The Central Texas IT Guy

Web Development Austin, SEO Austin, Austin Search Engine Marketing, Internet Marketing Austin, Web Design Austin, Roundrock Web Design, IT Support Central Texas, Social Media Central Texas

Tips To Stay Safe When Sharing Files Online

October 16, 2015

Online file sharing is a feature that allows the users to send or receive documents in a quick and convenient manner. However, every new technology comes with its own set of challenges. With the increasing cyber threats and data breach incidences, internet safety has become an important concern than ever. Staying alert and following the required safety practices can help to minimize the occurrence of a data breach.

Here are some of the tips that can help you stay safe when sharing files over the internet:

  • Choose Strong Passwords: Although it is a much known security practice, unsecure or weak passwords are still the cause in most cases of hacking attacks. Ideally, you must create a separate password for each online account that you manage. Make sure your password is at least 12 characters long with a combination of lower and upper case alphabets, numbers as well as symbols. Names, date of births or common legible words are easy to interpret and hence, should not be used as passwords.
  • Use Two Factor Authentication: Safeguarding your files with a two-step authentication provides an added layer of security. Besides the user name and password, an additional verification element is required to gain access to the files. These may include a one-time password sent on the individual’s phone, verification links sent through emails, answering a security question or performing a biometric scan of an authorized user.
  • Encrypt Files: Sharing files without proper encryption puts them at risk for a breach. Encryption will make sure that even if a hacker has gained access to your files, he would not be able to open and read it. Only the authorized individuals will have the key to decode the file so as to make it comprehensible.
  • Avoid Downloading Unknown Files: Apart from the files that you send, you also need to be cautious with the ones you receive online. It is important that you download only those files that are sent from trusted sources. Additionally, you must be more careful while downloading email attachments with .exe, .com, .bat, .zip and .vbs extensions. These may contain malicious codes, viruses or programs aimed at stealing information from your computer.
  • Install And Run Security Software: You must install and constantly update your anti-virus and firewall software to defend against viruses that you may get from shared files. Even when you download files from a trusted source, make sure you run an anti-virus scan to prevent breach of your important documents stored on the computer.

For more online file sharing tips, you can contact Centex Technologies at (855) 375 – 9654.

Reasons Why Trojan Virus Is Dangerous

October 10, 2015

Trojan is a malicious software program designed to carry out unauthorized actions on a computer. These may include deleting system files, modifying, blocking or copying data and disrupting the computer’s performance on various networks. Although Trojans do not have the ability to replicate themselves like a virus, they can allow installation of viruses in the infected computer.

How Trojan Infects A Computer?

Trojan viruses can infect a computer through any of the following ways:

  • Email Attachments: Trojans can be sent in a disguised form through email attachments. The hacker may send emails claiming to be from credible organizations that compel the users to download attachments.
  • Game Downloads: The virus can infect a system through free game downloads, specifically from unauthorized sources.
  • Web Browser Exploits: Trojan viruses can also enter a user’s computer through security vulnerabilities in the web browser.
  • Messaging Clients: The hacker may send a spam link or malicious code through instant messaging platforms which, when downloaded, infect the device with a Trojan.

Consequences Of Trojan Virus

Here are some of the reasons why Trojan virus can be dangerous:

  • Steal Identity: Certain form of Trojans jot down whichever key you strike on your keyboard. Thus, they are able to steal your username and password for different websites, known as an identity theft. When the hacker breaches your account, he can get access to your contacts and send them malicious URLs to infect their system as well.
  • Manipulate Requests: Trojans can also be used to execute a man-in-the-browser attack. When an individual performs any financial operation, the virus may manipulate the amount and account details once the transaction has been confirmed.
  • Difficult To Detect: Unlike other viruses and worms, Trojans are much difficult to detect and remove from the computer. This is because they are not active unless you are doing something important on your computer, such as logging into an account or transferring funds from your bank account.
  • Subjugate The Computer: Trojan allows the cybercriminal to take complete control over the infected computer. Hence, they are able to turn on their web cam, disable the mouse or keyboard and even boot up the system.
  • Launch Another Attack: DDoS attacks can also be carried out through some types of Trojan viruses. The hacker may install other malicious software, damage the system or steal important information stored in the computer.

It is important that you keep your anti-virus software updated to detect any Trojan infection and prevent the hackers from accessing your computer.

Things You Should Know About Cloud Computing

September 29, 2015

The word ‘cloud’ has gained much popularity in the past few years. Cloud computing essentially means storing all your electronic files, software, applications, documents, programs and data over the internet, instead of your computer’s hard drive. Considering the virtually endless benefits it offers, majority of businesses are switching to cloud computing to make the most of this service.

If you are also considering moving your business activities to cloud, here are some of the important things that you should know:

  • Different Versions: Cloud computing services can be availed in different versions. Among them, the most common are Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS). In the former one, you need to pay a monthly fee to store your applications and files on your cloud provider’s servers. On the contrary, in IaaS, the users can have a direct access to their servers and data centers. This service operates on a pay-as-you-go basis, i.e. the users are charged according to the space they use on the virtual machines.
  • Less Burden On IT Staff: Your IT staff spends a good deal of time on maintaining, troubleshooting and updating the equipment in the office. However, with cloud computing, all these tasks can be outsourced to your provider. This will help to reduce burden on your IT staff and allow them to focus on other tasks critical to the success of your business.
  • Better Accessibility: With cloud computing, you can have complete access to your files and important documents from anywhere at any time. All you need to have is an internet connection and a compatible device. You do not need to be present in the office to handle the business activities.
  • Unlimited Storage Capacity: When you store your applications on cloud, it eliminates the issues concerning exhausted storage space or expanding data centers. The users can anytime increase the storage capacity according to their requirements.
  • Flexibility: As cloud computing services are charged on a monthly basis or according to the consumption of space, it offers a greater flexibility to companies. For instance, if your business witnesses high and low phases during certain times of the year, you can easily match the capacity of cloud storage to suit your needs. With this, you can also make huge savings on your company’s IT finances.

For more information about the benefits of cloud computing, you can call at (855) 375 – 9654.

How To Improve IT Security In Your Organization

September 24, 2015

IT security is one of the biggest challenges faced by every organization. Considering the different malware and networking threats discovered frequently, the impact of a feeble security policy can be disastrous. Hence, data security should be your company’s top priority, specifically if your business activities involve storing sensitive customer details.

Here are some practical tips that can help to improve IT security in your organization:

  • Establish A Definite Plan: Chalk out a well-defined plan stating the actions that should be taken to evade a data breach. This should include terms and policies regarding which data can or cannot be accessed by the employees. The rules mentioned in the plan should be strictly followed by each and every individual who is a part of the organization. Also, the security policies must be reviewed and updated from time to time.
  • Educate Your Employees: Let your employees know about the potential security risks and the best practices to mitigate them. They should be educated about creating strong passwords, handling spam emails, maintaining data backup etc. Also, there should be a dedicated IT staff that they can turn to in case of any doubts or concerns.
  • Set A Data Storage Policy: You should also implement a data storage policy in the organization. It should have a clear mention of the data that should be stored or deleted from their devices. Keeping files with certain extensions can also increase the risk for a security breach.
  • Ensure Encryption: If you need to store any sensitive customer data such as names, passwords, credit card details, email addresses, bank account numbers etc., make sure they are properly encrypted. Only a limited number of employees should have access to the computers containing this information. You can also consider using two-factor authentication for added protection.
  • Avoid BYOD Culture: With a rise in the work from home culture, the data security risks have also increased manifold. The personal devices used by the employees may not be compliant with your company’s security plan. This provides hackers an easy pathway to gain access to your organization’s confidential data. To prevent this, do not allow employees to use their own devices as long as they are made to comply with the company’s policies. Connecting portable networking devices with the office computers should also be restricted to prevent a malware breach.

We, at Centex Technologies, provide complete IT security solutions to businesses across Central Texas. For more information, you can call us at (855) 375 – 9654.

The KeyRaider iOS Malware: How To Keep Yourself Safe

September 17, 2015

Following the discovery of MAC firmware worm Thunderstrike 2, the cybersecurity experts at Palo Alto Networks along with WeipTech, have released reports of a new iOS malware, KeyRaider. Being responsible for the largest ever account theft caused by a malware, KeyRaider has successfully stolen credentials for more than 225,000 accounts of Apple customers. The Apple devices targeted by KeyRaider were primarily jailbroken, i.e. they permitted the download of unauthorized applications, extensions and themes from sources other than the Apple App Store.

How Does KeyRaider Work?

When a user jailbreaks an Apple device, the malware prompts him to install a third party app from a Cydia repository. Once the app is downloaded, KeyRaider attempts to steal important account credentials and Universally Unique Identifier (UUID) number. It allegedly intercepts random data from iTunes accounts of users who have installed malware-ridden apps on their jailbroken devices.

In addition, the malware even goes a step further to access Apple’s service certificates, disable remote unlock feature and share App store information. This allows other users to use the stolen data in order to purchase premium apps or themes from the Apple Store.

How To Detect And Remove KeyRaider?

The most viable way to keep your Apple device protected against KeyRaider is to keep it updated with the latest software applications. You should also not jailbreak your phone as its removes Apple’s protections and make your device vulnerable against security breaches. However, if you have already jailbroken your phone, here are some of the steps that you should take to protect yourself against KeyRaider:

  • Search ‘Filza File Manager’ on Cydia and install it on your device.
  • Open the app and go to /Library/MobileSubstrate/DynamicLibraries/.
  • Select the first file that has a ‘.dylib’ extension.
  • After opening the file, type in the following keywords into the search bar – wushidou, gotoip4, bamu, getHanzi.
  • If you are able to locate any of these keywords, your device is infected with malware. Make sure you remove the file along with all the ‘.plist’ files in the same name.
  • You should follow the same steps for each ‘.dylib’ file that you find in the directory. Once done, reboot your iOS device.

After you have successfully removed the malware, it is suggested that you change your Apple account password and enable two-factor authentication to keep your device safe.

© Copyright 2022 The Centex IT Guy. Developed by Centex Technologies
Entries (RSS) and Comments (RSS)