Categories
Industry Insights IT Solutions Managed IT Services

BYOD Personal Privacy and IT Support Help Desk

BYOD personal privacy is causing a storm in the IT support services industry.  With more and more BYOD, many IT support services departments are getting caught in the middle of protecting corporate information while protecting employee privacy.

Many devices today are filled with personal information including documents and photos however it goes beyond that.  Devices now say a lot about the owner including browsing habits like dating sites or other private information regarding the person.

According to industry best practices a proper BYOD mobile management policy should allow a tech support professional to assist employees with apps and data without encountering any private information or not-safe-for-work (NSFW) material.

The problem here is that tech support departments are finding themselves looking not just at enterprise applications but also at private images and texts which they would rather not see or removing viruses by the same users visiting not-safe-for-work (NSFW) sites.

Here are some interesting facts on the scope of the issue with BYOD Personal Privacy:

  • 40% of tech support employees have had to remove malware from a device that has been infected from a not-safe-for-work (NSFW) website.
  • 33% had to remove malware caused by a malicious app that has been installed. Computerworld checked with several security experts, none of whom was particularly surprised by that statistic.
  • 50% of organizations surveyed acknowledged that their corporate and employee-owned BYOD and mobile devices could have been hacked without their knowledge.
  • 82% of infected sites are not suspicious such as not-safe-for-work (NSFW) website but rather sites that appear benign and smartphones are the biggest malware risk.

Today’s malware from not-safe-for-work (NSFW) websites is dangerous to business IT networks and BYOD is adding to the issue.  Not-safe-for-work (NSFW) websites are only a small fraction of the problems that users introduce to corporate IT infrastructure.

How do you protecting you IT infrastructure from BYOD?

The industry best practice is to create a corporate container to hold all business applications, including corporate email and Internet browsing.  When configured properly, IT support services professionals are able to isolate apps and data in the container from personal information.  The corporate container includes corporate email applications, Web browsers and many other applications.

On an employee level, businesses should be sure to update their policies to include BYOD.

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

CryptoWall, the New Security Threat

 

You have heard of CryptoLocker well now there is CryptoWall.  IT support service professionals are constantly keeping networks up-to-date and secure however this new version of CryptoWall has been released and it is beginning to infecting users at an alarming rate.

Crypto Malware – A Trojan horse that infects systems and holds data and systems hostage.

All Crypto malware is locking important files with a strong encryption.  When infested, you will see a pop-up window informing you that you have a set amount of time to pay for a key which will unlock the encryption. If you do not pay before the deadline, your files may be deleted.

CryptoLocker versus CryptoWall

CryptoWall, it is commonly found in zipped folders and PDF files sent over email. Most emails with the malware are disguised as invoices, bills and other business messages that we people are likely to open as they think it is safe.

CryptoWall can securely delete files.  The encryption has increased security which ensures the files are deleted. This leaves infected users two options: pay the ransom or retrieving the file from a backup, if available.

How do I protect from CryptoWall?

  • Do not open any suspicious attachments, period.
  • Check each email and look for odd items such as spelling mistake, long string of characters or odd domain name extensions.
  • Do not open emails from unknown sources especially if are providing business oriented information including bank statements, accounting statements or bills from a utilities companies.
  • Backup your files. You should have a backup of all information.  If possible, you should have a local and offsite backup of all your data.
  • Ensure your systems are up-to-date and running an active Anti-virus. Your business should also be using a business class firewall with Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention and Content Filtering Service.
  • Use trusted IT consulting professionals. Look for industry leading Managed IT Services providers (MSP), IT Support Services or outsourced IT to help keep your business running and secure.

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

Skype for Business to merge with Microsoft Lync

In a string of announcements, Microsoft will replace Lync messaging app with Skype for Business tool.  Microsoft has confirmed that Skype for Business will remain part of Microsoft 365 service when this happens in 2015.

Microsoft Lync provides enterprise instant messaging as well as VoIP and conferencing capabilities.  The new Skype for Business will be new upon release including user interface and backend.  All Lync Server 2013 will be upgradeable to the new Skype for Business Server.  Microsoft will upgrade all Microsoft 365 clients.

Microsoft will use all Skype icons for calling, video and other functions.  Skype for Business will take on features from Lync including content sharing and telephony.  This will become a very robust communications tool for businesses.

For many who are not aware, Lync can be setup to work within an organization or between multiple organizations or even external users however most IT support departments do not like the third option.

Now here is the interesting part about Skype.  They have over 300 million for messaging, calling, and sharing while Lync is used by thousands of organizations worldwide.  By combining these two, this is a serious threat to the over 500 million users on Facebook Messenger.

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

Asian Luxury Hotels Part of Cyber Espionage

If you travel and stay in luxury hotels in Asia, be aware that security researchers have uncovered a sophisticated industrial espionage campaign.  This cyber espionage campaign targets business executives in luxury hotels across Asia that connect to the hotel wireless connections.  Executives believe these connections are private and secure however they are wrong.

According to recent report from Kaspersky Lab, the attacks cyber espionage campaign has claimed thousands of victims since 2009 and the number continues to grow.  The cyber criminals have targeted executive from multiple industries including automotive, outsourced manufacturing, cosmetic and chemical industries.  They have also targeted very sensitive industries including military services and contractors.

The unfortunate part is that back in 2012, the FBI issued a warning advising them to use caution when updating computer software via hotel Internet connections when traveling abroad.

So how did they execute this cyber espionage?

The cybercriminals were tracking the movements of executives as they traveled therefore allowing them to pounce once a victim accesses a hotel Wi-Fi network.  Once the cyber criminals are done, they would cover their tracks by deleting their presence and tools off the hotels network.

Once an executive would submit their room number and surname to log into the wireless network, they would be enticed to download and update a legitimate software such as Adobe Flash or Google Toolbar.  This group is also known to use other tools such as keystroke-logging software.

Kaspersky has declined to name the executives involved or the infected hotels but it has claimed to inform the hotels as well as law enforcement officials.

Over 90% of the executives came from five countries including Japan, Taiwan, China, Russia and South Korea.  Other executives came from Germany, Hong Kong, Ireland and the United States.

There still is a large piece of unknown information. How did the hacker know the travel itinerary?  This points to a larger compromise of hotel business networks.

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

Thank you. Remembrance Day – Lest We Forget

The team at 365 iT SOLUTIONS honours all those who have fought for our country and our freedom.

Remembrance Day is not only a day about war and the brave we have lost.

Remembrance Day is also about our ideals and what we stand for.

Remembrance Day is about respecting our past and looking towards our future.

The red remembrance poppy has become a familiar emblem of Remembrance Day due to the poem In Flanders Fields.

These poppies bloomed across some of the worst battlefields of Flanders in World War I; their brilliant red colour became a symbol for the blood spilled in the war.

What Happens on Remembrance Day in Canada?

Many people wear poppies on their clothes in the weeks before Remembrance Day. Red poppies symbolize the memory of those who died and white poppies campaigns for non-military interventions in conflict situations. On November 11, special church services are organized. These often include the playing of “The Last Post”, a reading of the fourth verse of the ‘Ode of Remembrance’ and two minutes silence at 11:00 am. After the service, wreaths are laid at local war memorials.

The official Canadian national ceremonies are held at the National War Memorial in Ottawa, Ontario, according to a strict protocol. A service is held and wreaths are laid by armed services representatives. In May 2000 the remains of a Canadian soldier who died in France in World War I, but was never been identified, were laid in the Tomb of the Unknown Soldier at the National War Memorial.

Since then, members of the public have laid poppies, letters and photographs on the tomb. Similar services and events are held throughout Canada. Some schools that are open on Remembrance Day hold special assemblies, lessons and presentations on armed conflicts and those who died in them.

Categories
Industry Insights IT Solutions Managed IT Services

Microsoft Technical Support Phone Scams

 

There has been an increase in fake Microsoft tech support phone calls.  Microsoft does not call consumer or business users so do not disclose any information to these cyber criminals.

In today’s modern age of technology, cyber criminals are getting creative and not only do they send fraudulent email messages, they also setup fake websites to copy the original.  Many times they call to fix a non-existent problem and they may even offer to help solve your computer problems or sell you a software license.

Once they have access to your computer, its game over.

 

They will now do one of the following:

  • Install malicious software that could capture sensitive data such as banking information.
  • They may also charge you an additional fee to remove this software.
  • Have you download software that allows them to take control of your computer remotely.
  • They may adjust your security settings to leave your computer vulnerable to attack.
  • Request credit card information so they can bill you for their fake tech support services.
  • Direct you to fraudulent websites where your credit card will be required.

IMPORTANT: Microsoft nor other partners make unsolicited phone calls to charge you for computer security or software fixes.  Large companies do not engage in this behaviour.

 

What you need to know about telephone tech support scams?

  • Cybercriminals use public phone directories to cold call potential victims.
  • They may know your name from information available on the internet.
  • They may guess your operating system to build credibility and gain your trust.
  • They may ask for your user name and password which is not required by any trusted partner.
  • Do not trust unsolicited calls.
  • Do not provide any personal information.

 

These fake support calls may claim they are from the following:

  • Windows Helpdesk
  • Windows Service Center
  • Microsoft Tech Support
  • Microsoft Support
  • Windows Technical Department Support Group
  • Microsoft Research and Development Team (Microsoft R & D Team)

 

Who should I report these fake calls to?

  1. Always report the issue to your IT contact or your Managed IT Services provider.
  2. You can also contact Canadian Anti-Fraud Centre.

 

How to protect yourself from telephone tech support scams

  • Do not purchase any software or services from any company.
  • Never give control of your computer to a third party unless you know them.
  • Never provide your credit card or financial information to anyone claiming to be from Microsoft.

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

Small Businesses have flawed IT Security Policies

This is not surprising however many small businesses have flawed IT security policies.  The most dangerous part of this is that many businesses think they are small enough to avoid all the threats out there.  According to McAfee, they estimate that the likely annual cost to the global economy from cybercrime is more than $400 billion per year.

Here is a list on the most common flaws in small businesses IT security policies:

Firewall

Your ISP provides you with a router to access their network however many business are adding a little router that is offering you no protection for your business.  Business class firewalls offer Unified Threat Management that is your first line of defence and protects you from the malware and phishing attacks.

Anti-Virus

There are many free antivirus software suites out there however they are scaled-down versions offering limited protection. Antivirus software part of your business layered security approach and it is very important as an out of date one or misconfigured antivirus can be a big IT security threat.

Unsecure Email

POP email is a legacy product now considering there are many cloud solutions.  Out of date email systems transmit passwords in such a way that it can easily be intercepted. The unfortunate part is that many companies use the same password for their pop email as their network. This is a big IT security concern.

BYOD

Mobile Device Security Vulnerabilities are big in the Bring Your Own Device (BYOD) environment.  There is a lack of security on mobile devices and laptops that puts your information at risk.  Many people do not even use something as simple as a screen lock to protect their mobile devices.  Companies should carry strict security policies when it comes to their Mobile Device security of they risk exposing their email and documents.

Wireless Networks

This may be one of the simplest ways to protect your network however there are still companies out there with open, unsecure wireless connectivity.  Unsecured wireless networks are a problem however some companies do secure it however the use very simple passwords which is a huge IT security concern.  You should always use complex password mixing letters, number, characters and symbols when possible.  You can also use two stage authentication using a secure password and MAC address.

How does a small business address these common flaws in IT security policies?

It is important to remember that criminals take the path of least resistance.  Large companies have complex networks with heavy investments towards security to protect themselves.   The good news is that small businesses do not need large budgets to eliminate these flaws in IT security policies, they simply require proper planning and the right advice to make the right decision following industry best practices.

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

Apple iOS Malware Wirelurker on the Attack

What is the first thing that comes to your mind when you think of security vulnerabilities, bugs, flaws or malware? Windows.  Well, let us introduce WireLurker, a new threat to Apple devices.

For a very long time Macs have been considered to be more secure from threats however things are changing.  Not only does WireLurker affect iOS devices, it is relying on Mac OS X vulnerabilities to perform these attacks.

Here are some interesting facts regarding WireLurker:

  • Largest malware to rely on repackaged OS X applications
  • It can automate the generation of malicious iOS applications
  • It can infect iOS applications in a manner similar to a virus
  • It can install third-party applications on all non-jailbroken devices.

So how does WireLurker work?

  • The first step is for WireLurker to infect an OS X system.
  • Once infected, WireLurker hides in the background and looks for an iOS device to connect
  • Once connected, it installs third-party software to the iOS device

What makes WireLurker extremely dangerous is that it can impact both jailbroken as well as non-jailbroken iOS devices.  It is a serious threat because it requests updates frequently from servers used by the attackers, making it more difficult to thwart once users have been affected.

So how do you protect yourself from WireLurker?

Apple, by default, configures OS X to only allow apps from Mac App Store and identified developers.  Do not change this setting as it opens your system WireLurker and other similar threats.

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com

Categories
Industry Insights IT Solutions Managed IT Services

IT Support Help Desk Technician (Level 1 and Level 2)

365 iT SOLUTIONS is Toronto’s leading IT consulting firm and we are looking for our new super hero employee!

We are looking for the right person, not just any person to take on the new IT Support position.

Our team is seriously committed to technology as this is a passionate career not a job.

Our IT team likes to play in sandbox environments testing new technologies for the fun of it.

We are the future of IT.  We use Enterprise class remote monitoring and management (RMM) and professional services automation (PSA) tools to proactive manage our client environments.

We offer a competitive compensation package including base salary, bonus and other incentives.

Our next super hero employee will help our handpicked IT Support Team take calls from clients around North America, respond to IT support services tickets, and find resolutions independently.

You should have proven analytical and problem-solving abilities over the phone and on-site.

We also let our IT team diversify and work on cool IT Projects for our clients across North America.

If you have a passion for technology, you may be our next super hero.

Passion is the difference between having a job or having a career.

You must have a vehicle and have obtained/obtaining recent Microsoft Certification.

 

Primary Responsibilities

  • Perform remote troubleshooting of hardware and software issues for clients across North America.
  • Provide occasional on-site service to troubleshoot hardware, software and networking issues.
  • Use remote monitoring and management (RMM) and professional services automation (PSA) tools.
  • Ability to use industry “Best Practices” and keep proper documentation.
  • Monitor ticketing system to ensure timely resolution of issues.
  • Occasional assembly and configuration of customized hardware requirements.
  • Use of all tools including access software updates, drivers, knowledge bases and FAQ resources.
  • Perform support issues including installations as well as file backups and configuring applications.
  • Monday to Friday from 9:00 AM – 5:00 PM with occasional after hours and rotating on-call required.

Requirements

  • Post-secondary education in Computer Science / Information Technology.
  • Cisco/Microsoft/CompTIA certifications would be an asset.
  • Highly self-motivated and directed with a passion for IT and technology.
  • Proven analytical and problem-solving abilities.
  • Ability to conduct research into a wide range of computing issues is required.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Excellent verbal and written communication skills are a must.
  • Ability to work under tight deadlines; multi-tasking abilities are essential.
  • Must have access to a reliable vehicle.

Technical Requirements

  • Strong knowledge of Microsoft Windows Server 2008 / 2012 including Active Directory.
  • Experience with configuring and troubleshooting desktop hardware and software.
  • Strong knowledge of Microsoft Windows XP to 8.1 and Office 2007-2013.
  • Experience with Remote Control Software such as LogMeIn and MS-Remote Desktop.
  • Strong knowledge of Drive Imaging tools such as Ghost, True Image, etc.
  • Strong knowledge of Email and Messaging such as MS-Exchange, BES, etc.
  • Strong knowledge of Networking concepts and hardware including Cisco, Sonicwall, routers, firewalls, switches and VPN appliances.
  • Strong knowledge of back-up hardware including various tape drives, USB drives and Disk-to-disk systems.
  • Knowledge of RAID including various RAID controllers and general RAID knowledge – building, mounting, breaking, hot spare, RAID 0/1/5/6/10, etc.
  • Knowledge of virtualization platforms (VMware, Hyper-V).
  • Knowledge of back-up software including Acronis, Vembu, WSB, etc.

Would be an Asset

  • Experience with Remote Monitoring and Management tools
  • Prior experience with a Managed IT Services Provider (MSP)
  • Microsoft Certified Solutions Associate (MCSA)
  • Microsoft Certified Partner (MCP) Certifications: Windows Server 2012 or equivalent

 

NO AGENCIES, NO PHONE CALLS, NO DROP INS.

ONLY SELECTED CANDIDATES WILL BE CONTACTED.

Please send your resume in WORD or PDF format to hr@365it.ca 

Visit us online at https://365itsolutions.com/

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Categories
Industry Insights IT Solutions Managed IT Services

Ransomware attacks are on the rise and becoming a business.

Ransomware attacks are on the rise and the bad news it is getting easier to run Ransomware campaigns.

As per all the news reports, CryptoLocker is the best known Ransomware however there has been a string of many others including CryptoWall, TorrentLocker, Simplocker and Koler.

The new ones work in various ways for example, Koler spreads through SMS text messages while CryptoWall uses malvertising but they share one thing, they are both Ransomware.

This are not targeted attacks, they are a wide spread attack so they are considering if you are a corporate user or a home user or even if you are a wealthy person or not.  The way they see it is an email address is an email address, simple.  The more email and devices they infect, the better their chances at getting money.

Now here is the important part, malware is becoming a business they are automating the entire process including infecting emails and devices as well as issuing the ransom, accepting payment and issuing the decryption key.

These businesses are using many different payment methods including Bitcoin, PayPal, wire transfers, MoneyPak, Ukash, and paysafecard.  It security experts have also stated that they will even provide tech support to victims who have paid their ransom but have not been able to recover their information.

So how do you protect yourself from Ransomware attacks?

These are some steps that should be taken to protect yourself from Ransomware attacks.   Remember, you should always protect yourself from data loss with regular backups.  You should always have an active anti-virus security suite of tools running.  Do not open emails if you do not know the person. And finally, browse the internet safely.

 

365 iT SOLUTIONS is a leading IT consulting firm in Toronto. We provide industry leading Managed IT ServicesIT Support ServicesIT Outsourcing ServicesTech Support Services and Cloud Services.

Take advantage of our Complimentary Network and Security Assessment by 365itSolutions.com