By -- 2019-12-10 in Uncategorized

In today’s day of cyber attacks, viruses and ransomware, business owners and executives are always asking what can we do to limit our exposure?

One of the easiest things we tell them and is considered an industry standard is to never allow end-users to have administrative access to their computers.

In our over 17 years of being in business, it is really easy for us to pull up thousands of tickets related to viruses, computer slowness, and operating system issues that are a direct result of an end user having local administrator access to their computer. In fact, giving users administrative access not only can make your staff less productive, it raises the cost of doing business (e.g. fixing computer issues, employee downtime, data loss from virus infections). Administrator accounts on a computer allow the user to install software, make any change to the system settings, and override local folder permissions. This might not seem like a big deal, but let’s consider the possible issues which result from that:

  • Unauthorized software can be installed on the computer, leading to non-work-related activities and possible computer slowdowns or shutdowns.
  • Unlicensed software can be installed, opening your business up to potentially hefty fines from software vendors.
  • Users can intentionally or unintentionally execute a malicious program, leading to infections that could potentially span many computers on your network. These are often undetectable by anti-virus programs (frequently because the user specifically allows them to execute so the antivirus does not stop them).
  • If multiple users use a single PC, the administrator account can be used to access data in other user profiles. This could allow for data breaches, theft, and privacy concerns.
  • Operating system settings can be changed intentionally or unintentionally causing potentially unfavorable consequences.

While limiting users access might seem like an inconvenience for some, mitigating the significant risks and costs associated with running with Administrator access, is well worth any inconvenience, especially when you have a 24 x 7 helpdesk to provide that access and oversight to make sure the right components are being installed. We have seen firsthand the devastation that can occur when malware can run with full admin access and today’s day, that cost can easily exceed hundreds of thousands of dollars.

By -- 2019-12-5 in Blog

A large-scale threat campaign used several fake IRS websites to target over 100,000 people this summer. Researches at cloud security solutions provider Akamai, discovered that the phishing campaign used hundreds of different types of domains and URLS to imitate the Internal Revenue Service of the United States for over two months. Victims of this threat campaign were directed to a fake IRS login, asked to enter their email address and password, and were tricked out of offering personal information. The fake campaign in total used at least 289 distinctive domains and 832 URLS to target people from all over the world.

It also appears that the threat actors have targeted legacy websites. Katz, principal lead security researcher at Akamai expressed that he believes that a lot of the websites that hosts the IRS phishing page are legit websites that have been compromised and hijacked by cyber criminals mostly because of the public’s trust in these websites.  Katz also predicts that it is not a coincidence that the hacking began in August. Research has indicated that August is a good time for criminals to receive engagements from victim since it is a time for vacationing where victims have more  time to read personal email, open suspicious links and browse the internet.

 

If you are worried about fake websites for you or your company and would like to setup security awareness training, OptfinITy can help.  Give us a call at 703-790-0400 or via email at sales@optfinity.com.

By -- 2019-11-18 in Blog

Have you ever traveled before with a phone lower on power and tried one of those “free” USB charging stations?  According to a recent report, it turns out the convenient USB power charging stations found in airports and malls may come with a cost.  Officials are warning that  that travelers should be wary of using USB ports when charging smartphones since hackers have devised ways to download and steal data from phones and tablets by modifying USB connections and installing malware onto your phone without your knowledge. This technique is known as ‘juice-jacking.’

Although, the general notion of juice-jacking is viewed as a relatively new hacking threat, it is not as new as it seems. In fact, attendees of security conferences back in 2011 have been warned about the dangers of plugging their devices into public charging kiosks.  The concept of juice-jacking has also been proven at hacker conventions and seen by many travels who have had the unfortunate encounter of having their personal information and data stolen due to juice-jacking. For more information on your latest security concerns and other technology related resources, check out our website at www.optfinity.com.

By -- 2019-09-30 in Blog

Having a solid IT infrastructure is the absolute bare minimum if you want your organization to grow and prosper in the 21st century. With the technology age in full swing, organizations that don’t adapt and implement the latest technologies will be left in the dust. A recent entrepreneur.com article lists a few areas that business owners should focus on to ensure present and future success.

  1. Don’t just move to the cloud. Adopt the cloud- The cloud itself is not going to transform your business. You need to take advantage of its functionalities to make your organization operate more efficiently.
  2. Constantly upgrade your networks and move to software-based networking- Network upgrades are necessary to eliminate vulnerabilities and optimize proficiency. However, if your network updates require downtime and changes in hardware, you are quickly falling behind. Many organizations have already switched over to software-based networking which allows for small updates to be sent regularly without disrupting users and in turn eliminating downtime.
  3. Know your software and don’t let it become outdated- Software is the backbone of a company’s IT structure and can be used to run its networking systems. Through analytics and machine learning, certain types of software now are able to adapt the system in real time, essentially maintaining themselves virtually.

The window is rapidly closing for companies to jump on board of the technology train. If your organization hasn’t already began looking into or adapting the aforementioned practices, or if you have any questions regarding your IT infrastructure, don’t hesitate to give us a call at 703-790-0400 or shoot us an email at info@optfinity.com.

By -- 2019-09-25 in Blog

Elaborate phishing scams are already a massive problem that continue to cost organizations thousands of dollars as a result of employees clicking on malicious links or sending money to someone claiming to be their boss. Thanks to technological advances in AI, there is a new threat to look out for, vishing (voice phishing), that allows criminals to mimic the voices of employee supervisors and demand large transfers of money from employees, passwords, or other critical information. A recent thenextweb.com article discussed a situation in which $243,000 was transferred to cybercriminals from a CEO thinking he was speaking with his boss who worked at a parent company.

Back in March, a CEO of a UK-based energy firm received a call from whom he believed to be his boss at a German parent company requesting a prompt wiring of $243,000 to a Hungarian supplier. The cybercriminals had used voice-generating AI software to mimic the German accent of the British CEO’s boss, which lead the unsuspecting chief executive to proceed to wire the money. It was only after a second request to wire more money that the executive became suspicious, refused, and alerted authorities.

This isn’t the last time this will happen. With the improvement of voice mimicking software comes more opportunities for criminals to exploit their capabilities. If you have any questions or concerns related to cybersecurity, vishing, or phishing, please don’t hesitate to give us a call at 571-370-5777 or visit our cybersecurity division’s website at www.perusity.com.

By -- 2019-09-17 in OptfinITy News

OptfinITy, the DC area’s leading IT provider for small businesses and non-profit associations announced today that the Alexandria Chamber of Commerce has named OptfinITy as a 2019 Best in Business Finalist. This annual event recognizes companies who set themselves apart as leaders in the area.

OptfinITy believes there is more to running a business than simply providing services, which is why they frequently sponsor local networking events, volunteer to speak at business growth workshops and cybersecurity seminars, and sponsor events honoring local police, firefighters, and first responders. “We’re honored to be selected as a finalist for the Best in Business Awards and to be among other local organizations who work to enrich our community by taking initiative to improve the lives of not only our clients, but everyone in the community, outside the confines of the office and workday,” says Michael Drobnis, Founder & CEO of OptfinITy.

This year, the Best in Business Awards will be held on Wednesday, October 2nd, from 6:00PM – 9:00PM at The Westin Alexandria which is located at 400 Courthouse Square, Alexandria, VA 22314. We hope to see everyone there!

By -- 2019-09-12 in OptfinITy News

The Washington DC Metropolitan area’s leading managed IT service provider’s President and CEO will be presenting a cybersecurity presentation at this year’s Fairfax County Small Business Forum. The presentation will be from 10AM-10:50AM and will cover a variety of topics ranging from how to spot a phishing email to how to secure your organization and the many network and system vulnerabilities that exist.

Cyber threats have a high potential of putting small businesses out of business due to their expensive recovery costs. “As you may have heard in the news, cyber threats are on the rise and it is therefore extremely crucial for small businesses to have top-notch cybersecurity plans,” said CEO Michael Drobnis. As an owner of an IT firm with over 20 years of experience working with small businesses to implement effective cybersecurity programs, attendees will walk out with the knowledge necessary to help them take extra precautions to protect their organization.

About the Small Business Forum:

The Small Business Forum offers small business owners opportunities to network, seek coaching and “find out what is available in our business ecosystem” by engaging with fellow business people, Fairfax County agencies, federal agencies, larger corporations who seek subcontractors, and business services exhibitors all under one roof for five hours. Some of the past successes include several small businesses securing contracts during the forum, as well as numerous long-standing business relationships initiated during sessions.

We hope to see you there!

By -- 2019-09-6 in Blog

When a natural disaster or great tragedy occurs such as a massive hurricane or the Boston bombing, your immediate reaction may be to want to help those who are suffering during these circumstances by sending monetary donations. Unfortunately, cybercriminals know this and take advantage of people’s good will through phishing scams and the creation of fraudulent websites that ask for monetary relief. To best protect your technology from being exposed to malware, here are a few guidelines to follow in the wake of a disaster:

  1. Highly question any individual plea for financial assistance. This includes solicitations on social media, direct emails and crowd funding websites. Even if it appears to come from a trusted source, always double check with the Federal Trade Commission Consumer Information website or National Voluntary Organizations Active in Disaster website for guidance.
  2. Beware of emails containing links that claim to lead to a website with “more information” or photos. Although the photos and information may be relevant, it is extremely important to double check if it is a trusted website before clicking on the link.
  3. A good way to check to see if a website is legitimate is to scroll over the URL. If the URL says something different than where you are trying to go, you know it’s a fraudulent website. For example, you may receive an email that says donate here for hurricane disaster relief efforts at www.madeupdomain.org, but when you scroll over the hyperlink it would say www.madeupdomain.com.
  4. Never even open a spam email, let alone click on the attachments or links inside, and never reply to an email with or give any personal information to a website that you are not 100% positive is legitimate.

You should always be following safe email practices, but in the wake of disastrous events it is especially important to be on the lookout for phishing and malware schemes since they routinely spike under these circumstances. Once your technology is compromised, it is expensive to fix, so don’t put yourself in that position. If you have any questions about how to prevent yourself from becoming a victim of a malware or phishing attack, don’t hesitate to give us a call here at OptfinITy at 703-790-0400 or visit us on our website at www.optfinity.com.

By -- 2019-08-28 in Blog

In the current technology age, every organization relies on a secure network to ensure efficient daily operations ranging from lead generation and sales to internal functions such as HR and accounting. That being said, if your network is infiltrated with malware, it isn’t just a problem for the IT department; it affects the entire organization and can cost them thousands of dollars. A recent entrepreneur.com article provides some suggestions on how to maintain a secure, malware-free network.

  • Protect all your access points with strong, complex passwords. If you’re worried about forgetting them, check out our previous blog that provides an easy trick, or use a password manager such as LastPass.
  • Ensure that all your software and systems are up to date. Cybercriminals are coming up with new ways to infiltrate systems and developing new viruses every day, so if you’re not constantly updating your systems and software, you’re leaving yourself vulnerable.
  • Limit the amount of file sharing enabled devices and relegate all file sharing to one server. This allows for easy monitoring for unauthorized access and limits the number of targets for a breach.
  • If your organization doesn’t already use private IP addresses, you should consider doing so. Having specifically assigned IP addresses for devices makes it easier to identify unauthorized network access by checking router logs.

While these suggestions are all great ways to prevent malware from infiltrating your organization, you should still constantly back up your data. That way, in the event of malware getting past all your defenses, you won’t lose everything in a breach, or be forced to pay in the event of a ransomware attack. If you have any questions or concerns about the security of your organization or how to stay malware-free, don’t hesitate to give us a call at 571-370-5777 or visit our cybersecurity division’s website at www.perusity.com.

By -- 2019-08-22 in OptfinITy News

The Fairfax County Small Business Commission, which assists in the development of small, minority and women-owned businesses, holds monthly meetings on the fourth Monday of every month that focuses on an array of topics. OptfinITy President and CEO Michael Drobnis was this month’s featured speaker and delivered a presentation on the cyber threats that face small businesses and organizations.

As the DC Metropolitan area’s leading managed IT services provider specializing in small to medium sized organizations for the past 20 years, Mr. Drobnis has been working with his clients to keep their organization’s safe from cyber threats and has prepared a plethora of useful tips on keeping your business safe and secure.

If you were unable to attend the presentation but still have concerns about your organization’s cybersecurity, please still feel free to give us a call at 703-790-0400, shoot us an email at info@optfinity.com or visit our website at www.optfinity.com, or our new cybersecurity division’s website at www.perusity.com.