Monday, June 30, 2014

TecTip #130

Don't want to be hassled by calls or notifications on your Iphone? Simply go to Settings>Do Not Disturb and then turn on Manual so that all incoming calls and notifications will be silenced, and you can not be bothered.

To find more TecTips, go to www.tcgns.com #TecTips #IPhone#TCGNetworkServices

Monday, June 23, 2014

TCG Receives MWOC Award

The Metrowest Work Opportunity Coalition (MWOC) recently gave awards to two local businesses that employ Price Center clients.

The first award went to The Computer Guys, who hired Marty Headd over a year ago. Marty dismantles and disposes of old hard drives for the firm's clients, preventing identity and data theft by thieves who mine junked computers for information.

The company has given Marty more hours and expanded responsibilities over time. He has also been fully integrated into the company's workforce, attending company outings and even the occasional poker night.

MWOC, a subsidiary of the Metrowest Chamber of Commerce, also gave an award to the American Girl Store in Natick, which employs Price Center clients Philip Jasset and Kerri MacLellan.

TCG is honored to have received this award. Marty is an excellent employee, is a pleasure to work with and has become part of the TCG family.

TecTip #129

If you are in a rush or need to charge your IPhone quickly, set it to Airplane Mode and your IPhone will charge twice as fast!

Wednesday, June 18, 2014

Cyberattack Insurance

 As business owners working in a system that revolves around technology and online data, it is becoming essential for businesses to purchase Cyber Insurance. Today, over 50 different carriers provide Cyber Insurance to protect companies against online attacks and the accrued losses. What companies are realizing though is that the insurance is not nearly enough to fully protect the companies, and there are major obstacles for both businesses and insurance. 
      The first major issue both insurance companies and insured companies are facing is that there is not enough historical data to help insurers appropriate an estimate for how much a company would need to be insured for. In the past, many data breaches have either gone unnoticed or were not reported publicly in order to avoid damaged reputation, but that has left insurance companies with very little reliable data. Also, attacks are becoming more and more advanced as time goes on, and so the data that the insurers do have is often outdated and no longer applicable. Past statistics are now almost irrelevant. 
     Last year, the total amount of Cyber Insurance paid was $1.3 Billion. Cyber Insurance numbers are significantly smaller in comparison to that of Property Damage Insurance. Most current insurance plans only cover clean-up costs such as attorney fees, implemented call centers and other steps to help stabilize the company after the breach takes place, but since they cannot estimate how much it would be needed to cover losses, the insurance is limited. Larger corporations are trying to take much more caution and buying millions of dollars’ worth of insurance, hoping to be able to cover any major damages done, but small or medium sized companies are still left with less coverage and greater risk. 
    The second major issue that insurance has almost no ability to fix is the intangible effects a data breach can have on a company. Loss of trust from customers, damage to a brand or company reputation can create far greater losses for a company. Unfortunately, there is no accurate way to estimate what those effects will have on a company. If we look at the case of Target, their brand reputation was seriously injured and many customers no longer trust shopping at their stores. Also, the Cyber Insurance that Target did have cannot fully cover the charges that Target is trying to repay to its customers along with the changes it is trying to make to the company to ensure this type of attack cannot happen again. 
      One tactic that Insurance companies are trying to use in order to better get an idea of an estimate for a company is to hire a hacker and have them find the weak spots in a company’s website in order to get some idea of what their risk would be, but even this is not a completely accurate plan, since cyber criminals are constantly changing their tactics and moving to more advanced technology. Also, with more and more companies joining cloud computing, it is still unsure whether or not this will be safer for companies or create greater risk. In cloud computing, one breach could potentially damage many companies at once, and the new cyber Insurance Industry needs to figure out how to protect these companies as best they can. 

To read more about Cyberattack Insurance, check out the full article from the New York Times.
To learn how TCG can also help insure your company is protected from Cyberattacks, check out our Business Coninuity page and our Systems Management page and see how TCG can provide peace of mind for your business!

Update on Malvertising:Ransomware

  It seems that criminals no longer need to kidnap a family member to demand a ransom; instead, internet criminals have developed a ransomware to go after your money. Most internet users know to be weary of certain websites and advertisements in order to protect your computer from viruses and having malware downloaded. However, malicious advertisements have now started to appear on common domains such as Disney, Facebook, and the Guardian newspaper websites
     Most internet users believe these major sites to be a safe place to browse and check out the various interest-based advertisements, but Cisco Systems recently discovered while monitoring their own user's browsing, that certain advertisements on popular domains are being tampered with by an outside third party. The malicious advertisements are rerouting users to another domain and instantly installing a Rig Exploit Kit after guessing the users login's and passwords. Once installed, the malware locks all of the user’s data access and installs a ransomware called Cryptowall that demands a ransom from the user in order to regain full access to the user’s data. 
     Cisco recently worked with law enforcement to shut down some of these attacks, but they have not been able to learn who is behind the attacks, and how to fully stop them from happening. The problems that arise is that these malvertisements are extremely difficult for websites to detect or even know that they are being tampered with by an outside party. Along with that, these attacks could be made by more than one person, making it more difficult to track exactly where the source of these attacks are coming from. Finally, with the constant changes and upgrades in software and technology, unraveling these attacks and understanding them is only getting increasingly more difficult as time goes on. Law enforcement and Cisco are still working towards a solution. 
      As internet users, it is important to note that the malware seeks out users who are running unpatched versions of Flash, Java or Silverlight Mutlimedia programs. Also, if ransomware is installed into your computer, the longer you wait to pay, the larger the ransom becomes, so be sure to alert authorities immediately! As tempting as it is to be seduced by Facebook and Disney's online advertising, with the danger of Malvertising on the rise and the threat of Ransomware, take caution on what advertisements you decide to click on, or simply avoid them altogether. 

To learn more about Malvertising and Ransomware, read the full article at Network World.
To learn how TCG can help protect your business from internet criminals, check out our Business Continuity page and our Systems Management page. 

TecTip #128

To simplify your Google Search when looking to buy a product within a specific price range, simply type in your search terms followed by your highest to lowest price separated by two periods, and the results will only show your product within the price range your specified. This also works for time periods. For more TecTips, go to www.tcgns.com 

#TCGNetworkservices #TecTip #Google

TecTip #127

To search for an article you forgot the author or title to, type into Google “site:” followed by the website URL and search words from the article, and Google will provide you with all the articles from the website with those search words!

To learn about more TecTips, go to www.tcgns.com #TecTip#TCGNetworkServices #Google

Thursday, June 5, 2014

TecTip #126

If the URL you are trying to post or share is long and takes up too much space, use a free web service such as goo.gl or tinyurl.com to shorten the URL before sharing it! Simply copy and paste the long URL into one of the free sites and it will convert the link to a shorter URL that is easy for sharing.

More TecTips at www.TCGNS.com

#TecTips #TCGNetworkServices