fbpx

Peter Stack

Peter Stack

Ebay on Wednesday released a warning to all its users to change their passwords following a security hack that compromised a database containing encrypted passwords and other non financial data.

Simultaneously the Ecommerce giant reassured its consumers that for the moment there are no evidence of any unauthorized activity or access to financial or credit card information, which they say are kept separately in encrypted format.

Ebay does not seem to be too concerned about this stolen personal information like postal addresses and dates of birth, as they assert the stolen identities could not be used to access other companies owned by the auction site, including PayPal or GumTree.

But others have different thought saying that the repercussions of this data theft could be felt for a long time after the break-in since we are dealing with identity theft.

The fact is that someone in now claiming to have a copy of the Ebay’s stolen database and is selling that for 1.45 bitcoin (£447) via the website Pastebin.

Ebay took two months to discover it had been hacked as no unusual activities were detected until May.  Apparently a couple of employees company identities were stolen in February, after that the compromised database, which included eBay customers’ names, encrypted passwords, email addresses, mail addresses, phone numbers, and dates of birth, was hacked between late February and early March.

Ebay realized the attack just recently after the repeated attempts to access a database that was restricted for the two identities.

Now some customers are complaining on eBay Community forums saying that they didn’t receive much information about the breach from eBay and have yet to get notifications by email, which the company has promised to do.

The good part is that apparently Paypal doesn’t seem involved in the security attack.

Nevertheless this is another warning call for organizations that need to take an very careful approach to internet security, hacker are more and more capable and keen to get sensible data.

 


Cloud computing became a very popular term; everyone is now switching to the cloud.

When it first appeared as a concept, a lot of critics dismissed it as being the latest tech fad. However, cloud computing managed to cut through the hype shifted the paradigm of how IT is done nowadays

 But what exactly is “Cloud Computing”? The “cloud”refers to the internet, so when we refer to Cloud Computing we refer to the way data are stored and accessed through an internet connection, this means that people are allowed to access their data anytime and anyplace.

Why is so popular? It is a great and easy way to storage your data, but is it a reliable solution? The answer is no, not at 100%.

Like most things in life, benefits come with risks. Let’s try to understand which are the benefits and if they can outweigh the risks.

BENEFITS:

  • Flexibility. The most obvious one, you can access your data anywhere and not just in the office or at home. This means a freer work life. Moreover companies are moving to the cloud because it offers them the flexibility they need to adapt to the ever changing business climate.
  • Less cost More efficiency. Businesses used to manage all their IT on-site using in-house servers, computer rooms and specialized staff. Nowadays most businesses have access to broadband and other advanced connectivity solutions; therefore they can source their IT services online by third-party specialist providers, enabling programs, tools and applications to be accessible from almost any location.
  • This evolution of gives businesses of all sizes the opportunity to reduce the amount of money they spend on hardware, software and IT personnel, so they can focus efforts elsewhere and be more efficient.
  • Backup and Recovery.  The process of backing up is simplified and more secure. Keeping a copy of all files offsite is very important. Even if business files are backed up on a file server, a hurricane, flood, fire or theft could destroy the computers… and backups. Keeping backed up files in the cloud ensures data is safe no matter what is going on at your office.
  • Unlimited Storage Capacity. The cloud offers almost unlimited storage capacity. It eliminates worries about running out of storage space and at the same time it spares businesses the need to upgrade their computer hardware, further reducing the overall IT cost.

RISKS: 

    • Internet downtime.You should remember that the whole setup is dependent on internet access, thus any network or connectivity problems will render the setup useless. That’s why it is crucial to have an alternative backup system on-site that ensure you to minimize any downtime periods an get you business back in track as soon as possible.
    • Security. Are data offsite data secure? No they’re not. Offsite data offer a greater chance for hacker to attack as travelling data are easier to intercept. Nevertheless with technology always improving, there are ways to make sure of better encryption. Good Cloud providers also provide the hardware and knowledge for the most current security measures.
    • Dependency on vendor. It is crucial to choose the right cloud provider as many offer lock in contracts that make difficult and expensive to change the size of the cloud when is needed. This is why is very important to carefully and thoroughly contemplate all options when picking a vendor.

In conclusion despite its disadvantages, cloud computing remains a great choice for businesses especially if well contemplated with the right provider. We certainly hope that the advantages will further grow and the disadvantages will be eliminated but the future certainly looks promising.

 

Google finally released yesterday an update for Google Chrome after fixing the three critical security vulnerabilities of Adobe Flash, Reader and Acrobat that were affecting the Windows, Mac and Linux versions of the browser. In fact before of the update was seriously possible for malicious attacker to take control of user’s operating system.

After paying $ 4,500 to make the better update possible, Google in now encouraging users and administrators to make the necessary updates.

The update is not only available for PC but for Android devices as well, as Chrome is recognized as the most used browser for Androids with over five hundreds millions installs.  But although the update contains multiple security and stability update, there are still major issues, like YouTube support for casting videos and full screen video controls, that have not been addressed yet and that could lead in a future loss of popularity for the famous browser,  

You can read more about Microsoft Security Bulletin at this link: https://technet.microsoft.com/library/security/ms14-may

For more information please Contact Us or visit our Service Page

 

More and more often small to large business choose to outsource their IT System. This trend is given to a series of reasons that eventually will bring the cost down and the reliability up.

Let’s have a more detailed look to each of these reasons:

  • Cost Reduction: this is the most obvious benefit. Outsourcing convert IT fixed cost into variable cost. In practice you pay what you use when you need it.
  • More room for improvement. An IT company will be able to advice you whenever you may be able to improve your business by installing new technology.
  • Trained, experienced, qualified and certified staff. Your IT employees will never be as experienced as an IT company employer that faces everyday new problems in different type of business. IT employee leads an isolated existence no matter how much they train.
  • Increase competitiveness. Higher IT cost and slower performing time leads to higher cost for buyers and so to less market competitiveness.
  • Predictable IT expenditure. Most IT company provide fixed prices so you know how much you are going to spend before of performing the service.
  • Flexibility. Your outsourced IT company is there 24/7 when for your needs. Doesn’t have sick days of day off. You never know when a disaster may happen.
  • Security and recovery plan. An IT outsourced company will backup your data system in a regular basis, so in case of disaster your business will be able to recover all vital data in minimum time and keep with its normal operations.

Visit our Service page for more informations or call us at: 07 3871 1222

Computit | IT Support Brisbane

 

 

 

Cryptolocker is an evolution of non familiar ransomware schemes in which the malware encrypts all the files he finds in different network resources, including shared network drives, removable media such as USB sticks, external hard drives, network file shares and some cloud storage service, and ask for the description key that you should get after paying a fee. The goal of all ransomware variants is to extort money from victims in one way or another.

US-Cert sais the number of infections caused by Cryptolocker are rising and is important NOT TO PAY the demanded fee, but instead report it to the Cybercrime Federal Police.

If the red screen notice of Cryptolocker appear on the screen is very important to disconnect the computer from its wireless network immediately as all other computers of the network are then likely to be infected.

Normal antivirus software protection doesn’t provide a great level of security as the antivirus usually detect the malware after few hours, but meanwhile it is able to encrypt thousands of files on the local drive and present the user with the now-familiar bitmap image explaining the attacker’s demand for ransom.

Avoiding ransomware and minimizing its damage is much the same as avoiding other types of other malware.

A good Antivirus software is a must and is aldo important to and keep Windows and browser-related components (Java, Adobe, and the like) updated.  Always be wary of unexpected email attachments and spam. (CryptoLocker spreads via .zip files sent as email attachments, for example.)

And just to beat this dead horse one more time: Always have a good backup system in place, this is particularly true for business whose loss of data often mean loss of money and reputation.

If you want to know more about how to protect your data, visit our Service Page.

http://www.computit.com.au/disaster-recovery or call us at 1300 443 507

Computit, IT Company Brisbane 

With just under 3 months to go until Microsoft stops supporting Windows XP, it’s worth starting to plan what your business is going to do as the deadline draws nearer. That is, if you are still using it.

Perhaps you think that if you just continue as you are that “everything will be alright”, or have the attitude of “she’ll be fine mate, we’re careful”.

But if you’re approaching your business IT solutions in this way, it can be a nasty wake up call for you when issues arise and you can’t continue trading due to the loss of data or funds.

So here are some things to think about if your business still uses Windows XP:

Running a small to medium business can be daunting as you juggle staff, clients, products, suppliers, finances, and the list goes on.

While you’re busy doing all of the above and more, have you ever thought about your business security and the risks that can be posed by your ex-employees? Do you have an exit strategy for your business where staff are given an exit interview, keys handed in and then all computer access removed for them?

Page 4 of 4

Feel free to contact us

 

If you are looking for a trustworthy Managed IT Service Provider, you have come to the right place.

TALK TO US TODAY

Our Partners 

lenovo partner
autotask partner
avg partner
storagecraft partner
vmware partner
pacnet partner
office 365 partner
webroot partner
cisco partner
microsoft partner
malwarebytes partner
business partner hp
Go to top