HomeTestimonialsServicesSolutionsBusiness SoftwarePartnersEventsPartner LogineThinker

Business Services
Networking - Veeam
Network Security
Telephone Service - 3CX
Programming: Customization
Programming: SQL
Programming: Reports and VB

MicroComputer Resources, Inc.
Serving Fort Lauderdale, Miami, Broward County, Dade County, the Palm Beaches, South Florida, the United States, South America . . . and the world!

Phone 954-229-6088
Contact us


Network Security

Nothing ruins your day like the dreaded virus alert.Viruses, Trojans and Worms, Oh My!

    In Lewis Carroll's Through the Looking Glass, the Red Queen tells Alice, "It takes all the running you can do, to keep in the same place."
    This quote has been used to demonstrate the effect of everything from inflation on day-to-day living, to the relativistic effect of light trying to escape from a black hole. It can also be applied to our technological battle against cyber-crime.
     Malware is a collective term for various types of malicious software that infect a user s computer. These include viruses, worms, Trojans, rootkits, spyware, adware, and several others. The most common types of malware are viruses, Trojan Horses, and unwanted software. The number one baddie is the Conficker worm, which targets Windows and spreads across networks to form a botnet of auto-acting malware which now covers over 200 different countries.
    According to a recent report, over 32 percent of the world s computers are infected with some type of malware. The percentage for the U.S. is 30 percent, the eleventh highest rate of infection, costing us an estimated $4.5 billion.
    What to do? The situation calls for constant vigilance and maybe even a little paranoia.

  • Never click on a hyperlink from an unsolicited email. If you know the sender, email back to confirm it's legitimate.
  • Check the web address when you go on-line. A minor difference in spelling may warn you that you're sitting on a clever copy of a webpage, designed to lure you into revealing personal info, including credit card account numbers.
  • Do not download files and programs from the internet unless you really trust the source, and even then, make sure your anti-virus scanner checks it out before you do.
  • Do not panic! And above all, do not believe the email or computer message that is telling you that your credit card, bank account or operating system has been broken into.  It's a ploy to get you to click on the hyperlink or press the button that will allow the hackers to break in for real. 
  • Check out this TechRepublic Top5 video on how the human can be a wide open door into your network. Make sure everyone in your company watches it, including you.
  • Most of all, invest in good virus-protection software.  Talk to us. Our network department has the tools to give your systems a clean bill of health.

Don't Fall for the Tech Support Scam

    Tech support scams rose by 24% last year, Microsoft reported in April, and it may require industry-wide cooperation to solve.
    The scams involve tricking an unsuspecting user into paying a scammer to remove fake or nonexistent malware. A common ploy is to call the user and tell him that malware has been detected on his computer, and then offer to log on and fix it.
    News flash: Legitimate operators do not monitor your system unless you ask them to. What the hacker is asking is for you to give him access to your files--all without having to write one line of code.
     "It can sometimes be easier to convince users to willingly share their passwords, account info, or to install hazardous apps onto their device than to develop malware and steal info unnoticed," Microsoft's Windows Defender research project manager Erik Wahlstrom said.
     Most instances of tech support scams only net the attacker a few hundred dollars, but some have managed to clear out entire bank accounts. It's a growing problem that tools like Windows Defender can't stop because it uses the owner's willingness to believe a cold caller who claims the PC is at risk. As indeed it is--from the caller.
    MicroComputer Resources has a longstanding partnership with Symantec Corporation, a trusted global leader in data protection, archiving, eDiscovery and security solutions.
    Tell us your needs, and we will fit you with the package that best meets your information security and management needs.

What to Do if Your Data Is Breached

    You've taken all the precautions, and it still happened: You've been hacked. Yet there are still measures you can take to minimize the damage. According to a TechRepublic article, failing to react immediately to the data breach will only cause more problems down the line. Here are some steps you can take.
  • Take the affected devices offline immediately but do not shut them. The idea is to cut the link with the hacker while keeping keeping logs and other files that might otherwise be automatically deleted.
  • Make sure your auditing and logging systems are still working, and re-enable them if they're not. This will help track what happened.
  • Change all passwords, which sounds a little like closing the barn door after the horse is gone, but it can prevent further damage if the attack is still ongoing.
  • Determine the extent of the damage. The aforementioned logs will help.
  • Figure out how it happened, because you sure don't want it happening again.
  • Figure out the remedy: Is there a stolen mobile device that needs to be wiped remotely? Does software need to be updated? Notify all personnel who need to be involved in the cleanup and in future safeguards.
  • And here's the hard part: If there is the slightest chance that your customer data was compromised, then you owe it to them to alert them immediately so they can also get to work changing passwords and updating security.
  • Finally, when the dust has cleared, conduct a thorough security review so it won't happen again. And don't forget MicroComputer Resources. We're here to help you.

More Hints:
Defining the Malware Kill Chain
PDFs Are Latest Breach into Your PC
Don't Become the Next Victim of Ransomware
How not to get hooked in a Phishing expedition
Heartbleed: Four years later, it's still around