,

How Managed Network Security Stops Thieves in Their Tracks

Thieves can be anywhere, they don’t necessarily congregate under bridges or in those dark and creepy allies as much anymore. With some well placed keystrokes, your firewall can be breached, leaving you vulnerable and unaware until it is frankly too late. With the help of GroupOne’s managed network security services, you can continue about your day with full confidence that not only your but also your clients’ information is safe and secure. This is implemented by creating customized security solutions based upon the needs presented so that you get exactly what you require to be safe.

Be Safe from Both Ransomware and Cryptolocker

Don’t be prey to thieves using malware such as ransomware, which locks your operating system, or cryptolocker, which locks specific files without a specific pass key set by the cybercriminal. Both are highly used Trojan malware to extort money from you or your clients, and are generally targeted towards high value systems or files that have to do with sensitive information such as social security codes and credit card information. One of the first steps to having managed network security is by first testing your infrastructure for weaknesses, because to be strong you must first know where you are weak, and then proactively improve your network security against such future threats.

With Managed Network Security, Good Things Come in Threes

To keep up with the high demands of security as well as PCI, HIPAA, SEC, and FINRA regulations, GroupOne is an expert at keeping your network secure with a multi-layer defense. This includes strengthening your firewalls, email security, and controlling not only who but also what devices are capable of accessing your network. The firewall can be the most basic of defense, but is generally the best utilized as most are not used properly or in some cases not at all. With managed network security you and your clients receive only the messages they need while keeping any possible threats or spam from reaching your inbox. Finally with the growing amounts of ways to access a network with various mobile devices, it’s paramount to control the devices capable of doing so. Security should be your highest priority, let us help keep you protected!

Spear Phishing – Don’t Take the Bait!

Background Story

Group One uses state-of-the-art technology to protect our clients from malicious attacks from the outside. But there is one thing that is almost impossible to protect against: end users clicking on a spear phishing attachment and inviting a virus onto their PC — and thereby — into the company network.

Spear Phishing Attacks

One technique hackers use is called “spear phishing”. Essentially, spear phishing attempts are directed at specific individuals or companies. Attackers may gather personal information about their target to increase their probability of success. This technique is, by far, the most successful on the internet today, accounting for 91% of attacks.

For example, one of our clients listed their email addresses on their website. A hacker then gathered all the emails from their website and crafted the below message:

Spear Phishing

 

Good News

Before it could spread into the network beyond the one user’s workstation, Group One IT’s protection systems shut the Crypto Virus down.

This could have been very bad.  This was a version of the “Cryptolocker” ransomware virus similar to the one that recently infected a hospital in southern California. If this virus brought an entire hospital to a grinding halt, think of what it could do to your organization.

Better News 

We were able to restore the user’s data back to the most recent backup.  He was up and running again in less than two hours, and he only lost a few hours of work. A few hours. Consider that viruses just like this one have been known to take down entire organizations — not for hours, or days or even weeks — permanently. When an effective ransomware spear phishing virus is completely successful and wipes out an entire database, many companies are simply unable to recover and ultimately close their doors.

Moral of the Story:

Don’t click on attachments without knowing that the sender is legit.