Multiple Antivirus: Why More Isn’t Better

When you were younger, you’re taught that more is always better. So, if you have more layers of protection, you can defend your computers better. Right?

The System Impact of Multiple Antivirus

That is not exactly true when it comes to antivirus. The reason why is that we are encountering a lot of people that install multiple antivirus packages on their machines. Sounds good in theory but what they do not know is that antivirus does not play well with each other. We are finding a lot of people installing the antivirus by their ISP and utilizing their current antivirus product as well. Next thing you know the computer is slow, locking up or the network is completely unresponsive. This is a disaster. It is best to select one antivirus platform and give it all the resources it needs to do its job.

The Same Issue with Anti-Malware

The other thing that we are seeing is a lot of people make the mistake of installing multiple anti-malware utilities as well. A good antivirus and anti-malware utility is all that is needed. A lot of people install 5 to 6 different anti-malware utilities in order to protect themselves, but this trust is misplaced.

Armor Up Your Network the Right Way

A good firewall, a good content filter, and good DNS service mitigate any need for any type of multiple antivirus and anti-malware products. What I mean is this, you should never give all of your trust into a single point of failure. Armor up your firewall, armor up your Internet connection, get a VPN when appropriate and keep a clean nose when it comes to updates and patches. Do them on a weekly basis to prevent 0 day Trojans and infections.

Great protection for your computer network requires having the right systems in place. Let Triton Technologies help get you there. Contact us today, and we’ll help you get the security you need without impacting computer and network performance.

 

 

WannaCry or GoingtoRelax?

On Dealing With Ransomware

A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were utilized to take down literally hundreds of thousands of computers, from hospitals, government, and large corporations.

For days people were freaking out and having a tremendous time securing their networks. Traditional methodologies failed. Traditional thought processes failed.

In the days and weeks since this attack, we have learned much. From the tools they use, to methodology and the exploits.

We Suffered No Incidents

At Triton Technologies, we were not affected at all. Not a single one of our clients’ computers, not a single compromise network, not even a rogue email. Not that we didn’t see a single remnant of it, but our technology, up dates and our near-religious security methodologies protected every single one of our clients.

That’s right, not a single person had a problem: business as usual. Just like with CryptoLocker.

Why We Weren’t Affected

The reason why? The exploits that were utilized by the WannaCry hackers dealt with old and unpatched systems. Every single one of our managed clients and their systems is patched daily and weekly. Every exploit mitigated, and every possible vector to enter into a network patched up.

We understand that has affected many businesses and many small business owners are freaking out. Not us. With the right managed plan and the right technology to head off potential disasters, issues like this will never affect the business. The proof is in the pudding, and not a single one of our clients is worried.

Managed IT services saves you money and protects your data. Contact Triton Technologies today and quit worrying about ransomware.

Phishing: STOP Posting Your Personnel’s Contact Information!

Please, please stop.

In marketing, it is great to give your business a personal face: a close contact or a person to call when things go wrong. That is great, but it causes a tremendous security headache in I.T. when you paint that target.

What are we talking about? A common scam known as phishing.

Phishing Targeting You and Your Staff

The way this scam works is a hacker scans your website for contact information. They find a CFO, CEO, a bookkeeper or someone in authority in the company and dig up EVERYTHING they can about them. The do what is known as a “full dox” on the person. That includes information related to their personal lives, charity and so forth.

Laying the Trap

Some time later a person who does payments and who is profiled on the website received this kind of email:

“From: [email protected]

To: [email protected]

Hey, Sarah, I am in NYC at the charity event we talked about and I need you to wire $15,000 to this charity’s bank account. Thanks, Steven.”

Pretty straight forward huh? Steven is away at a charity event, and he sent Sarah a request for a donation to a charity he was at, and everyone was expecting…. BUT IT ISN’T REAL.

Let’s Break It Down

  1. The email address it was sent from was from a common service, usually gmail, hotmail or yahoo. Untraceable or unenforceable. The respond to address may match the companies address, but anyone in email management will tell you that you can easily spoof someone else.
  2. Since Steven made it public he was going to be at an event the hackers used that timeline to strike and send a fake email to the book keeper in the company.
  3. Bank account transfers are tough to reverse and even if you found out where the destination was, the jurisdiction of the united states may not apply.

This can easily result in millions of dollars lost over a period of time or a big one all at once.

Phishing Happens More Than You Think

Companies have been fooled by this type of scam A LOT! A prime example is our main wireless supplier, Ubiquiti. In 2014 the company lost NEARLY 50 MILLION dollars when a mid-level book keeper received an email to transfer many small sums of money to a bank in China. By the time the error was discovered, it was MONTHS later and the thieves have made off with almost all the money.

All they had to do was read the website, build a dox and send an email.

So for your companies safety, DO NOT put your contact information for your employees on your webpage. Just general departments like [email protected], [email protected], [email protected] or [email protected] instead of individuals names. This will extremely reduce the amount of data hackers can get from your website and help protect your money from theft. Contact us for more best practices and how to look out for phishing and other common cyber scams.

Dealing with CryptoLocker: Why We Do What We Do

As the owner of Triton Technologies, I go through constant training when it comes to MSP services, products and support methodologies.

I was at a conference in Hartford Connecticut and listening to other business owners and I heard something that isn’t heard in our office:

“Cryptolocker is kicking our butts.”

We Take Security Seriously

I can barely remember the last time I had to deal with any type of crypto virus. It was early last year (1.5+ years) and it was a personal laptop someone brought into one of our clients to use when there was some downtime. The virus was actually running in the background and they had put it on standby and took it to work. When they opened it up, it continued but the network had all the necessary defenses to prevent it from being more than a blind annoyance.

Our network firewall, the antivirus on all machines, the SSL and third party confirmed certificate communication was all working to prevent it from getting in and it worked perfectly.

The Best IT Solutions are Proactive

The call when it came was a shock but after reviewing the logs, the firewall defenses and the internetwork logs, it was mitigated and shutdown before it did anything actually.

We implement the firewalls, the solutions, the antivirus, the backup, the monitoring and the third party patching because… IT WORKS. It just works, and it keeps the hackers, viruses and more at bay.

Some clients we work with thing we’re over-the-top when it comes to planning and security, but not one has been sad when they realized by taking our advice, they got the tech they needed for dealing with CryptoLocker and avoided having their own data being held hostage against them. If you’re looking for just that kind of solution, contact us.