Weston Technology Solutions Blog
Blog posts tagged in Security
You may have heard recently about some Russian Malware that is going around. The headlines tell you you need to reboot your router to make sure your router isn't a part of a large botnet. Rebooting removes the malware from the device's memory, but it's likely to come back later if you don't lock the device down by changing the default passwords and updating the device.
If you are a client of ours, however, and are using a SonicWall firewall (either stand-alone or as part of our WestonShield program), then you don't need to worry about rebooting the firewall as Sonicwall devices are not affected.
In Google’s attempt to secure the web as much as possible and to make browsing safer, it’s making some updates to its Chrome browser based on the assumption that all sites should be secure. By assuming that, it is removing the familiar “Secure” label in the latest browser versions and will remove the label and the little “Lock” icon later this year. Instead, it will be marking sites that are not secure and will start showing red “Not Secure” Warnings if you type data into a non-HTTPS web site.
Read more on Google’s decision on their blog and on Naked Security.
When traveling, it’s always temping to hop onto a hotel, coffee shop, or other free public WiFi to get online and possibly get some work done. You need to be careful, however, to make sure your information and security isn’t compromised along the way.
Windows 10 is loaded with data-tracking tidbits and hooks into a variety of Microsoft’s online services. While there are certainly benefits to having those hooks enabled (OneDrive integration and Cortana’s back-end, for example), you don’t have to be thrilled about the idea of Mcrosoft’s operating system calling home or looking over your shoulder. Here’s how you can disable these integrations.
Just a reminder to keep an eye out for Invoice scams that are becoming increasingly common. Like any phishing scam (follow these tips to avoid phishing scams), it’s best to not open or click on anything in those messages. We’ve seen a few of these floating around lately that are pretty elaborate, to the point where the criminal doing everything in their power to look legit. We saw one not long ago where the crooks registered a domain very similar to the company’s actual domain (companyname.com vs companynames.com) and also looked up the names of the C-level officers for the company, and sent out fraudulent messages based on that, asking to authorize wire-transfer to XYZ accounts and make some online payments to a specific URL – neither of which were legitimate requests.
Long story short, stay vigilant, keep an eye out, and always verify verbally with the sender if things don’t feel right.