settings > FaceTime and turn it off until Apple releases a software update later this week.
UPDATE: Apple has taken Group FaceTime offline in an attempt to address the issue in the interim. A significant bug has been discovered in FaceTime and is currently spreading virally over social me…
Rethink that 10 Year Challenge post you’ve been planning!
A recent challenge on Facebook has raised concerns about facial recognition technology and privacy. Facebook denies that they had anything to do with the start of the challenge, but experts disagree. Here is how it may affect you.
Yesterday was another successful day upgrading a client's IT infrastructure. Not only did we upgrade & simplify network hardware, all new CAT6 cabling was run to each workstation for computers, printers, & telephones. New #UniFi network switches and In-Wall AC wireless access points from Ubiquiti Networks, Inc., and a new Untangle NGFW for security & protection of the network. We also cleaned up a very message IT closet by removing old unused equipment and remounting for easy access and visual identity. Special thanks to Alan Rudnick and his awesome team at ADR Security for wiring & terminating all the network drops!
Something to think about before posting your next selfie...
Facial recognition apps make it super easy to match anyone’s face with a porn performer’s body.
Apple iOS Users: If you updated to iOS 11 and have noticed a strange "A" with a symbol in your posts, texts, emails, etc. Here's a fix for you!
If you updated your iPhone, iPad, or iPod touch to iOS 11 or later and find that when you type the letter “i” it autocorrects to the letter “A” with a symbol, learn what to do.
Verizon techs arrived and have confirmed a communications line outside our building was struck by something, probably a passing truck, and is the cause for our phone service and internet going down on one of our two Fiber connections (the other connection was unaffected) which carry telephone and high-speed internet into the building. The other fiber connection has kept us online with internet service and hasn't skipped a beat. Awaiting two other linemen to arrive to assist with the 400ft cabling run. #howboutdat #dangitshot
Ironic how Verizon was the company hired to conduct extensive security auditing & analyses into the MASSIVE Target breach several years ago which found the breach came from shared VPN credentials with a Target HVAC contractor... not that Target's actual IT infrastructure had been "hacked" or "breached". Now Verizon is the victim in a similar situation with a one of their vendors.
#irony #ClosingTheDoorHelps #2FASecurityForTheWin
Customer records for at least 14 million subscribers, including phone numbers and account PINs, were exposed.
A global cyber attack is sweeping across Europe right now. DO NOT open strange emails with strange attachments or click strange links!
Screens around the world are reportedly getting this message, indicating a ransomware attack is to blame.
You may have seen the news this weekend about the WannaCry/WannaCrypt ransomware attacks. Criminal hackers have released a new strain of ransomware that spreads itself automatically across all workstations in a network, causing a global epidemic. If you or a co-worker are not paying attention and accidentally open one of these phishing email attachments, you might infect not only your own workstation, but immediately everyone else's computer too.
Be very careful when you get an email with an attachment you did not ask for. If there is a .zip file in the attachment, do not click on it but delete the whole email.
Remember: "When in doubt, throw it out"!
Set your DVR for April 26th (tomorrow) and May 24th for HGTV!
Congratulations to our long-time client Wright Building Company who will be appearing in 2 episodes of HGTV's "Buying & Selling" starring the Property Brothers Jonathan Silver Scott & Drew Scott! Way to go Chris Wright and Judy Doyle and their entire team!
Wright Building Company to Appear on 2 Episodes of HGTV’s Property Brothers
When HGTV experts Jonathan & Drew Scott needed help in Westchester County for their Property Brothers show, "Buying & Selling”, they called upon local custom home builders Chris Wright & Judy Doyle of Wright Building Company to help transform two dated homes in Westchester County to two amazing properties with smart, stylish living spaces. You can watch these spectacular transformations take place April 26th and May 24th on HGTV.
EMBROIDERY SAMPLES ARRIVED! Proudly featuring our new branding designed by Jamie and her team at Spruce Rd. #stayclassy
NEW to Superior's Security Stack: Multi-Factor Authentication (MFA) is coming soon! Learn how MFA strengthens access security by requiring two methods to verify your identity: something you know, plus something you have.
Passwords are increasingly easy to compromise. They can often be stolen, guessed, or hacked — you might not even know someone is accessing your account. 2FA adds a second layer of security, keeping your account secure even if your password is compromised.
Apple’s Phil Schiller thinks it’s sad that people use 5-year-old computers. Well, Phil, there’s an auto repair shop in Poland that’s going to send you spiraling into a long depression. Why? Because…
Password security is one of the single-most important tools you have to securing your online (and offline) identity. Weak passwords are the most common ways hackers crack your accounts and access your sensitive data. Is your password on this list? If so, you should change it... NOW!
Passwords don't have to be your kid's birthday or your childhood pet's name. Passwords can be creative, but they must also be memorable - otherwise, what good is a password that you can't remember?
DO mix upper & lower case letters
DO use special characters
DO use numbers
DO use phrases (with spaces ifpossible!)
DO change frequently
DO use 2-Factor Authentication
Dropbox users: if you haven't changed your password in awhile, now is the time! 2-Factor authentication is a MUST!
Data stolen in 2012 breach, containing encrypted passwords and details of around two-thirds of cloud firm’s customers, has been leaked
VERY important for users who get their office voicemails emailed to them - be aware of fake voicemail attachments that carry ransomware payloads.
Ransomware & Voicemail Notifications, Redux
There is a new Scam Of The Week where bad guys have taken an actual past scam that the Federal Trade Commission has resolved and is now refunding money on. Bad guys take these FTC cases and create a phishing attack out of them.
Here is the rule: If you receive any emails from an official-sounding organization that promises you a refund for any amount, be very careful and never click on any links or open any attachment you did not ask for.
Safe ATM usage: avoid using freestanding ATM machines; it's just not worth the risk of having your bank account emptied. Instead: use ATM's that are mounted into a building or wall, like the ones at the bank, when possible. Here's an example of what could happen...
One basic tenet of computer security is this: If you can’t vouch for a networked thing’s physical security, you cannot also vouch for its cybersecurity. That’s because in most cases, networked things…
If it seems to good to be true - IT IS! If you're a Stranger Things or Orange Is The New Black fan, don't be fooled by this tempting scam! A classic Social Engineering tactic: preying on dedicated fans of pop culture mega-hits. Don't be fooled, you Know better! ;D
Scam Of The Week. There are active scams that try used social engineering to trick Netflix users into downloading malware or give our credentials
Great news! Superior is now a Certified Reseller for Adobe desktop apps including Acrobat, Photoshop, Illustrator, InDesign, AfterEffects, and cloud services & bundles such as Creative Cloud!
This article is from February, but its a good read for anyone who gets Word documents as email attachments - um, hello... don't we all?!?
The Locky strain of ransomware comes in the form of a seemingly benign Microsoft Word file attachment. When opened, you're prompted to enable the macros in order to read the "unreadable" text. Enabling the macros actually is what deploys the payload from a remote server, then executes. The program now starts encrypting files on your computer and also across the network. There is no way to unencrypt the files. You will then be notified that in order to get your files back, you'll have to pay a ransom fee of some unknown amount, usually in Bitcoin currency, and before an "expiration" date. As the expiration date gets closer, the ransom fee increases. In a split second, you can not only destroy your computer, but the entire network as well. Don't let this happen. Treat every attachment as a suspect, even if its from someone you "know" - there's a good chance they didn't send you anything!
A new ransomware strain called Locky hides in Microsoft Word files and encrypts all documents including unmapped network drives.
July saw some fresh strains of ransomware released into the wild, targeting business websites powered by the popular WordPress platform. A botnet called SoakSoak delivers its ransomware payload to anyone who visits the infected site by redirecting unsuspecting visitors to a compromised site where the payload is is deployed. This payload carries one of the newest strains of the Crypt### ransomware strain.
This month's Ransomware Roundup talks about more of these nasty new strains that have been released PLUS an interesting discussion on Social Engineering and the "human firewall".
CyberheistNews Vol 6 #33 Ransomware Roundup: Fresh Strains And New Nasty Features
Superior Computer Services's cover photo
740 S Fulton Avenue
Mount Vernon, NY
Be the first to know and let us send you an email when Superior Computer Services posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.
Send a message to Superior Computer Services: