Insider_Threat

Your employees can often pose a huge risk to your data security, but what about ex-employees? Well, it turns out they may present an even bigger threat.

When employees leave an organization, it’s prudent that their network and application privileges are immediately terminated. After all, there’s no need for them to have access to your data and this is particularly important if they’ve left to join a competitor. Not only that, it presents them with an easy route for sabotaging your network. So, it’s clear to see why it’s so important to revoke privileges, but it would appear this isn’t always the case.

Research by OneLogin has demonstrated that 50% of accounts previously held by ex-employees with the power to make IT-decisions are still active 24 hours after they have left the organization. And many employees have revealed that around 25% of their employees’ accounts will still be active for up to a week. And, as you well know, it can take mere seconds to completely compromise a PC, so the delay reported by OneLogin has the potential to cause real damage.

Why Do IT Accounts Need to be Terminated Immediately?

The majority of employees who leave your organization are highly unlikely to even consider wanting to log back on to your network, but there are some who may try as soon as they’ve left the building. In particular, disgruntled ex-employees who have had their contracts terminated are likely to be looking for revenge and, of course, those who have left the business to join a local rival may be tempted to log on and steal sensitive information to give them an advantage. While these individuals are in the minority, it still represents a huge threat to your data.

Despite being a basic threat, and one that’s easy to remedy, the statistics provided by OneLogin would indicate that it’s a simple procedure which is being ignored by many organizations. And the end result of this lackadaisical approach is, as OneLogin’s poll has found, that 10% of all data breaches are believed to have been committed by ex-employees. Eliminating this security risk, therefore, can make a real difference to your overall security.

authorizedpersonnelonly

How to Prevent Ex-Employees Accessing Your Networks

OneLogin have found that ex-employees can spell trouble for your security, but what can you do to minimize the risk? Let’s take a look:

  • Create an exit procedure for IT privileges – Thankfully, most employees will give a certain amount of notice before leaving and this gives organizations plenty of opportunity to plan for their exit. Therefore, there’s no excuse for login details to be disabled as soon as that employee leaves. Sometimes, of course, employees will leave suddenly and, in these instances, IT departments need to be informed immediately to close these accounts.
  • Reduce remote access – Some organizations may have networks which can only be accessed internally, so an ex-employee may struggle to even log in once they’ve left the business. However, many organizations provide remote access to their networks and, if an ex-employee can obtain the web address to access this, they could easily connect. To avoid this, make sure that only certain login names are allowed to log on in this manner.
  • Incorporate an SIEM system – Using a security information and event management (SIEM) system can indicate employees’ activity within individual applications, so this can quickly indicate if any unauthorized access is being made. OneLogin discovered that 41% of organizations do not use this type of system, but it would appear to be crucial in protecting your data.

These approaches are simple, quick and easy, so there’s no excuse for being negligent in this area of security.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Upgrade_Memory_PC

PCs are very important to business and you can’t afford to be without one or using one that isn’t optimized, but how do you know it’s time to upgrade?

The problem with working with an aging PC is that it’s difficult to guarantee its reliability. And if the world of business demands one thing then it’s reliability. Even the very best computers will go into decline or slip behind in terms of technology, so it’s a good idea to upgrade around every four years.

Sometimes, though, an upgrade may be required a little sooner, so let’s go through five signs that your PC is due an upgrade.

dirty PC Fan

  1. Noisy Components

When your PC starts making noises which get louder and more grating as time goes on then it’s an indicator that something isn’t right. In particular, the most common components to start generating such a noise are the various fan drives and hard drives housed within your PC. And when these start to fail – particularly the fans – this puts a huge amount of stress on the rest of your PC, so it makes more sense to upgrade to a new PC.

  1. Out of Date?

New advances in software and technology are so rapid that, depending on the needs of your business, older PCs may struggle to adopt. And, in some cases, older PCs simply won’t be able to run this new technology; this can put your business at a real disadvantage, so sometimes it’s crucial to upgrade your PCs when bringing in new software in order to get the best out of it.

  1. Constant Maintenance is Required

Sometimes you’ll realize that you’re actually spending more time sorting out the various problems with your PC than getting work done on it. And wasted time is wasted money, so it’s a huge drain on your businesses resources and needs addressing. Even if it may seem expensive to upgrade, ultimately it’s going to save you more money in the long term due to increased productivity.

  1. Lack of Support

Once software and hardware providers stop offering support or security patches it means that your PC becomes a liability. After all, what if you have a severe server meltdown and all your data is at risk of being lost? Without any support there’s the risk that you’ll never see that data again. Likewise, without any security updates you run the risk of being hacked. Upgrading to current, supported technology is the only option in these cases.

Slow_Computer

  1. It Slows Down

All PCs reach a point where they simply slow down. Processors have to handle more advanced programs and updates. Their performance can decline whilst the constant demands of a business PC can eventually push them to a point of exhaustion. Therefore, if there’s nothing noticeable which is causing the PC to slow down then it’s time to consider an upgrade.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Printing

It is essential to have a working printer in an office of any size. Here are 3 ways to connect printers as well as their advantages and disadvantages.

Depending on how many staff you have working at your office and the printing requirements needed, you’ll want the most efficient setup available for them. Below are 3 office printing options for you to consider:

1 – Local printer shared over a networkPrinters-HP-OJ-4500-DESKTOP-ALL-IN-ONE-PRINTER-1

Advantages

  • Local printers are relatively cheap to purchase, prices can vary, however the cheapest you can buy new can range from $35-40 or more.
  • They are very straightforward to set up.
  • They fit easily onto a desktop.
  • Suitable for a small team or office to use.

Disadvantages

  • In order for the shared printer to work, the computer hosting the device needs to be online over the network so that other users can print to it.
  • Not suitable for large offices, where hundreds of print jobs need to be processed daily.
  • Most cheap desktop printers that are set up as a shared printer tend to print slower, producing less printed pages per minute than, say, a heavy duty laser jet printer.

2 – Network printer connected over Wi-Fi

Dell wireless printer-p713w-1

Advantages-

  • Moderately priced, prices can range from $100 upwards for a cheaper end laser jet printer.
  • As long as the printer is connected and online, everyone can use the printer.
  • Suitable for medium to large offices who need access to a heavy duty printer such as a laser jet.

Disadvantages-

  • A little more complicated to set up, this usually requires an IT administrator to configure.
  • This setup depends heavily on a wireless connection; therefore the quality of Wi-Fi is essential for this to work efficiently.
  • The distance between the printer to the router is also essential. The bigger the distance, the weaker the connection will be. For instance, the router being too far away from the printer could mean lack of Wi-Fi signal for there to even be a connection. You’ll also need to assess anything that may disrupt Wi-Fi signals, such as the use of microwaves in eating areas nearby.

 

3-Hard wired network printer connected with Ethernet26754_00_1000x1000

 

Advantages-

  • Like the Wi-Fi printers, hard wired network ones that are able to connect via Ethernet are also moderately priced.
  • Suitable for medium to large offices that also require a heavy duty printer or even a multi-functional one with scanning capabilities.
  • A more stable connection compared to Wi-Fi, making it the most reliable solution of them all as far as shared network printing goes.
  • Anyone on the network can connect to the printer without having to rely on it being on a single PC.

Disadvantages-

  • The inevitable use of cables, but can be tidied away with a cable tidy accessory.
  • Even Ethernet printers need to be set up by an IT administrator to allow it to reside on the network and make it available for all to use.
  • As this setup will likely use a heavy duty printer, it’ll also need its own space in the office.

As you can see, the best solution for a small office (or even for a home-based office) is to have a local printer shared over the network. On the other hand, if reliable is important for users at all times within a medium to large sized office, a hard-wired network printer is a much better choice.

For more ways to optimize your printer network setup or network infrastructure, contact your local IT professionals.

Read More


 

The original Windows XP Background location taken in Sonoma Valley, California

The original Windows XP Background location taken in Sonoma Valley, California

Windows XP has officially been retired by Microsoft but does that mean you can safely continue running it at home or at the office?  A report put out by security firm F-Secure has recently highlighted some ways to stay somewhat safe while continuing to run the expired Operating System, while emphasizing that an exploit could be ready any day now:

1. Install the final updates for Windows XP from Microsoft

2. Make sure Microsoft Office is fully patched

3. Update all third party software

4. Run a firewall and antimalware protection

5. Run Micrososft’s EMET (Enhanced Migration Experience Toolkit)

Although these steps can help delay a system compromise, once Windows XP has been infected it is considerably more difficult to clean than other operating systems.  Virus and malware writers will now be able to look at the updates released for Windows 7 or 8 and know exactly where to attack Windows XP since the operating systems share some similar code.  The report also goes on to mention that an exploit on Windows XP will occur soon.

 

The latest F-Secure report highlights risks of continuing to run Windows XP

The latest F-Secure report highlights risks of continuing to run Windows XP

According to the report, web based attacks and infections doubled in the second half of 2013.  It is important to note that modern virus writers and criminals often do not want to damage a computer system.  It is much more lucrative to hold the system ransom for money or to steal sensitive information such as bank logins, email accounts and credit card information.

For more guidance on moving away from Windows XP or securing your home or office, contact your local IT professionals.

Read More


A Common Netgear Wireless Router. Model DG834G.

A Common Netgear Wireless Router. Model DG834G.

A number of Linksys and Netgear DSL modems have been found to be exploitable via a simple hole in the components’ firmware.

How Was This Discovered?

Eloi Vanderbeken recently took up the task of reverse engineering his Linksys WAG200G wireless DSL gateway’s firmware.  At first he did it just for kicks, but during the process he found out even brand name tech components are just as vulnerable to hackers as off-brand products.  Vanderbeken found out during his self-imposed hack-a-thon that his WAG200G DSL gateway was accessible to hackers via an undocumented port.

After Vanderbeken toyed around with the Linksys firmware, he was able to come up with a simple interface that allowed him to send various commands to the gateway without administration authentication.  At first, Vanderbeken found that he couldn’t do much with the interface besides resetting the gateway to its factory settings.  However, as he delved deeper into it, he found that he could inject some home-brewed command lines into the interface.  These simple code injections allowed him to gain control of certain administrative properties using a wireless connection, and to reset the gateway’s web password.

How To Check if Your Are Affected

People interested in the hack and are tech savvy enough can check out Vanderbeken’s published work on Github.  Would-be hackers can do a few things with the script.  Firstly, Vanderbeken only hacked his router because he wanted access to his router’s web console without having to input the admin password—which he forgot.  So if you are the proud owner of these selective devices, you can be assured that they’re hack-able to both you and others with malicious intents.  Chances are most people will rather reset their gateways the easy way by pressing the little red reset button on the back of their device using a pen tip.  People looking for an adventure into the world of coding, however, might actually test out the scripts to see if their highly secured network is bulletproof or not.

Eloi Vanderbeken's bruteforce code to test the vulerability.

Eloi Vanderbeken’s bruteforce code to test the vulerability.

Another thing to note is that the backdoor vulnerability in these LinkSys and Netgear components are only assessable locally.  Meaning, a hacker would have to be in range of your Wi-Fi network for them to compromise your network and personal data.

What Should I Do If I Am Affected?

Quite frankly speaking, unless your neighbor or a passerby knows exactly the type of router you’re currently using, they won’t bother to attempt to hack your network.  The easiest solution, if you happen to own one of these vulnerable devices, is to name your wireless network something other than the router’s brand and model.

Often times, the routers come shipped with preconfigured settings which use the brand or model as the default wireless network name.  If that is the case, simply log into your router, and change the network’s name.  Next, you may also want to upgrade the product’s firmware, but keep in mind that different manufacturers have different firmware upgrade requirements.  Check your product manuals or website before attempting to upgrade firmware, because one wrong move can render your router unusable.

If you need further help, contact your office IT support.

Read More