The Most Common and Dangerous Computing Threats Dentists Must Guard Against

Your dental practice has much more to do than worry about computer and IT problems. Your staff is busy serving your patients. But if you’re like others, you’re overrun with spam. Even malicious programs like ransomware can be delivered right into an employee’s inbox. Without proper training, employees often open these emails and download malware. This can threaten your patients’ private health data.

Dentist Computers

Since all our devices are now connected to the internet via networks, it’s very important that your computers and networks have the highest protection. Any attack on your system or database can cause more than just computer problems—your data can be hacked and sold on the Dark Web. This is not only stressful, but it can affect your good reputation.

We regularly get calls from dentists who are concerned that their network might be infected with malware or computer viruses. And, we’ve seen cases where the dentist office paid the ransom to get their files returned, but the criminals came back asking for more money. Some of these malicious files can hide in the background and still be working behind the scenes to compromise your database.

Unless your IT provider knows how to secure your network from cyber criminals and beat them at their own game, you could fall victim to them as well.

We’ve seen a sharp increase in the number of dental practices involved in these attacks. So, we’ve written this Guide to arm you with pertinent facts about cyber theft. Here’s what you can do to protect your IT systems.

What’s Hiding In Your Computers?

What You Need To Know About Spyware, Malware & Hackers  

Today’s cybercriminals know how to create malware and viruses that are hard to find and difficult to eradicate. They are also adept at finding vulnerabilities in computer networks where they can enter and secretly infect systems. Thieves may have already infiltrated your practice’s network without you even knowing they’re there.

Spyware

Spyware secretly monitors your computing actions. It exploits user behavior and application vulnerabilities. It gives a hacker sensitive information that you want to keep private.

Spyware refers to hidden programs hackers install on your computers without your permission. They infect your system to spy on your computing actions, gather information, and send this information back to their home base.

In some instances, spyware steals identities, passwords, contact files, and more. It can also take over your computers and use them for illegal activities.  Plus, all this will alter your web browsers and slow down your computers.

Spyware is often attached to free online software downloads or to counterfeit links clicked on by users. It infects computers when someone downloads things like free applications, music, emoticons, and screensavers. It piggybacks onto the download and runs undetected in the background where it collects data about you, your practice, your patients, and more until it’s removed.

Your employees may believe these files are legitimate when they aren’t. Just one innocent worker can accidentally infect your entire network with spyware.

Malware

Malware is short for malicious software. Malware comes in the form of worms, viruses, trojans, spyware, adware, and rootkits. It steals protected data, deletes documents, or adds software that you haven’t approved. Unlike spyware, malware can replicate itself from one computer to the next. It does this via a network connection, or even via your email accounts without you knowing it.

A malware infection can corrupt your files, alter or delete data, distribute confidential information such as bank accounts, credit card numbers, and other personal data. Plus, it can disable hardware, prevent you and your employees from using your computers, and cause your entire network to crash.

Malware is difficult to eliminate – it fights back when you try to clean it from your system. In some instances, you must completely wipe all the information from your computers and hard drives to eradicate it. This requires a complete re-install of your operating system and applications.  Unless you have an enterprise-based cloud backup along with a reliable onsite backup solution, malware could cause you to lose all of your patient and other important data.

Hackers

Hackers are criminal computer programmers. They try to gain unauthorized access to your computers or a network. Hackers may try to alter your system or security features from their original purpose.

Hackers design spyware and malware programs that attack your computers. They may have a criminal intent to steal money from you, hold a grudge against your business, or simply do this for fun.

Today’s hackers are intelligent and use sophisticated exploits to gain unauthorized access to computer systems and networks.

Some of the techniques hackers use include:

  • Vulnerability scanning that looks for unknown weaknesses in your system.
  • Password cracking where they retrieve passwords from data you’ve stored or have transmitted.
  • Packet sniffing using applications that capture data packets to view data and passwords in transit.
  • Spoofing attacks that mimic legitimate websites to trick your employees into visiting them.
  • Rootkits that work to gain control over your operating system.
  • Trojan horses that open a backdoor into your IT system so they can gain access to it.
  • Self-Replicating Viruses that insert copies of themselves into executable codes, files, or documents.
  • Key Logging Tools that record every keystroke on the infected computer.

11 Signs That Your Computer Is Infected

Since many malicious programs hiding in your computing environment, it’s not easy to find them. One way to tell if you’ve been infected is:

  • When you’re swamped with pop-up advertisements that interrupt your work.
  • Your computer is slow, locks up, or crashes frequently.
  • The home page on your web browser changes on its own, and you can’t change the settings.
  • You see toolbars on your web browser that you didn’t put there.
  • You get a second or third web browser popping up behind the main browser that you didn’t approve.
  • Strange files suddenly appear.
  • Your CD drawer opens or closes by itself.
  • You constantly get errors in MS Outlook/Outlook Express.
  • You notice emails in your “Sent Items” folder that you didn’t send.
  • Some of your files are moved or deleted.
  • The icons on your desktop or toolbars are missing or blank.

4 Misconceptions About Computer Threats

“I Can Remove Spyware And Malware On My Own”

Many of these programs can’t even be detected, much less removed. They incorporate themselves so deeply into your operating system that it takes a senior-level technician to detect, locate, and remove them.  In extreme cases, even the best technician won’t succeed and will have to completely wipe your system clean to remove them.

“We Didn’t Cause The Infection”

Malware, spyware, and viruses infect your computers or network when you or one of your employees let them in. Common activities like downloading infected files or applications or visiting counterfeit websites with malicious viruses allow infections to occur.  Emoticons (smiley faces and action characters that you see at the bottom of many people’s emails) can also come attached to viruses. Hackers are clever and are always looking for ways to trick you into downloading viruses. Plus, unless you have the most up-to-date security patches and virus definitions installed on your computer, hackers can gain access if you or an employee click on a malicious link.

“We Don’t Need Ongoing Computer Maintenance”

This is the biggest and most common misconception. There are certain maintenance checks that must be completed:

  • On a daily basis – virus updates and spam filtering.
  • On a weekly basis – system backups and spyware sweeps.
  • On a monthly or quarterly basis – checking for and installing security patches and updates, disk defragmentation, spyware detection, and removal, checking the surge suppressor and the integrity of the hard drive.

You probably don’t have the time nor the expertise to keep up with these things. Plus, with viruses evolving all the time, it’s best to refer to your IT Partner for these maintenance tasks.

“The Security Tools Provided In Our Operating System Are Enough”

They aren’t, and there’s no one vendor that provides all the security you need to keep your computers safe. Your dental practice requires a multi-layered approach to IT security that:

  • Remotely monitors your technology 24/7 to ensure the security of your data and EHRs.
  • Confirms that your data is always stored securely, protected, and private.
  • Includes Compliance and Security Audits to ensure your technology meets today’s stringent HIPAA and Meaningful Use Requirements.
  • Leverages Mobile Device Management, so your data is safe anywhere it goes.
  • Provides Backup and Disaster-Recovery Services so your systems and data are securely accessible, no matter what.

Your dental practice requires the expertise of a managed services and security provider who can remove the vulnerabilities in your IT processes, applications, and hardware that open the door to intruders. They should be capable of deploying remote software and hardware-based network security services to provide complete enterprise-based information security.

How To Secure Your IT System From Malicious Attacks In 6 Simple Ways

As mentioned above, the computers and network you use in your dental practice must be proactively and remotely monitored and maintained. In addition, you must do the following:

Back Up Your Files To A Reliable Source Every Day.

This means using an enterprise-based onsite backup. With local backup (usually an external hard drive), the data is just as protected as your network. However, once it’s stored and the drive is disconnected, it’s safe from any malicious attacks that might affect your infrastructure. Backing up all of your data to an external hard drive is typically quick, and after your initial backup, daily updating can be done in just a few minutes.

Test Your Backups On A Regular Basis To Ensure They’re Recoverable.

Testing that files are recoverable is the missing step in making backups. Too many dental practices make substantial investments and spend a lot of time backing up their data only to find their backups don’t work when they need them. There are many things that can go wrong to corrupt backups. That is why it’s not enough to simply back up your system; you have to check it on a regular basis to make sure the data is recoverable in the event of an emergency.

Keep An Offsite Copy Of Your Backups.

In addition to your enterprise-based onsite backup, you need a secure cloud backup where your data is safely replicated to a data center. To do this, your IT Partner will use technologies like virtualization where they provide a cloud-based version of your servers, workstations, file storage, and applications in a secure data center. This way, if a fire or flood destroys your onsite backup, you’ll still have everything you need to get your practice back up and running.

Ensure You Use Reliable Virus Protection, Keep It On And Up To Date.

The right anti-virus software will detect, prevent, and remove viruses, worms, and other malware from your computer. Most include an auto-update feature that permits the program to download profiles if new viruses appear to check for threats. Antivirus programs are essential, but one program might find certain viruses while another can’t. You should consult with your IT Partner to ensure your dental practice chooses the right software for your needs.

Firewalls Are A Must.

No matter how small your practice, you need a quality firewall. A firewall is the first line of defense to secure your sensitive information. It blocks unauthorized access to or from your network and prevents unauthorized users or illicit software from gaining access. A firewall may be used as hardware, software, or a combination of both.

Update Your Software And System With Security Patches As Soon As They’re Released.

Software updates are important because they often include critical security patches for vulnerabilities. Many of the more harmful malware attacks take advantage of software vulnerabilities in common applications, like operating systems and browsers. Think about this – hackers will know that security patches have been released. They know that Microsoft, Apple, or another software provider has detected a vulnerability. Hackers will be on the lookout for those who haven’t patched their system. If you wait to update, your IT system and data will be exposed.

Your files and patient data are important to your dental practice. Isn’t it time you got serious about protecting them?  We’ll take the guesswork out of securing your computers and network.  Contact us for a complimentary consultation to learn more.

Patient Data Breach at Two San Francisco Hospitals

Earlier this month, two San Francisco hospitals reported that 900 patient records had been compromised. The two hospitals involved were San Francisco General and Laguna Honda. The San Francisco Public Health Department was notified and began their investigation at once. They found that a former employee of Nuance Communications was at fault. Nuance is a third-party vendor to both hospitals providing voice recognition software for medical transcription.

Data Breach San Francisco Hospitals

The Public Health Department is partnering with Nuance Communications to get to the bottom of the breach and mitigate the damage as quickly as possible. The former employee at Nuance illegally accessed the patient records of about 900 patients from the two San Francisco hospitals. The lost data included names, dates of birth, details about patient’s conditions and diagnoses. It did not include any social security numbers, financial information, or driver’s license numbers.

The patient records were accessed between November 20th and December 9th of 2017. The health department confirmed that all patients affected had been notified.

Improvements needed in healthcare networks

In a statement, Roland Pickens, the director of the San Francisco Health Network said, “We sincerely apologize for any inconvenience or concern that this situation may cause. All of our vendors are required to attest to the protection of patient privacy, as part of their contract, and we continue to audit and improve upon that process.”

After an investigation by the U.S. Department of Justice, authorities said they believed the stolen information had not been offered for sale online. They also stated that all personal data from patients had been safely recovered from the former Nuance employee.

A Health Department spokeswoman said that the investigation was still ongoing and that all parties were working together in harmony to resolve these issues as quickly as possible. They assured the affected patients that their personal medical information had been recovered and that the risk of damage from the breach was minimal.

Medical data a valuable target for cyber thieves

Patient medical data has become a hot target for cyber thieves because it usually contains a great deal of information about the patient. Hospitals collect many types of personal information from patients including names, addresses, phone numbers, social security numbers, driver’s license numbers and detailed information about the patient’s medical condition. This type of information is considered high-value by cyber thieves because it has so many different uses. For instance, knowing the medical condition of a person would give criminals an arsenal of tools with which to defraud the patient. In many cases, patients who lose this type of information feel vulnerable. Patients often already feel as if they’ve lost control due to their compromised health condition. But then, a cyber-criminal steals their personal data and they feel as if they’ve been attacked again.

For these and other reasons, hospitals and healthcare organizations must be especially careful when dealing with patient records. HIPAA guidelines provide doctors and hospitals with a full set of standards regarding the processing of patient data. The agency seeks to reduce fraud, waste, and abuse while delivering better health care to individuals.

Other big healthcare breaches

In 2014, 56,000 medical records were stolen from patients at San Francisco General, along with a few city-run clinics. In this case, as in the last one, a third party vendor was responsible for the breach. An employee of Sutherland Healthcare Solutions, a billing company doing business with the hospital, stole the records in order to sell them on the Dark Web, where they might have brought thousands of dollars.

In February of 2015, Anthem Health Insurance experienced a data breach where 80 million company records were breached. To date, this has been the largest attack on hospitals, insurance providers, and healthcare. Investigators said that cybercriminals were able to break into the insurance company’s servers and steal the records.

Officials say that they expect data breaches at healthcare organizations to rise over the next few years. The reason? The information that cyber thieves can collect is so thorough that it allows thieves to assume the identity of the person. Once they do this, they can set up new accounts, access the patient’s bank account, or use their credit cards.

In past breaches, hospitals and health care providers have lost patient records via numerous ways. The top four methods used were:

  • Theft of laptops
  • Breaking into hospital servers
  • Third party vendors
  • Angry ex-employees

In some cases, personal patient info is exposed due to technological glitches in the software or hardware that a healthcare provider uses.

In response to the two latest breaches at San Francisco General and Laguna Honda, hospital officials said they were strengthening their security practices. Many security experts believe that every organization, whether private or public, should treat cyber security as a boardroom topic instead of an IT issue. The rise in healthcare breaches confirms that.

CYBER THEFT, A REAL THREAT TO SMALL BUSINESSES

Cybercrime is no longer a new phenomenon. The zeal with which cybercriminals have committed these offenses in the past has led to an outcry from businesses and organizations. Cybercriminals are constantly on the prowl for new sites to attack. They are continuously improving their methods of attack. To make matter worse, this type of crime is very difficult to solve. The attacks themselves become more sophisticated as the days go by. Many experts are searching for real solutions; permanent solutions.

Cyber Threats To Small Business

The threat to small businesses

While many organizations have put in place various measures to prevent this crime, a look at the statistics reveals that only large organizations are really doing everything they need to do. Smaller companies either think they can’t afford good protection or don’t need it. The best protection from cyber breaches is expensive. It requires training for employees, risk assessment, and the installation of a good array of programs that can detect and prevent intrusion. There are ways that small businesses can get the same top-notch protection as a large organization. And, it is imperative that they do so. A big data breach could cost your company millions of dollars. Most experts say that it’s not a matter of IF you get attacked; it’s just a matter of WHEN.

How real is the threat?

The threat of a cyberattack is a lingering one despite the amount of protection that one invests in. That’s because the nature of this crime is to evolve with each new attack. This is why most business owners prefer to invest in protection services with the ability to detect cybercrime before it occurs. The Verizon Data Breach Investigation Report shows that the threat of cyberattacks on small businesses is much greater than small business owners anticipate. This group states that up to 61% of cyber security breaches were experienced by small businesses last year. This was an 8% rise from 53% in the previous year.[1]

Cost of cyber-attacks on small businesses

While small businesses fail to invest in protection systems because of the costs, it is noteworthy that the amount of money lost as a result of cyberattacks is considerably higher. The ransomware attack is a great example of this fact. One ransomware attack can stop your workforce in its tracks. Your data will be locked until you pay. Some thieves threaten to release your internal documents to the public. This caused a huge amount of embarrassment for Sony Pictures after their 2014 data breach.[2] The North Koreans took responsibility for this breach, claiming that they did not like a movie that Sony was about to release where the North Korean dictator was to be made fun of.

In the end, the damage to Sony was more about being embarrassed before the whole world. Sony’s reputation was severely damaged. Though large companies like Sony can survive an attack like this, small companies cannot. A new study shows that cyberattacks cost on average, $38,000 per attack.[3] Below are a few other stats pertaining to small businesses and data breaches:

  • 23 percent lost business opportunities after an attack.
  • 29 percent lost revenue; 38 percent of those lost more than 20 percent.
  • 22 percent of businesses lost customers; 40 percent lost more than 20 percent of their customer base.

In some cases, small businesses must close their doors within a few months of the attack. Small business owners are only just realizing how vulnerable they are. This is due to the fact that most small businesses are an easy target for hackers. They simply don’t have sophisticated enough data protection programs in place.

What can you do about it?

The first step for any small business is to invest in effective cyber security software. These should be installed on all computers and mobile devices. The second step is to install a remote computer backup. Always have recent copies of your database stored somewhere offsite. A remote computer backup makes recovery of data much simpler.

A third step is to test your data security systems and procedures regularly. This can be easily done through a gap analysis. A gap analysis will enable the business owner to know how effective the data protection system really is. It takes into consideration the detected threats and compares these with the protection system. It is also sensible to develop a data breach response plan. This should include a communications response plan.

Proper response in cases of data breach can save a company millions of dollars and protect customers. A good response plan can let everyone including stakeholders know what’s going on. The sooner your employees know what’s happening, the sooner they can shut down their computers and mobile devices so that the virus can’t spread. All computers and devices with company data should be disconnected from the network until the issues are resolved.

Cyber liability insurance can also come in handy in case of attacks. As we have noted, up to 60% of small businesses which experience cyber-attacks are forced out of business within six months of the attack. Cyber liability insurance will protect your assets.

Final thoughts

Small businesses are currently attractive to cybercriminals because of their lack of protection. When it comes to cyber security, it should be noted that prevention is definitely the best route. Though many prevention measures appear costly, it can save your company from going through a nightmare that will be expensive and damage your reputation.

[1] https://www.verizonenterprise.com/verizon-insights-lab/dbir/

[2] https://en.wikipedia.org/wiki/Sony_Pictures_hack

[3] https://www.score.org/blog/cyberattacks-cost-small-businesses-more-money

The What, The How, and The Why of Managed Threat Detection

Cybercriminals are getting more fearless by the day and their crimes are getting more and more sophisticated. Cybercrimes are costing businesses and organizations billions of dollars each year. This has spawned a new generation of cybercrime fighters who search for ways to end this threat once and for all. With each new attack, the crimes get more sophisticated. Hackers are learning from their mistakes and tweaking their methods to make them even more effective.

Managed Threat Detection

While most attempts to end hacking seem futile, it is an industry that will continue to require experts in managed threat detection. Stopping thieves before they can get into your database is the preferred method and this has now become possible. The latest technology can assess your network’s weaknesses and your IT professional can recommend various ways to shut down those weak areas.

Why the rise in popularity of managed threat detection?

Investments in technologies that prevent cybercrimes are currently on the rise. There are now a number of solutions that prevent intrusion into your computers. But many companies feel they just don’t have the money to install the latest threat detection equipment. Though there is an initial expense involved, business owners with these new threat detection systems do enjoy greater peace of mind. One cyber-attack is now estimated to cost approximately $1.3 million on average. In addition, customer trust is eroded once the public learns of the breach and overall sales can go down. The expenses for a breach can often linger for years.

What is Managed Detection and Response?

MDR is a combination of technologies and skills that provide global threat intelligence, deep threat analytics, and earlier incident mitigation. The most effective response to a breach requires a collaborative, far-reaching effort.

Managed Detection and Response works well because it is set up to function every minute of every day. It provides more thorough protection from the viruses, worms, ransomware, and malware that exist on the World Wide Web.

MDR is commonly used together with traditional managed security services (MSS) to ensure complete protection. These services can be provided by specialized vendors who focus mainly on threat management. They can also be provided by specialists who have MDR capabilities. Managed detection is chiefly distinguished by the fact that it works even in circumstances where the traditional methods of protection, which are focused on limited log collection and rules-based analysis, do not work.

How is MDR delivered?

Today, businesses will find a few cybersecurity experts who understand the ever-changing landscape in the world of cybercrime. Thieves utilize a number of methods that evolve with each new attack. The only truly effective response to these attacks is to develop a system of crushing cyber-attacks that also evolves with each new event.

New technology focuses on a series of effective approaches to threat detection and elimination. The initial step is known as threat anticipation, which measures the level of a company’s preparedness. This determines how high a company’s chances are of being targeted by cyber thieves. MDR also includes threat hunting. Instead of waiting for an event to occur, this technology actively hunts for threats and eliminates them.

Third, security monitoring is essential. This service is basically exactly what it says. A system is put in place that constantly monitors all hardware, software, and networking equipment, looking for loopholes that thieves might exploit. Security monitoring should include alert response, incident response, and breach management.

Why is Managed Detection and Response popular?

For most business owners, there just isn’t time each day to worry about cyber breaches and data leaks. Though the costs to address them can be enormous, a business person needs to focus on running his company. Your business can suffer if you must constantly be pulled away to address potential security threats. That’s the major reason why business owners are opting for a greater level of protection for all their computers and networking equipment.

Threat detection and prevention is a full-time job and most business people just don’t have the time or skills to deal with it. Your company needs the finest protection available so you can get back to work without the stress of knowing that a breach could occur at any moment.

MDR service providers are able to collect data from various sources on the threats that your organization may face. This enables them to know exactly which threats are more pronounced. Once an organization knows where their weaknesses lie, they are in a better position to respond, repair those flaws, and move forward with more confidence.

Of course, a good managed detection and response program should also include all the measures to respond should a breach occur. In spite of all the advances in technology, if just one of your employees clicks on a malicious link, they could download ransomware or other harmful malware into your system. You can mitigate the damage though, by knowing exactly what to do.

Final Thoughts

Managed Detection and Response (MDR) is designed to handle anything that cyber-thieves can throw at you. It initially seeks to find and close any weaknesses, but it also includes a sound response plan should a breach occur. It utilizes today’s best detection tools, threat intelligence, forensic investigation tools, and human analysts. It can give business owners the peace of mind they need to get back to running their companies without the constant worry of an expensive data breach.

How Managed Networks Can Deliver Better Wi-Fi Service

It’s one thing for a business to have installed Wi-Fi networks, but it’s another thing to ensure that the equipment is and will continue to work properly. This means the network should be able to continue supporting the growing demands of a business. It should be able to upgrade automatically whenever necessary to provide the latest and most convenient improvements available. This may sound simple and manageable by the IT staff, but it can be challenging.

Managed Networks

Having in-house IT staff means that you have to get in line with other departments and wait your turn before you get help. They already have enough work each day so your Help Desk request may get pushed to the back. This is just one reason why it can be beneficial to have a trusted partner manage your Networks and computers.

The Right Fit

So many managed IT providers say that they’ll be there when you need them. How can you find the right fit for your business? It can be challenging in this day and time, simply because of all the many great choices. But, it can be helpful to sit down with your supervisors and talk to them about the ideal IT provider – someone who will take the time to listen to you, show concern about getting it right for you, someone who really will become a trusted partner.

A good IT partner will stay on top of daily maintenance for your hardware and software. They’ll keep the Wi-Fi equipment running smoothly. They will make recommendations about new products your company could benefit from. If you could find an IT service provider who stands by their promises, imagine how much easier your life would be. Your company would stop demanding so much of your time. You might actually get a vacation this year.

How to find your IT Managed Services Provider

Talk to other businesses owners in your area. Ask them to recommend someone. Check all names, credentials, and reputations online. You can find out quickly whether someone has a good strong reputation in the business world. Visit the company and meet some of their staff members. Do they seem capable, knowledgeable and skilled? If you walk in and find a young receptionist on the phone with her boyfriend and two of the techs in the back flirting, then get out of there quickly! That’s not the right place for you.

You’re serious about your business. You want it to succeed for yourself and especially for your family. So don’t settle for lame vendors that never show up and don’t do good work when they do meander by your place. Take as much time as you need finding a professional team of IT techs who know their jobs exceptionally well and love to come to work each day. These guys will know what’s going on when you get the Blue Screen of Death. They can fix it remotely in just a few minutes and you’re back to work.

Communicate your needs

When you find the right IT managed support team, sit them down at your office and make it clear that you want the very best they can give. You’re in this to win it and if they want to go along for the ride, they’re welcome. But they will have to pull their weight.

When you set down some guidelines right at the beginning of any relationship, you’ll find that the relationship is much more rewarding for both people. Of course, there will be contracts to sign that will state and include everything you talk about. A good contract is clear about what your responsibilities are and what the IT provider will provide. The cost should be included and can be a monthly charge or a fixed price you pay several times a year. Most vendors will work with you because they want your business.

Below, are just a few of the more important IT and networking services/products that your business needs:

  • Cloud storage and backup
  • Remote monitoring/management of servers, desktops, mobile devices
  • Business continuity plan in case of disaster
  • Cybersecurity for all computers and devices
  • Regular preventative maintenance
  • Scalability
  • 24/7 tech support

There are many other services you could opt for and you should discuss this with your IT professional.

The best managed wireless is all about handling many different services well. Every phone and computer should be secure even those of remote workers. Communications should be up and running 99 percent of the time. If you run a hospital or medical office, then you understand the importance of a good communication system. Most providers will suggest VoIP. It’s cloud-based and dependable, plus it can fit nicely in any budget.

With managed services, an organization should not have to worry about maintaining their Wi-Fi networks. Work with someone you have confidence in; someone who will exceed your expectations. You need a good, trusted IT service provider who is willing to get to know your business and work right alongside you to see it grow. Don’t settle for less than the best!

Two Canadian Banks Report Cyber Attacks Over the Weekend

Two of Canada’s largest banks have reported that cyber thieves may have stolen the financial information for over 90,000 of their customers. The thieves sent a message to the two banks over the weekend stating they had successfully stolen customer data and banking records for thousands of their customers. This caused an immediate reaction by both banks.

Canadian Banks Cyber Breach

The Simplii Financial Breach

One of the banks, Simplii Financial, a subsidiary of the Canadian Imperial Bank of Commerce (CIBC), issued a statement that read in part:

“Simplii Financial is advising clients that it has implemented additional online security measures in response to a claim received on Sunday, May 27, 2018, that fraudsters may have electronically accessed certain personal and account information for approximately 40,000 of Simplii’s clients.”

The financial institution began its investigation immediately upon learning of the breach. They sent letters out to customers informing them of the breach, stating they had implemented stronger fraud monitoring and detection, among other security measures.

In part of the statement that Simplii sent to their customers, they reassured them that Simplii would provide full reimbursements to anyone who had lost money due to this hack. They also stated that they were actively working with law enforcement and cybersecurity experts to contain the damages.

Simplii Financial said the breach had only affected a limited number of individuals. They believe that around 40,000 accounts were breached by cyber thieves. At this time, they are not certain of exactly what information was stolen and which accounts were affected.

The Bank of Montreal Breach

The Bank of Montreal (BMO) was also affected by the data breach and officials at BMO stated that they believed the financial and personal information for approximately 50,000 customers could have been compromised due to a cyber breach.

Both banks issued strong statements to their customers saying that they were on top of the situation and taking stringent measures to shut down the fraud and protect their other clients from cyber theft. They also reminded customers to change their passwords and PIN numbers. They recommend using complex passwords and stated that easy-to-guess PINs like 12345 should be avoided, as these are easy targets for cyber thieves. The banks also recommended that their customers watch their accounts for any signs of unusual activity and report that at once to banking officials.

The Breaches Originated Outside Canada

Simplii Financial and the Bank of Montreal both said they had been contacted by “fraudsters” who said they were in possession of personal and financial information belonging to their customers.

Authorities are not certain which hacking group is responsible for the attacks but they stated that they were fairly certain the attacks originated from outside of Canada.

A spokesman for BMO said, “They appear to be related,” referring to the two attacks and also that the hacker’s claims were as yet “unverified.” In an email statement, the spokesman also said, “We are working with the relevant authorities and are conducting a thorough investigation.”

BMO officials said they believe that the attacks and exposure to customer data had been shut down and that no further data leaks would occur. Both financial institutions sent letters to their customers reassuring them that every step would be taken to find and prosecute the fraudsters.

The Royal Canadian Mounted Police is working with all Canadian law enforcement agencies to help the two banks conduct their investigations. They do not believe that any other Canadian banks were affected.

FBI Issues Cyber Security Warning

Russian Hackers Target Routers in 50 Countries Worldwide

FBI Cyber Security Warning

In a day and time when everyone is being super careful not to click on suspicious links, there’s a new threat lurking. Just about every home and office has a router. It’s an inconspicuous piece of equipment that most of us rarely think about. And now, a new alert issued by the FBI says that Russian hackers have targeted routers in 50 countries around the world.

Just last week, the FBI issued a warning stating that a malware botnet known as VPNFilter was responsible for taking over millions of routers worldwide. The affected routers are thought to be primarily consumer-grade routers purchased at Best Buy and other retail and online electronic stores. The authorities also believe that routers provided by internet service providers such as Frontier Communications, Spectrum, and Charter have been affected. Commercial grade routers found in many businesses are also at risk.

Why the router?

Routers are rarely updated. Unlike the operating system on a smartphone or computer, most router manufacturers do not send out regular updates for their products. Last January, a complaint was filed against router manufacturer, D-Link. In the complaint, the FTC said that the manufacturer was leaving their users at risk by not installing adequate security measure. Their failure to do so had left many consumers open to attacks from hackers.

Experts are now saying that there’s no incentive for router manufacturers to release regular updates to their products that could stave off attacks. Up to now, these manufacturers have not been held liable and when there’s no liability, manufacturers will often take cost-saving shortcuts.

How hackers are getting in

Using malware to target the VPNFilter, cybercriminals are able to collect user data. Once the hacker has control of the router, they can use it to eaves drop on consumers. This weakness also allows hackers a doorway to all home computers, TVs, smartphones, or anything connected via the router.

The FBI recently discovered one website that hackers had set up to use in their attack. This website was designed to give instructions to the routers that had been taken over. Though shutting this site down did cut off one avenue of attack, the FBI warned that millions of routers were still infected. This leaves millions of consumers around the world vulnerable and most users will not even realize they’ve been hacked.

Who is responsible for the hacks?

The Justice Department said the hacking group referred to itself as “Sofacy” and that they answered to the Russian government. The hacking group also goes by the names Fancy Bear and APT28 and they have been involved in some very high-profile targets over the last few years. This group was blamed for the hacks carried out during the 2016 presidential campaign that targeted the Democratic National Convention.

Cisco Systems Inc. performed its own investigation and found that the targeted routers include Netgear, Belkin’s Linksys, QNAP, Mikro Tik, and TP-Link. There may be others involved as well and most were purchased by consumers at local electronic stores and online. Cisco shared the results of their investigation with the Ukrainian government and the U.S. The FBI said that they believe some of the affected routers were also provided by internet service companies.

What routers have been infected?

Authorities have put together a list of the known affected routers, but recommend that everyone take the precaution of rebooting the router and changing the password as soon as possible. The known affected routers include:

  • Linksys (Models E1200, E2500 & WRVS4400N)
  • Netgear (Models DGN2200, R6400, R7000, R8000, WNR1000 & WNR2000)
  • Mikrotik Cloud Core Routers (versions 1016, 1036 & 1072)
  • TP-Link R600VPN
  • QNAP NAS devices running QTS software
  • QNAP (Models TS251 & TS439 Pro)

New types of warfare between Russia and the Ukraine

Russia has long been involved in attacks against the Ukraine and Ukrainian companies due to ongoing hostilities between the two countries. In the past, these attacks have cost millions of dollars and exposed the personal, confidential information of both businesses and individuals. At least one attack was responsible for an electricity blackout in the Ukraine.

The Ukrainian government recently stated that the Russian government was planning a cyber-attack against some privately held companies, along with Ukrainian state bodies. They believe these attacks were meant to disrupt the Champions League soccer finals which were being held in Kyiv.

What to do next

Experts are recommending that everyone using a router shut it down and reboot it. They also recommend disabling remote manager settings. If at all possible, upgrade the router to the latest firmware and change your password.

Managed IT providers are recommending many commercial grade firewalls and routers for business owners who have quite a bit more to lose than the average consumer. They have stated that commercial grade firewalls and routers offer powerful firewall technologies and some offer wireless access point that offers stronger protection for the home or office.

Consumer-grade routers used by the average individual are most at risk. Businesses who have remote employees working from home often forget that these workers present a weak area that hackers can take advantage of. Most individuals have never upgraded their router’s firmware or changed the original password that came with the router. IT experts believe that hackers will eventually exploit all weaknesses like this.

An ongoing risk

The FBI warned, “The size and scope of the infrastructure by VPNFilter malware is significant.”

Their experts said that hackers could render the routers affected completely inoperable if they wanted to, but that wasn’t their primary goal. Instead, they were planning to steal data off the computers, phones, and other connected devices by taking over the routers that controlled internet access. The FBI stated that the malware would be very hard to detect even by professionals because of encryption and other tactics used by the hacking group.

In addition to rebooting routers and changing passwords experts recommend contacting your internet service provider for possible firmware updates or other guidance.

FBI Issues Warning

As you may be aware, the FBI issued a warning last week about a malware botnet called VPNFilter. This malware originated in Russia and attacks “consumer-grade” routers typically purchased from retailers such as Best Buy and\or installed in homes by Internet Service Providers such as Spectrum, Time Warner, and Charter.

VPNFilter

The malware has not been found to infect commercial grade routers typically installed in your business, such as those from Cisco, Fortinet, SonicWALL or others. If you or any of your staff has one of the following routers installed at home, we recommend the Internet Service Provider be contacted for guidance.

At a minimum, the router should be rebooted – and the router password should be changed to one with a fair amount of complexity. (ISP technicians have a reputation for often not changing the simple “factory default” password when they install a router.) In some cases, a router firmware upgrade may be required.

The affected routers identified so far are:

  • Linksys (Models E1200, E2500 & WRVS4400N)
  • Mikrotik Cloud Core Routers (versions 1016, 1036 & 1072)
  • Netgear (Models DGN2200, R6400, R7000, R8000, WNR1000 & WNR2000)
  • QNAP (Models TS251 & TS439 Pro)
  • QNAP NAS devices running QTS software
  • TP-Link R600VPN

While we are unable to manage the consumer-grade routers targeted in this attack, We can offer you a powerful network security appliance (router/firewall/wireless access point) that can provide commercial-grade protection at your home or office.

If you have teleworkers or executives who access your network by working from home, you should be concerned about business risks created by consumer-grade routers. A relatively inexpensive corporate or business-grade firewall is likely an appropriate solution. Please let us know if you would like more information.

Russian Hackers Target Routers in 50 Countries

In a day and time when everyone is being super careful not to click on suspicious links, there’s a new threat lurking. Just about every home and office have a router. It’s an inconspicuous piece of equipment that most of us rarely think about. And now, a new alert issued by the FBI says that Russian hackers have targeted routers in 50 countries around the world.

Home Routers

Why the router?

Routers are rarely updated. Unlike the operating system on a smartphone or computer, most router manufacturers do not send out regular updates for their products. Last January, a complaint was filed against router manufacturer, D-Link. In the complaint, the FTC said that the manufacturer was leaving their users at risk by not installing adequate security measure. Their failure to do so had left many consumers open to attacks from hackers.

Experts are now saying that there’s no incentive for router manufacturers to release regular updates to their products that could stave off attacks. Up to now, these manufacturers have not been held liable and when there’s no liability, manufacturers will often take cost-saving shortcuts.

How hackers are getting in

Using malware to target the VPN filter, cybercriminals are able to collect user data. Once the hacker has control of the router, they can use it to eavesdrop on consumers. This weakness also allows hackers a doorway to all home computers, TVs or anything connected via the router.

The FBI recently discovered one website that hackers had set up to use in their attack. This website was designed to give instructions to the routers that had been taken over. Though shutting this site down did cut off one avenue of attack, the FBI warned that millions of routers were still infected. This leaves millions of consumers around the world vulnerable and most users will not even realize they’ve been hacked.

Who is responsible for the hacks?

The Justice Department said the hacking group referred to itself as “Sofacy” and that they answered to the Russian government. The hacking group also goes by the names Fancy Bear and APT28 and they have been involved in some very high-profile targets over the last few years. This group was blamed for the hacks carried out during the 2016 presidential campaign that targeted the Democratic National Convention.

Cisco Systems Inc. performed its own investigation and found that the targeted routers include Netgear, Belkin’s Linksys, QNAP, Mikro Tik, and TP-Link. There may be others involved as well and most were purchased by consumers at local electronic stores and online. Cisco shared the results of their investigation with the Ukrainian government and the U.S. The FBI said that they believe some of the affected routers were also provided by internet service companies.

New types of warfare between Russia and Ukraine

Russia has long been involved in attacks against Ukrainian companies due to ongoing hostilities between the two countries. In the past, these attacks have cost millions of dollars and exposed the personal, confidential information of both businesses and individuals. At least one attack was responsible for an electricity blackout in Ukraine.

The Ukrainian government recently stated that the Russian government was planning a cyber-attack against some privately held companies, along with Ukrainian state bodies. They believe these attacks were meant to disrupt the Champions League soccer finals which were being held in Kyiv.

What to do next

Experts are recommending that everyone using a router shut it down and reboot it. They also recommend disabling remote manager settings. If at all possible, upgrade the router to the latest firmware and change your password.

The FBI warned, “The size and scope of the infrastructure by VPNFilter malware is significant.”

Their experts said that hackers could render the routers affected completely inoperable if they wanted to, but that wasn’t their primary goal. Instead, they were planning to steal data off the computers, phones, and other connected devices by taking over the routers that controlled internet access. The FBI stated that the malware would be very hard to detect even by professionals because of encryption and other tactics used by the hacking group.

ATTACK GROUPS TARGET HEALTHCARE

Cyberattacks have become some of the most common criminal activities of this century. That technology has been advanced to impact all sectors of industries. Every country in the world has been affected by cyberattacks. While security experts are constantly working, trying to find a solution to this problem, cyber criminals are finding new ways to make their attacks more effective.

Healthcare Security

Cyberattacks now include malware, ransomware, viruses, and worms. It’s difficult to surf the web now without encountering some type of phishing scheme. These attacks have had grave effects on large and small companies. First of all, they can lead to data loss or the exposure of confidential information. In many cases, the personal information of millions of consumers is exposed. Those affected may threaten to sue to say that the business did take every precaution to protect their personal information. Cyberattacks can also lead to loss of profits for an organization, not to mention the money and time spent trying to notify those who were affected.

Orangeworm

This is a malware that was created in 2015 which basically uses Trojan Kwampirs to ease access. In the past three years, it has been associated with attacks on hospitals. It is believed that manufacturing companies are also at risk of attacks by Orangeworm. This group is believed to be strategic, deliberate, and methodic in the manner they choose their victims. When the Orangeworm attacks, it creates a custom backdoor known as Trojan.Kwampirs. It targets the healthcare sector and related industries in the United States, Europe, and Asia.

The first Orangeworm attacks began in January 2015. From the beginning, it was clear that Orangeworm was very focused in choosing its targets. The cyber thieves who created this spent time and money researching in order to choose their victims wisely. Their attacks were specific and focused on healthcare due to its vulnerabilities.

Why health care?

It is believed that healthcare is a soft spot for cyber criminals. Firstly, most of the organizations dealing with healthcare continue to rely on old equipment. It’s not possible to install up-to-date security on older medical devices. The healthcare industry has been slow to adopt new security technology. They often cite the cost as a reason why they cannot use the most modern cyber security technology.

Secondly, cyber criminals are attracted to healthcare records because they enable medical identity fraud. Criminals find this rather lucrative. In fact, the information stolen from healthcare records is usually sold on the black market for more than ten times its price.

How Orangeworm works

Symantec explains that attacks by Orangeworm are in most instances very easy to identify because they operate with a noisy attack vector. The Orangeworm first gains access to the victim’s network. It then employs Trojan Kwampirs which is basically a backdoor Trojan. This allows them to gain access to the compromised computer remotely.

Once executed, it extracts a copy of its core DLL payload from the resource section. Next, it inserts a randomly produced string into the middle. This is aimed at ensuring that the Trojan escapes detection. The malware then creates a service simulating the configuration. This ensures that the payload is kept and retained in memory even after a reboot.

To detect whether the compromised system is used by a researcher or a high-profile individual, the Trojan collects some basic information including language settings. After determining the value of the information obtained, the Trojan will decide whether to infect other computers.

Discovery concerns

Despite being so conspicuous, Orangeworm has the ability to aggressively propagate itself once it gains access to the computer. It will then copy itself to other networks over network shares, hence Orangeworm can infect multiple computers at one time. Older versions of operating systems, such as Windows XP (still in use in some hospitals) are particularly vulnerable to this form of attacks.

Orangeworm seems to lack interest in changing its attack procedures though considered old. This could be associated with the fact that despite the age of Trojan Kwampirs and the aggressiveness with which it has been fought, not much success has been achieved. Orangeworm can still, therefore, reach its intended victim and create chaos.

Protection against this malware

Having established that this aggressive malware can have rather serious consequences on the victims, it is important to begin a very proactive program in your organization that protects your computers and network. IT professionals recommend that hospitals and other healthcare organizations replace their old computers, programs, and operating systems with new ones. This will not only make it harder for the malware to attack but will make it easier to detect it. WebFilter enabled products and Intelligence Services can be of use in protecting against Orangeworm.

Final Thoughts

Due to the importance and the confidential nature of the information contained in healthcare records, it is a necessity for healthcare providers to take all measures needed to protect this information from malware. There are established ways of protecting systems especially from Orangeworm, but it does require the assistance of an IT professional with extensive experience in this area.