Wiperware: New Malware That Shouldn’t Be Taken Lightly

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Any business can be a target for hackers who use ransomware. However, in recent months, a major new threat has emerged. The recent Petya attack was initially perceived to be another form of ransomware.

However, as the firms involved took stock in the aftermath of the events, it became apparent that the attack took the form of “wipeware,” code that is designed to completely destroy the files stored on any system.

What is wiperware?

Wiperware is designed with one goal in mind: total destruction. The malware asks users to install a software update and then it immediately takes control of the device. Once it has gained admin access, it completely overwrites all files on the device and in some cases the entire network. Any attached storage is also vulnerable, included USB external drives, memory sticks and network shared drives.

While the motivations behind Petya remain unknown, what is abundantly clear is that wiperware is a threat that needs to be taken very seriously. Here are a couple of things you can do right now. [Continue reading]

Do I Really Need A Firewall For My Business?

Before we answer that, let’s look at what a firewall actually is. No, no actual flames of any kind are involved whatsoever. A firewall is a barrier or “shield” intended to protect your PC, tablet, or phone from the data-based malware dangers that … [Continue reading]

VoIP Phones: Is It Time You Made The Switch?

It’s 2017 and, in case you didn’t know, VoIP phone systems just keep getting better. Yes, the landline is losing ground to yet another competitor: VoIP. Cell phones have made home phones much less prominent, but for businesses, there is and likely … [Continue reading]

Helpful Tech Tips To Prevent Phishing

Many of us have clicked on an email that appeared authentic, but was not. Those fortunate enough to identify any suspicious elements before an attachment is opened or a link is clicked are the lucky ones. But, sometimes, we don’t notice those little … [Continue reading]

Improve Your Staff’s Productivity Using These Five Tips

Increasing employee productivity is a positive approach for companies, regardless of the industry; however, the concept can be rather vague. Productivity means more than just working to meet a given quality standard, therefore, it isn’t always … [Continue reading]

What Is Credential Management And Should I Have It?

In the world today, we have many things to remember and passwords are one of those. We have alarm codes, website logins, usernames, passwords, passphrases, bank account information, and everything in between. However, if you’re on top of your … [Continue reading]

Gone Phishing! How To Spot A Phishing Scam

If you are a user that has been around for a while, there is a pretty good chance you’ve been targeted with a phishing scam. You may have a long lost relative in another country who left you millions – and all the executor of the estate needs is your … [Continue reading]

Windows 10 Creator’s Fall Update to Bring Hardened Ransomware Protection

2017 has seen some of the most high-profile ransomware and cryptoware attacks to date. These incidents have demonstrated that these types of attacks can have catastrophic effects that reach far beyond the ransom demands paid to these … [Continue reading]

Is Your Network Due For A Security Audit?

Businesses always face security risks from a variety of different sources. Performing a security audit can help you to identify where you have exposures, develop a better understanding of the security policies and controls you have in place, and … [Continue reading]

Data Redundancy And Why You Should Have It

Data redundancy is the making of an exact copy of the data that you are currently working with, in the event of a hardware failure, theft, or those pesky mistakes where you delete something that you really wanted. What happens is you will have 1 … [Continue reading]