Thursday, November 10, 2011

Critical Microsoft Update!

Microsoft Corporation released its Tuesday patches again this week, and this time we're treated to a patch that is truly critical. Apparently, Security Bulletin MS11-083 patches a security flaw that could allow virtually any computer connected to the Internet to be remotely accessed. 
 
If you have Windows Updates set to auto update, you probably experienced this update yesterday, most likely last night. But if you do not have Automatic Updates enabled, you will need to manually complete this update to ensure that your machines is properly protected. 
 
If you need assistance in completing this task, please call us at 209-368-7700 and we will help you get your machines fully patched and secure.
 
Network Management Solutions
209-368-7700
support@netmansolutions.net

Tuesday, October 26, 2010

Fake Microsoft Security Essentials software on the loose!

Last week, we saw the re-emergence of another new trojan that is disguising itself as Microsoft’s no-cost antimalware program Microsoft Security Essentials. This imposter is known in the technical world of antimalware combat as “Win32/FakePAV”. FakePAV is a rogue that displays messages that imitate Microsoft Security Essentials threat reports in order to entice the user into downloading and paying for a rogue security scanner. The rogue persistently terminates numerous processes such as Windows Registry Editor, Internet Explorer, Windows Restore and other utilities and applications.

Thursday, April 1, 2010

Today's Malware....It's Worse Than You Think

by Roger A. Grimes

If malware were biological, the world would be in the grip of the worst pandemic in history. In 2009, over 25 million different unique malware programs were identified, more than all the malware programs ever created in all previous years (see the Annual Report from Panda Labs). That’s a pretty incredible statistic.
Malicious programs now outnumber legitimate ones by many orders of magnitude.


Read more....



Tuesday, March 23, 2010

The Latest Computer Security Threat

Slowly over the last couple of years, a new security threat has emerged for computer users.  Scammers are remotely installing fake anti-virus programs on users computers that run "scans" and report that the user has all sorts of infected files that need to be cleaned.  The scam continues by getting the user to "register" the program, provide credit card information, and buy a full version of their program which "cleans" the computer.

The problem is, the only "infection" on the computer is the program itself.  The rogue software will take control of many of your system files and utilities that can be used to fix the problem.  Many times, System Restore, Task Manager, the Microsoft Configuration Utility and other Windows system tools are disabled by the fake software, leaving you with a barrage of pop-ups and error messages.  This obviously makes it difficult for you to productive.  To add to the confusion, many fake programs will add an online support chat link with a real person, adding to the legitimacy of the program. 

So, where do these programs come from, and how do we recognize when they exist on our computers?  The first thing you need to defend yourself against these programs is to know what legitimate security software is installed on your computer.  For instance, if you know that you run McAfee, Norton, Symantec, AVG, etc., as your anti-virus program, when something called "Antivirus 2010" or "PC AntiSpyWare 2010" or "TotalSecure 2010" shows up on your computer, you'll know you're being scammed.  These programs can come from a variety of legitimate sources, which makes it difficult to prevent.  They may come from:
  • Browser plugins and add-ons
  • Email attachments
  • Peer-to-peer file sharing networks
  • Multimedia codecs to play video or audio files
  • Internet search results
To minimize the possibility of infection, take the following steps.
    1. Don’t click on pop-up ads that advertise anti-virus or anti-spyware programs. Even though pop-up ads are used for valid advertising, they can also be used for malicious purposes, like getting you to install fake security programs. If you are interested in a security product, search for it and visit its homepage. Just don’t get to it through a pop-up ad.
    2. Use and regularly update firewalls and anti-virus and anti-spyware programs. It is very important to use and keep these programs updated regularly so they can protect your computer against the most recent threats. If possible, update them automatically and at least daily.
    3. Properly configure and patch operating systems, browsers, and other software programs. Keep your system and programs updated and patched so that your computer will not be exposed to known vulnerabilities and attacks.
    4. Turn off ActiveX and Scripting, or prompt for their use. ActiveX controls are small programs or animations that are downloaded or embedded in web pages, which will typically enhance functionality and user experience. Many types of malware can infect your computer when you simply visit a compromised site and allow anything to run from the website, such as ads. Turning off ActiveX and Scripting can help protect your computer if you inadvertently browse to or are unwillingly redirected to a malicious site. NOTE: You can limit the functionality of your Internet browser through its configuration choices, but be sure to look for a guide if you are unfamiliar with how to limit scripting and active content.
    5. Keep backups of important files. Sometimes cleaning infections can be very easy, but sometimes they can be very difficult. You may find that an infection has affected your computer so much that the operating system and applications need to be reinstalled. In cases like this it is best to have your important data backed up already so you can restore your system without fear of losing your data.
    6. Regularly scan and clean your computer. If your organization already has configured this on your computer, do not disable it. If you need to scan your computer yourself, schedule regular scans in your programs. Also, several trusted antivirus and anti-spyware vendors offer free scans and cleaning. Access these types of services from reputable companies and from their webpage, not from an unexpected pop-up.
    We can provide a maintenance program to help you in preventing these these types of infections.  Don't hesitate to call us to setup a free Business Technology Survey, where we can tell you if you are at risk and help you tighten up your security.

    209-368-7700
    www.netmansolutions.net

    Monday, March 22, 2010

    More on Disaster Recovery.......and Why It's Important to You.

      We’ve all heard the stories over the last weeks, months and years about disasters that have struck areas throughout the United States, from floods and tornados, to wildfires, hurricanes, and terrorist attacks. But how many of us are prepared for such an event if it were to happen to us?

      Statistics say, not many. From Michael Ybarra's article, "Roadmap to Recovery":
    “Disaster recovery used to be reserved for large enterprises, but in the increasingly 24/7 business world, more and more midmarket firms are finding they can't afford not to keep things running. And high-availability requirements are growing all the time. Forrester Research estimates that enterprises have doubled the number of mission-critical database applications in the past five years. Yet many firms remained poorly prepared. A Gartner survey found that almost half of midmarket and large enterprises had relatively weak DR plans. many firms remained poorly prepared. A Gartner survey found that almost half of midmarket and large enterprises had relatively weak DR plans.” If this is true, it’s likely that small and medium sized businesses are even less prepared, due to the lack of resources they have to commit to such a plan. 
     
      So why is it important for companies to have a disaster recovery or business continuity plan? Simply put, it’s just good business. Customers expect companies to be available at any moment, 24x7, so constant operational uptime is a major business driver today. The ability to keep a company up and running despite major and minor disruptions is simply a facet of serving customers and markets while remaining competitive.

      The companies that have disaster recovery/business continuity plans are the ones that are planning to be in business for the long term. Companies that don't have such a plan are rolling the dice, with their customers and shareholders assuming the risks.

      Given its importance, let's define business continuity planning. It is about fully analyzing your business and understanding the total impact and costs associated with any disruption to your normal business practices.
      
      A business continuity plan goes beyond your IT infrastructure to a comprehensive operational recovery plan that encompasses people, processes, and products. It is similar to both an insurance policy and an end-to-end business plan to minimize the disruption of business operations, including items such as facilities, workplace infrastructure, and IT infrastructure.

      Drilling down further, disaster recovery is a subset of the overall business continuity plan, which focuses on restoring the IT infrastructure should a disruption occur. Disaster tolerance is the disciplined methodology to architect redundancy and resiliency into the IT infrastructure to avoid disruption to the business functions in the first place. Disaster recovery and disaster tolerance go hand-in-hand for both reactive and proactive business continuity planning.

    Wednesday, February 10, 2010

    Disaster Recovery...in a nutshell

    No one likes to think about things like a disaster, but if you're a business owner, it's one of those topics that you can't afford not to address. It's much like insurance....knowing that your business can survive a disaster, whether that be something as simple as a hard drive failure, or something much more serious, like a fire, flood, or other natural disaster.

    Just think of this: Numerous businesses were lost after events like 9/11 and Hurricane Katrina. Other disasters happen each year that literally destroy dozens of businesses, simply because the leaders of the company didn't have an adequate business continuity plan. And that’s where we come in. We use a systematic approach that helps you develop a plan that will allow you sleep at night, knowing that in a worst-case scenario, your business will survive.

    Remember, disaster recovery isn’t just about you data and IT resources. There are a myriad of things that need to be planned for and taken into account should a disaster occur. For example, what if your office or storefront was damaged or destroyed by fire. Would your employees know where to go, and what to do, or whether they should even bother to show up? Would you have a plan for telephone service, a way to contact your customers and vendors to keep them apprised of your status? Who would have that information, and who would be responsible for seeing that it was taken care of?

    These are just a few examples of things that largely get forgotten until they are needed. Our approach is to take you through every aspect of your business so that should a disaster occur, the right people are doing the right things at the right time, to insure that you are fully functional as quickly as possible.

    If you have any questions about our business continuity and disaster recovery planning services, or any of our other IT-related services, contact us at sales@netmansolutions.net or call our office at 209-368-7700. We look forward to hearing from you.

    Thursday, January 14, 2010

    Are you thinking about making the jump to Windows 7?

     Six things you should know about Window 7......


    If you skipped the move to Windows Vista and stuck with Windows XP, as most businesses have, you may have been contemplating the idea of looking at Windows 7 since it released in October.  If so, Network Management Solutions is certainly positioned to assist you with the move.  However, there are a few items we would suggest you look into before making the jump.

    1. Is there a business need for making the move to Windows 7?

    Microsoft has ended free support for Windows XP, but paid support still exists through Microsoft and the knowledgebase of information that has accumulated over the last seven years is good enough that most issues going forward can be dealt with.  That said, unless you have a software vendor who has told you that they will no longer support their product on Windows XP after a certain date, there may not be a reason to make the move.  We've always been believers in letting others be the "guinea pigs", if you will.  Letting other companies find the glitches and problems with a new operating system usually is the best practice.

    2. Check your hardware.

    Windows 7 was designed to be lean in terms of hardware, so that it will be able to function satisfactorily on sub-powered netbooks.  If you're running Windows XP on a computer manufactured within the last three or four years, chances are good that Windows 7 will run fine on your system.  However, we can help you make sure that your hardware is compatible by running Microsoft's Windows 7 Upgrade Advisor.

    The Windows 7 Upgrade Advisor will perform a detailed scan of your entire system, checking hardware, programs, and peripheral devices. Once the scan is complete, the Upgrade Advisor will display a report telling you whether your system meets the hardware requirements and identifying any known compatibility issues with your programs and devices. If it finds problems, the Upgrade Advisor will provide suggestions you can use to better analyze your upgrade options to Windows 7.

    3. Plan your backup and restore strategy.

    Any time you make a major upgrade or migration, it's a good idea to backup all of your critical data not once, but twice.  It may sound like overkill, but having a second backup will give you peace of mind. 

    If you're using a third-party backup program, you will need to check the manufacturer's Web site to see whether the program will be upgraded to work in Windows 7. If you aren't using a third-party backup program, you're probably using Windows XP's native Backup Utility. As you may have heard, the file format used for this tool isn't compatible with Windows Vista's Backup and Restore Center. To provide for that, Microsoft released a special version of the XP Backup Utility, called the Windows NT Backup - Restore Utility. It's designed specifically for restoring backups made on Windows XP to computers running Windows Vista. While I was unable to get official confirmation, it is a safe bet that this special version will work in Windows 7 or will be adapted to do so.

    If you aren't willing to take that bet or you are not sure whether your third-party backup program will be upgraded to work in Windows 7, you can simply make copies of all your data files on CD/DVD or on an external hard disk.

    4. Plan your data transfer strategy.

    To move from one operating system to another, you'll probably want to use a transfer program that will scan your XP system, pull out all your data and settings, and then transfer them to Windows 7. Fortunately, the Windows 7 Easy Transfer utility can provide this service for you. However, before you perform this transfer operation, it will be in your best interest to have a separate back up copy of your data (see #3).

    5. Inventory your applications and gather your CD's.

    Since you won't be able to perform an in-place upgrade when you move from Windows XP to Windows 7, you'll have to reinstall all your applications that passed the Windows 7 Upgrade Advisor compatibility tests (see #2). It will be helpful to have an inventory of all the installed applications so that you can track down all your CDs or compile a list of Web sites for those applications you downloaded.

    6. Become familiar with the new User Interface.

    The User Interface in Windows 7 is quite different from the one in XP, and it offers a lot of new features. As a result, you may encounter what I call "UI Shock." You'll know what you want to do, but you'll experience a momentary lapse of composure as you strive to adapt what you know about XP's UI to what you're seeing and experiencing in Windows 7.

    To ease the level of UI shock, you'll want to become as familiar as possible with the features of the new Windows 7 UI. One starting point is Microsoft's Windows 7 page. While a lot of the content here is essentially marketing related, it will give you a good idea of what to look for when you actually move into the Windows 7 operating system.


    Network Management Solutions has developed a full migration strategy that we would love to sit down and show you.   Making a move of this magnitude can be overwhelming, but we have the background and experience to make it a smooth transition for you.  Please call us at (209) 368-7700 or email us at sales@netmansolutions.net to schedule an appointment to determine whether the time is right for you to move to Windows 7.