Thursday, September 12, 2019

New Scam call targeting your Apple ID - DOnt fall for it

New apple scam: Read this pass it on and remember

Get a call stating from apple warning you Apple ID it compromised....they offer to connect to apple support...hang up and do not give any info...

It is a scam...

Just like Microsoft will not directly notify you of a breach.. neither will Apple..

I was at the DR this morning and received the call, unfortunately, no way to record it.. I had a client that fell for the Microsoft version and they took him for more than a 1000 dollars.

Please share this message, it may save someone you know..



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Tuesday, September 10, 2019

GermanWiper Ransomware Targets SMBs

GermanWiper Ransomware Targets SMBs 

German SMBs are the target of a new ransomware that’s wreaking havoc on company data. 
The ransomware is delivered by a phishing campaign purporting to be from a potential job applicant, and the email contains an attachment that poses as a PDF resume from the sender. 

When users click on the attachment, it unleashes a ransomware attack that demands payment in Bitcoin to decrypt the files. 

Unfortunately, even if businesses pay the ransom, their files are unrecoverable. This particular ransomware, dubbed GermanWiper, erases the encrypted data, making it permanently inaccessible to users. 

GermanWiper is a reminder of the precarious nature of ransomware attacks that are increasingly targeting businesses and government organizations to extract large payments. If companies are unprepared for a ransomware attack, there is no guarantee that they will ever recover their information by paying a ransom, and other restorative processes can be even more costly than the ransomware demands.

Therefore, defensive initiatives are business's best bet for avoiding a ransomware attack, and, with security specialists (Like us!) ready to help out, now is the right time to ensure that your company is ready to defend against today’s always-shifting threat landscape.

https://www.bleepingcomputer.com/news/security/germanwiper-ransomware-erases-data-still-asks-for-ransom/

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Friday, September 6, 2019

UK SMBs Fend Off 10,000 Cyber Attacks Per Day

 
According to a recent report by the Federation of Small Businesses (FSB), UK-based SMBs are enduring significant cyber-attacks that total nearly 10,000 per day. 

Respondents indicated that one in five small businesses were the victim of a data breach in the past two years, and the survey identified other ancillary consequences accompanying this incredibly high number. For instance, the threat landscape is both expansive and diverse with businesses reporting 530,000 phishing attacks, 374,000 malware incidences, and 260,000 ransomware attacks. 

Moreover, the collective cost of these data breaches exceeds £4.5 billion with the average cost of an attack costing companies £1,300.

Interestingly, the survey found that many companies aren’t equipped to defend against these threats. The research found that 64% of small businesses don’t have a security team, and only 1/3 provided cybersecurity training to their employees.

Partnering with qualified security professionals can help augment your company's cybersecurity posture, shoring up vulnerabilities to address the significant cyber security risk facing SMBs.

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Tuesday, September 3, 2019

Will you fall for the scam?



Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Monday, September 2, 2019

The Increasing Cost of a Data Breach



As the headlines continually demonstrate, data breaches are quickly becoming a prominent problem for organizations of any size and operating in any sector. The bad news, according to IBM’s annual report on the cost of data breaches, is that they are also becoming more expensive. 

In 2019, companies can expect to spend $3.92 million on a data breach, a 12% increase in just five years. 

With today’s regulatory landscape trending toward consumers, companies can expect these numbers to continue increasing as governments intend to exact financial penalties from organizations that can’t protect their customers data. 

Consequently, highly-regulated industries like healthcare and financial services saw the most significant price escalations.

The report is especially troubling for SMBs. IBM concluded that companies with less than 500 employees will still incur losses in excess of $2 million if a data breach occurs, and they can expect these costs to continue to for several years after a breach.

The high cost of a data breach makes cybersecurity partnerships a relatively inexpensive way to protect your organization from the catastrophic consequences that accompany a breach.


https://www.cbronline.com/news/data-breach-costs-2

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

How To Build And Remember A Strong Password

The first stage in helping to secure our devices or online accounts is to construct strong passwords. A strong password is one that cannot easily be guessed or generated by human or automated attacks. Strong passwords are long, and they should appear meaningless to others.

Because strong passwords have to be difficult for somebody to guess, it may also become difficult for you to remember your passwords. You can get around this problem by using a secure password manager. You then need to remember only the password you use for your password manager account. The password manager looks after all other passwords.

Constructing a strong password

The basic rules are simple: 

1) Make your password a long stream of random characters
2) Use a mixture of upper and lower case letters 
3) Include some non-letter symbols 

The longer a password is, the harder it is for trial and error attacks to stumble on it. Using the letters A-Z and digits 0-9, there are more than 94 million ways to make a 9-character, single case password. There are more than 9 trillion ways to make an 18-letter combination from the same set.

By introducing a mixture of upper and lower case letters, we increase the number of possible 18-character combinations to over a quadrillion (a quadrillion is 1 followed by 15 zeroes). Adding in six symbol characters to the mix makes 12 quadrillion plus combinations possible. 

Method for building a password

One good idea is to select a random location from a book, or another text source, and choose the first or last character in a given number of words from that location. To demonstrate the principle, we will construct an 18-character password using the play Romeo and Juliet. You will have to remember your master password. Writing it down somewhere is bad practice, so you need to come up with a system that will enable you to retrieve it. As we build our password, we will also build a key that will help us do this.

We decide to start at Act I, Scene I and choose the first 12 words of spoken text (ignoring stage directions, who is speaking, punctuation, etc.). The opening 12 spoken words in Romeo and Juliet are:
Gregory, o' my word, we'll not carry coals.  
No, for then we  

We take the last letter of each of those words to begin our password, which gives us: 
yoydltysorne

We start to build our key at the same time. Since we only use the works of Shakespeare, we can use an abbreviated key, 12LR&JAISI, for Romeo and Juliet, Act I, Scene I. The '12' at the start of the key tells us how many words we're picking, and the 'L' tells us we are using the last letter of each word (we could use the first letter and code F). 

We now want to capitalize some of the letters. We can use a simple pattern, like capitalizing every second letter, or something less obvious. Let's capitalize every fourth letter.

We now have: 
yoyDltySornE

We add U4 to our key to tell us every fourth letter is uppercase, giving us: 
12LR&JAISIU4

Next, we want to add some digits and symbols to bring our password up to 18 characters. We end up with:
4y%oy2DltySo$r#n6E

This is a very strong password indeed. 

The last step is to add the digit and symbol information to our key. We use a simple position, character pair to tell us the rest of our password. 14 tells us that at position 1 is the digit 4, 3% tells us that at position 3 we have the % symbol, and so on.

Our full key now looks like this:  
12LR&JAISIU4143%6213$15#176

This is indecipherable to anybody else. (Do not tell others what techniques you are using to construct your passwords. If they know your techniques, it gives them a chance of working out your password). You can store your key as your password recovery hint in your password manager. In this example, if we ever forget our password, all we need to do is look up the appropriate part of Romeo and Juliet, and we can rebuild it.

Flexibility

Note that we can make multiple passwords from the same piece of seed text just by changing our capitalization rule, by using different symbols and digits, by positioning symbols and digits differently, or by using the first letter of each word instead of the last. To recall our password, all we need is the seed text and our key. We chose to use Shakespeare because any of his works can easily be found online, so we have no need to worry about being unable to access our seed text.

You can use whatever method you prefer to choose seed text. As long as the seed text is globally available to you, you will never have to worry about forgetting your master password

Robert Blake
877.860.5831 x 190

Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com