Blog Post

Hacks, Malware, Security and Safety

BeckyStrause

Several of our blog posts are regarding staying safe & secure.  This is because every time we turn around there is news about a new hack, attack, or aack! (As in, “Aack, they stole my password!”)

In recent weeks, the New York Times and Wall Street Journal have suffered breaches to their systems.  Twitter discovered an unauthorized attempt to access user data, and concluded that limited data of 250,000 may have been accessed. The Department of Homeland Security encouraged users to disable Java on the browsers because of potential threats.  Internet advertising network NetSeer suffered a hack causing website visitors to be warned that they were visiting was a “known malware distributor.”  Yahoo mail was hacked by an individual who uploaded a video demonstrating how he did it.  With stories like those continually in the news, we want to make sure to keep people aware and educated on security measures.

One security misconception is that if you only go to “trustworthy” websites, you’ll never get malware.  Cisco’s 2013 Annual Security Report has proven that wrong.  Their report states, “Our data reveals the truth of this outdated notion, as web malware encounters are typically not the by-product of “bad” sites in today’s threat landscape. Web malware encounters occur everywhere people visit on the Internet — including the most legitimate of websites they visit frequently, even for business purposes.”

Their point is that malware encounters happen most through Dynamic Content websites and Content Delivery Networks.

  • Dynamic webpage : A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual.
  • Content Delivery Network : A large distributed system of servers deployed in multiple data centers in the Internet. The goal of a Content Delivery Network is to serve content to end-users with high availability and high performance.

It’s not just the sites selling weight loss pills and fake Rolexes that you have to be concerned about.  Malware attacks are common and becoming more common.  In the argument of “Who’s to blame?” it’s important to understand that most websites are not intentionally serving malware.

Cisco also makes the following points:

The challenge of securing a wide range of applications, devices, and users — whether in an “any-to-any” or Internet of Everything context — is made tougher by the popularity of the cloud as a means of managing enterprise systems.

Addressing security challenges presented by virtualization and the cloud requires rethinking security postures to reflect this new paradigm — perimeter-based controls and old models of access and containment need to be changed to secure the new business model.

As the security experts work on new solutions, we have a few pointers for you:

  • Make sure you are running an active and updated anti-virus program.  This should help with both keeping potential viruses away, and cleaning out malware.
  • Create complex and varied passwords for different sites.  This will help if one of your accounts is ever hacked and someone gets your password.  A hacker may try to sign into various common accounts with the same user name/password combination.  It’s more difficult to hack a more complex password than an easy one.
  • Use multiple email addresses with multiple prefixes for different uses.  For similar reasons as using different passwords.  So if someone gets into your email, you may not automatically be giving them access to all your other information.  Such as, if they get the email address associated with your Facebook but that’s not the one you use to sign into your banking info, your banking info can remain safe.

For more security tips, check out our various blog articles on security, such as:

By Eberly Systems 02 May, 2024
West Lawn, PA, May 2, 2024 — Eberly Systems , the West Lawn-based managed IT services and managed voice provider, today announces its acquisition of the Lebanon-based LYLAB Technology Solutions. Eberly Systems seeks to further a movement of people who are motivated and equipped to make a difference in their world through their daily work. They believe in building lasting partnerships based on trust and transparency while delivering industry-leading solutions to support and protect critical business assets. Driven by the principles of people, excellence, integrity, and stewardship, the team prides itself on partnering with companies to securely, reliably, and efficiently grow their businesses. “We cannot be more excited to join forces with the LYLAB team,” comments Kordel Eberly, Eberly Systems President & Founder. “ The integration of LYLAB Technology Solutions into Eberly Systems solidifies our commitment to providing small businesses with unparalleled service and support. We’re proud of this new opportunity to carefully design and manage the IT infrastructure and systems of even more local businesses and communities.” The acquisition solidifies the Eberly Systems commitment to supporting businesses in Lebanon County. Merging the two teams together as one entity offers the collective team the benefit of enhancing capabilities, refining processes, and extending reach to better serve the evolving needs of small businesses in the surrounding area. Future plans include expanding their presence into Lancaster County.
computer help with IT support
By Eberly Systems 16 Jan, 2024
A trusted MSP can be your invaluable strategic partner.
By Eberly Systems 02 Jan, 2024
These 5 key features of Office 365 Business Premium make it essential for businesses to have.
set of keys
By Eberly Systems 19 Dec, 2023
Eberly Systems has been hard at work over the last year in a concerted effort to enhance the security posture of our clients’ information technology environments. Here are the quarterly updates.
construction site
By Eberly Systems 03 Jul, 2023
After years of steady growth, the workforce at a construction development and property management company was becoming increasingly frustrated by disorganized data. Eberly Systems deployed a hybrid cloud storage solution for efficiency and secure data access.
By Nate M. 01 Jun, 2023
SharePoint file storage has both features and limitations that you should be aware of while storing and accessing files. Here's a rundown.
By Nate M. 05 Jan, 2023
These are the Eberly Systems recommendations for creating good passwords in 2023.
By Eberly Systems 15 Dec, 2022
Every business relies on phones and a phone service. In accordance with Eberly Services Managed IT, we offer Managed Voice solutions for both handheld and softphones supported by our stellar sales and help desk teams.
By Eberly Systems 04 Oct, 2022
Eberly Systems is proud to offer new services around managed endpoint detection & response, cloud security, business internet brokerage, and unlimited projects.
By Becky 22 Sep, 2022
Annual fundraisers offer a great opportunity to use company paid volunteer time off.
More Posts
Share by: