Tuesday, March 23, 2010

The Latest Computer Security Threat

Slowly over the last couple of years, a new security threat has emerged for computer users.  Scammers are remotely installing fake anti-virus programs on users computers that run "scans" and report that the user has all sorts of infected files that need to be cleaned.  The scam continues by getting the user to "register" the program, provide credit card information, and buy a full version of their program which "cleans" the computer.

The problem is, the only "infection" on the computer is the program itself.  The rogue software will take control of many of your system files and utilities that can be used to fix the problem.  Many times, System Restore, Task Manager, the Microsoft Configuration Utility and other Windows system tools are disabled by the fake software, leaving you with a barrage of pop-ups and error messages.  This obviously makes it difficult for you to productive.  To add to the confusion, many fake programs will add an online support chat link with a real person, adding to the legitimacy of the program. 

So, where do these programs come from, and how do we recognize when they exist on our computers?  The first thing you need to defend yourself against these programs is to know what legitimate security software is installed on your computer.  For instance, if you know that you run McAfee, Norton, Symantec, AVG, etc., as your anti-virus program, when something called "Antivirus 2010" or "PC AntiSpyWare 2010" or "TotalSecure 2010" shows up on your computer, you'll know you're being scammed.  These programs can come from a variety of legitimate sources, which makes it difficult to prevent.  They may come from:
  • Browser plugins and add-ons
  • Email attachments
  • Peer-to-peer file sharing networks
  • Multimedia codecs to play video or audio files
  • Internet search results
To minimize the possibility of infection, take the following steps.
    1. Don’t click on pop-up ads that advertise anti-virus or anti-spyware programs. Even though pop-up ads are used for valid advertising, they can also be used for malicious purposes, like getting you to install fake security programs. If you are interested in a security product, search for it and visit its homepage. Just don’t get to it through a pop-up ad.
    2. Use and regularly update firewalls and anti-virus and anti-spyware programs. It is very important to use and keep these programs updated regularly so they can protect your computer against the most recent threats. If possible, update them automatically and at least daily.
    3. Properly configure and patch operating systems, browsers, and other software programs. Keep your system and programs updated and patched so that your computer will not be exposed to known vulnerabilities and attacks.
    4. Turn off ActiveX and Scripting, or prompt for their use. ActiveX controls are small programs or animations that are downloaded or embedded in web pages, which will typically enhance functionality and user experience. Many types of malware can infect your computer when you simply visit a compromised site and allow anything to run from the website, such as ads. Turning off ActiveX and Scripting can help protect your computer if you inadvertently browse to or are unwillingly redirected to a malicious site. NOTE: You can limit the functionality of your Internet browser through its configuration choices, but be sure to look for a guide if you are unfamiliar with how to limit scripting and active content.
    5. Keep backups of important files. Sometimes cleaning infections can be very easy, but sometimes they can be very difficult. You may find that an infection has affected your computer so much that the operating system and applications need to be reinstalled. In cases like this it is best to have your important data backed up already so you can restore your system without fear of losing your data.
    6. Regularly scan and clean your computer. If your organization already has configured this on your computer, do not disable it. If you need to scan your computer yourself, schedule regular scans in your programs. Also, several trusted antivirus and anti-spyware vendors offer free scans and cleaning. Access these types of services from reputable companies and from their webpage, not from an unexpected pop-up.
    We can provide a maintenance program to help you in preventing these these types of infections.  Don't hesitate to call us to setup a free Business Technology Survey, where we can tell you if you are at risk and help you tighten up your security.

    209-368-7700
    www.netmansolutions.net

    Monday, March 22, 2010

    More on Disaster Recovery.......and Why It's Important to You.

      We’ve all heard the stories over the last weeks, months and years about disasters that have struck areas throughout the United States, from floods and tornados, to wildfires, hurricanes, and terrorist attacks. But how many of us are prepared for such an event if it were to happen to us?

      Statistics say, not many. From Michael Ybarra's article, "Roadmap to Recovery":
    “Disaster recovery used to be reserved for large enterprises, but in the increasingly 24/7 business world, more and more midmarket firms are finding they can't afford not to keep things running. And high-availability requirements are growing all the time. Forrester Research estimates that enterprises have doubled the number of mission-critical database applications in the past five years. Yet many firms remained poorly prepared. A Gartner survey found that almost half of midmarket and large enterprises had relatively weak DR plans. many firms remained poorly prepared. A Gartner survey found that almost half of midmarket and large enterprises had relatively weak DR plans.” If this is true, it’s likely that small and medium sized businesses are even less prepared, due to the lack of resources they have to commit to such a plan. 
     
      So why is it important for companies to have a disaster recovery or business continuity plan? Simply put, it’s just good business. Customers expect companies to be available at any moment, 24x7, so constant operational uptime is a major business driver today. The ability to keep a company up and running despite major and minor disruptions is simply a facet of serving customers and markets while remaining competitive.

      The companies that have disaster recovery/business continuity plans are the ones that are planning to be in business for the long term. Companies that don't have such a plan are rolling the dice, with their customers and shareholders assuming the risks.

      Given its importance, let's define business continuity planning. It is about fully analyzing your business and understanding the total impact and costs associated with any disruption to your normal business practices.
      
      A business continuity plan goes beyond your IT infrastructure to a comprehensive operational recovery plan that encompasses people, processes, and products. It is similar to both an insurance policy and an end-to-end business plan to minimize the disruption of business operations, including items such as facilities, workplace infrastructure, and IT infrastructure.

      Drilling down further, disaster recovery is a subset of the overall business continuity plan, which focuses on restoring the IT infrastructure should a disruption occur. Disaster tolerance is the disciplined methodology to architect redundancy and resiliency into the IT infrastructure to avoid disruption to the business functions in the first place. Disaster recovery and disaster tolerance go hand-in-hand for both reactive and proactive business continuity planning.