a
Friday, November 1, 2024
HomeArts & LifeLifestyles (Page 83)

Brandon listed as a gateway city for agritourism corridor project

Brandon Bits and Bites

Hamilton Going to Tour de France

Local pizzeria celebrating 30th anniversary

Minimum wage rises today in Manitoba

J&G Homes Arena Welcomes Joe Beeverz

Wendy’s Expansion

Health care support workers set strike date for October 8

Email attachments and CryptoWall

The CryptoWall 3.0 virus has been circulating for a while now. I know it has affected a number of businesses in the Westman region. CryptoWall is spread primarily as an email attachment. Here's how the story went for one of my clients. My client received what looked like a very legitimate email from someone with an attached resume. The attachment was a zip file which when opened installed the CryptoWall 3.0 virus on the computer. Clicking on the attachment appeared like it didn't do anything as the expected resume did not appear. However, that's all it took to install the virus. CryptoWall 3.0 creates a private encryption key on the attacker's server and goes through all the folders of your computer encrypting them with that key. It also goes through the folders on any mapped network drives and encrypts them as well. Once the files have been encrypted, they are no longer useful to you. They can't be opened as the programs will now see them as invalid files. The only way to decrypt the files is with the public key the attacker has. In each of the folders with encrypted files, there are also a number of ransom notes named "HELP_DECRYPT". Those files give instructions about how to send the money to get the encryption key for your files. They have been asking for $500 USD if paid within 5 days or $1000 USD if paid after that. Fortunately for my client, they had our Off-Site Backup service for their server. So, we were able to restore copies of all the files on the server from just minutes before the virus encrypted them. However, we did not have backup service on the computer which opened the email attachment. So, all they had left on that computer were some files they had recently backed up to a USB stick. We could have paid the money to the attacker to decrypt the files from that computer, but in this case my client felt it wasn't worth it. I'm glad the attacker didn't get any money out of this situation. In each of the cases I have seen, this virus has arrived as an email attachment. Most of the time it has been an email claiming to have a resume attached. Take away notes: 1) Be careful what email attachments you open. - This one is so tricky because legitimate resumes often come from people we don't know and sometimes when we're not expecting them. The only thing that could have tipped this one off is that it was a zip file - which may be suspicious. The other thing is there was no other contact info such as a phone number, or introductory info in the body of the email. 2) Make sure you have a good backup plan in place. - If you have a regular backup of your critical files, the effects of an attack such as this are greatly minimized. Being able to go back to the way things were just before the attack can help you get back up and running quickly. 3) Make sure you have good AntiVirus software installed on your computers. - There is no perfect AntiVirus, and unfortunately the installed AntiVirus did not stop the attack in the example above. However, it did help with removing the virus. Of course this is not the only threat and a good AntiVirus will stop most of these attacks. The most recent Trend Micro Worry-Free Business Security has added features to help prevent this kind of attack. 4) Check your security policies. - This attack could have been minimized if the user who opened the attachment did not have Administrative privileges on their local computer. On a Windows computer, only a user with Administrative privileges can install software. In larger organizations, most users don't have admin privileges. However, in smaller businesses, it is very common for a user to have admin rights on their local computer so that they can install their own software and updates. Your network administrator can help with removing Admin rights for most if not all users. Here's some more interesting reading about CryptoWall 3.0: http://blog.trendmicro.com/trendlabs-security-intelligence/cryptowall-3-0-ransomware-partners-with-fareit-spyware/ CryptoWall 3.0 is pretty scary stuff, but these tips should help minimize the potential risk to your business.

Don’t let this happen to you…

Anyone who is immersed in technology on a daily basis knows how wild and wonderful it is all at the same time!  New gadgets, apps, and devices are being developed and introduced every minute of every day.  Along with this constant advancement comes a certain amount of responsibility in being smart and safe, particularly when it comes to your data. I'm not talking about personal information, but the other digital information we collect:  music, movies, books, documents, and in this case, your photos. What you are looking at is the equivalent of a year-and-a-half worth of professional photographing, editing, refining, and creative work that could potentially go right down the drain.  This 1.5TB (TerraBytes, which is 1500GigaBytes) came to a screeching halt recently after running continuously (24/7) for about 7 years.  This is just one of 8 hard drives in our fileserver that is full of our daily commercial and portrait work. If you look at parts of the top disc, you can see circular lines where the drive has simply “worn out”, which had a snowball effect and lead to the complete failure of this hard drive.  Of course, disaster was averted in this case because of the live backups we keep of all of our precious data in our active server.  For anyone who collects and stores massive amounts of critical data, whether for business or personal use, the practice of daily backups is essential.  After having several hard drives fail over the years, I can tell you that it’s an inevitability.  It’s a question of when, not if a hard drive will fail. The thought of the day: when it comes to your data, how are you protecting it?  Do you have a backup hard drive? When it comes to your photos, do you print the most important ones? When you stop and think about it, it's pretty clear that the most reliable, long-lived copy you can have of any image is a printed copy.  Most people will have prints or albums of their parents or grandparents that are decades old.  A print on a wall will last for decades.  A print in a box or an album (not exposed to daily UV light) will potentially last for centuries.  An image on a hard drive might last seven years, or at least until the hard drive fails completely.  Sure there are lots of different conditions and variables to consider like the make and model of the hard drive or storage device, or even the quality of the print itself (note: archival printing is engineered to last 100 years).  But at a glance, look at the necessity of having to store digital images and even maintain them by checking them every once in awhile, and buying a new backup device every so often because they simply wear out, all in an effort to preserve your images (or any other data for that matter).  Now compare that to an album or a box of photos that sits on a shelf somewhere, that only needs to be looked at and enjoyed from time to time.  Much more low-maintenance. The bottom line: if you want to preserve your images, the best method is to create physical copies of them, whether prints, albums, canvasses or the like.  They are not prone to hard drive failures, OS updates, power outages, or any other technology-induced issues.  And they can be viewed and enjoyed anytime, anywhere, and will potentially last hassle-free for several generations.  :)