img not found!
Tip

Uk SMEs facing an unprecedented level of attempted online fraud

According to experts at smallbusiness.co.uk the Uk is experiencing an unprecedented level of attempted online fraud this month – the reason is a simple one as the article explains
slidetwoData from payment processing company Worldpay suggests instances of fraud could rocket by as much as 80 per cent in February as hackers start to capitalise on customer data harvested during a hectic Christmas shopping period.
Tim Lansdale, head of payment security at Worldpay says, ‘We see a dip in fraud around Christmas as hackers go on the hunt for information, using the online sales rush to stockpile thousands of customer card details.
‘It isn’t until February that they start cashing in on all the data they’ve collected. Other breaches can last much longer; attackers might decide to keep returning to their targets, sometimes for years.’
During 2011-2014, the average data breach exposed 284 days of card payments. Worldpay’s analysis shows breaches lasting from 11 days at the lowest end of the scale, to 1,723 days at the other extreme.
The company says small businesses are by far the biggest target for hackers, accounting for 85.7 per cent of UK data breaches. Virtually all data breaches (99.3 per cent) happened online, rather than at the point of sale, as the UK’s e-commerce market continues to boom.
SOSIn 2014, businesses in the entertainment, hobby and leisure industries accounted for 23.3 per cent of all card data breaches, followed by clothing and footwear stores (16.3 per cent) and jewellery, beauty and gifts (11.6 per cent).
Businesses in the entertainment industry, particularly online ticket booking systems, tend to make easy prey for hackers due to the high number of credit and debit card transactions they process online each day.
The clean-up costs of being targeted can run to tens of thousands of pounds, with a standard investigation costing £11,250 on average, and attracting at least a £8,000 penalty, not including the costs of lost goods and damage to reputation.
Lansdale says, ‘Data breaches can be ruinous, so its vital small business owners know the risks and take the necessary measures to protect themselves and their customers and employees.
‘You wouldn’t leave your store unlocked overnight, yet so few businesses are doing enough to protect their online shop fronts and keep hackers at bay.’
Worldpay advises taking measures such as changing all your default passwords, having a third party host your payment page, and testing your firewalls at least every three months,
NIgel_Mills_MBMSecurely destroying all card data records when no longer needed, and avoiding storing the three digits ‘CVC’ number on the back of the card, are also measures that should be observed.
At MBM we can help Small Business combat this fraud. We would love to speak to you about protecting your data.

The Invisible destroyer

How protected do you feel in your Business ? Is everything you do being watched? How common are viruses in today’s workplace? Look at any computer in your office. You can’t see the security threats, but they’re swirling round it like a malicious cloud. They’re multiplying and getting more sophisticated all the time. If one of them gets in, it could do untold damage to your business. And the hard truth is that anti-virus software simply isn’t enough any more.

slidetwo

Many business owners assume their systems and networks are protected. But what happens when people take their work laptops out of the office? What if they open a zip file that’s pretending to be from an online marketplace ?

What if they click on a website picture that has malicious code embedded in it?

The worst viruses and malware will immobilize a computer. If it’s on your network, the problem will spread through your business. Every computer will probably need completely wiping. While that’s being done, everything grinds to a halt costing you precious man-hours.

Here at MBM we take these threats very seriously we pride ourselves on our security record and endeavour to make sure all your data is protected from attack or theft.

We can provide solutions to protect your network from unwanted threats. These solutions can be installed on local PCs and servers to monitor threat activity and quickly deal with it. The software has the ability to update itself silently over the Internet and provide a centralized server-based management console to monitor threats and provide reports. We can also provide our own mail scanning solution called InterLinx Filtered Email to filter and clean Emails before they even arrive at your desk, this is done by routing your inbound and outbound mail through our secure scanning servers on the Internet; this ensures that both you and your mail recipients are protected.MBM_42Emails_Blog_small

If you would like to find out more about what we do, then please call us to arrange a meeting. You’ll meet a network engineer, not a salesman! Call 01902 324494 or email sales@mbmltd.co.uk

Do you know what Malware is ?

So what is Malware? Short for malicious software, malware is as old as software itself, and  programmers have been authoring it for as long as they have been authoring legitimate software. There are many reasons why a programmer might create malware. These reasons vary from simple pranks and experiments to serious organized Internet crime. Malware exists in many forms, most of which you’ve probably already heard of. The most common types of malware are viruses, trojans, worms, spyware and zombies.

SOSThis article will cover the inner workings of the most common types of malware, and will also explain why malware is created and the kind of damage that it can inflict on individuals, corporations and governments.

Virus

Malware manifests itself in different forms; the most well-known is the virus.

Computer viruses are similar to their biological counterparts because they are capable of self-replication. The prime motivation of a virus is not to cause damage, but to clone itself onto another host so that it can spread further. If a virus causes damage it is more likely to be detected, and for this reason virus authors employ stealth techniques to keep it unnoticed. A good virus has a very small footprint and can remain undetected for a very long time.

Damage is not always a side-effect of infection. Sometimes damage has been purposely built-in by the programmer. Some viruses are time activated; they silently spread for a number of days, months or years and will suddenly activate and do damage on one particular date. Other viruses are event driven. They will activate when something particular happens on a host, or when a command is sent to them via a covert Internet channel.

Worms

Worms are very similar to viruses in many ways. The biggest difference between a worm and a virus is that worms are network-aware. A virus finds it very easy to replicate itself amongst files on the same computer, however it has a hard time jumping from one computer to another. A worm overcomes this computer-to-computer hurdle by seeking new hosts on the network and attempting to infect them.

This is an important difference: in the past viruses could take years before moving from one corporation to another, or from one country to another. Worms are capable of going global in a matter of seconds. This makes it very hard for them to be controlled and stopped.

Spyware

The primary function of spyware is to snoop on a user’s activity and send back the information it gathers to a hacker. Spyware does not have any infection mechanisms. It is usually dropped by trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s computer and sits there silently to avoid detection.

Once spyware is successfully installed it will begin collecting information. It is very common for spyware to log all the keys that the user types. This type of spyware is called a keylogger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. Keyloggers capture every key stroke, so entire emails, documents and chats can be read by the malicious hacker.

There are more sophisticated forms of spyware that hook themselves to the network interface and siphon off all network data that enters or leaves the infected computer. This allows the hacker to capture entire network sessions giving them access to files, digital certificates, encryption keys and other sensitive information.

If you would like to know more from guys who don’t speak Geek – call MBM

How does your computer become infected ?

There are literally dozens of different ways a computer can become infected with spyware, viruses, and other malware. Below is a list of the most common ways a computer can contract these infections listed in the order we believe are most commonly done.

Please be aware –  everyone  who uses the computer should be aware of how to properly use it  and protect it from malicious software.

NIgel_Mills_MBMAccepting without reading

By far one of the most common ways a computer becomes infected is the user accepts what he or she sees on the screen without reading the prompt or understand what it’s asking.

Some common examples:

  1. Whilst browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required. Without fully understanding what it is you’re getting, you accept the prompt.
  2. When installing or updating a program, you’re prompted (often checkboxes already checked) if it’s ok to install additional programs that you may not want or are designed to monitor your usage of the program.

Opening e-mail attachments

Another very common way people become infected with viruses and other spyware is by opening e-mail attachments, even when from a colleague, friend, or family member. E-mail addresses can be made up and even when genuine your acquaintance may unsuspectingly be forwarding you an infected file.

When receiving an e-mail with an attachment, if the e-mail was not expected or from someone you don’t know delete it. If the e-mail is from someone you know still be cautious when opening the attachment.

Not running the latest updates

Many of the updates, especially those associated with Microsoft Windows and other operating systems and programs, are security updates. Running a program or operating system that is not up-to-date with the latest updates can be a big security risk and can be a way your computer becomes infected.

In addition to running operating system updates, the plugins associated with your browser can often contain security vulnerabilities. Make sure you have the latest versions of plugins. Contact MBM for details of the latest updates.

Pirating software, music, or movies

If you or someone on your computer is participating in underground places on the Internet where you’re downloading copyrighted music, movies, software, etc. for free, often many of the files can contain viruses, spyware or malicious software. This is a highly dangerous practice and you should have procedures in place to stop users doing this.

No antivirus spyware scanner

If you’re running a computer with Microsoft Windows it’s highly recommended you have some form of antivirus and spyware protection on that computer to help clean it from any infections currently on the computer and to help prevent any future infections.

Downloading infected software

Finally, downloading any other software from the Internet can also contain viruses and other malware. When downloading any software (programs, utilities, games, updates, demos, etc.), make sure you’re downloading the software from a reliable source and while installing it you’re reading all prompts about what the program is putting on your computer.

Where can I find out more?

We are happy to advise on your business protection at MBM. We are your IT department at the end of a phone – keeping your business – in business.

Tip

Protected against the latest viruses ?

You may have heard or seen the news coverage about a computer virus called ‘Gameover Zeus’. The FBI and National Crime Agency (NCA) in the USA managed to take control of a network of infected computers (known as a botnet) in an attempt to stop the network growing any larger.

MBM_42Emails_Blog_smallThe botnet is used to send annoying Emails with attached zip files that pretend to be from organisations you are familiar with (ie your bank, utility company etc). However, if you open the file attachments, the malware it contains will install on your computer and it too then becomes part of the infected network of computers.

Once on your computer the virus searches for private information such as bank account details and sends the data back to the hackers.

The press are reporting that it will take the hackers two weeks to regain control of the network and recommence. Therefore there is a small window for users to ensure their anti virus software is up to date and perform a scan.

MBM Customers Protected

If you are an MBM customer, you will be using our Panda Cloud Protection anti-virus software which we ensure is updated. Our centralised management tool tells us that our clients with this software are up to date and protected from Gameover Zeus.

Own anti-virus?

But what about customers or businesses who use their own anti-virus tools?

Jason Timmins, Technical Director at MBM, suggests that you first ensure that you have anti-virus software, second that the anti-virus sofware you use has the latest updates and thirdly, that you perform an up to date scan of your computer and remove any infections it finds.

For further information about the virus visit:

http://www.bbc.co.uk/news/technology-27681236 

http://www.getsafeonline.org/nca 

For further information about IT Security visit our website: http://www.mbmltd.co.uk/IT-Security.aspx

MBM can ensure you have the best anti-virus software and ensure your business is secure. Call us on 01902 32 44 94

Our Office Hours

contact

Do you have any questions?