Threat of Ransomware Grows
Ransomware has been around for a long time, but the new and improved ransomware attacks are more sophisticated and more far-reaching than ever before. These types of attacks do not only have crippling effects on financial institutions, but they can now impact any consumer’s daily life. Each year experts try to predict cybersecurity trends, and gently sound the alarm to businesses and organizations. But now the sirens are blaring because they are seeing some of their worst fears come true as ransomware has become the method of choice for hackers with the capacity to literally stop all of us in our tracks.
Ransomware is a type of malware that infects a user’s computer by encrypting all the data on the computer, making it impossible for the user to access. In order for the information to be decrypted the hacker demands a ransom, usually monetary, by way of bitcoin since it is harder to trace who the receiver of the funds are. In the beginning of 2016, hackers made over 209 million dollars within the first three months of the year. Today, according to Cybersecurity Ventures, one of the world’s leading researcher for cybersecurity facts, figures, and statistics, it is predicted that ransomware attacks will cost 6 trillion dollars worldwide in 2021, and by 2025 that number will grow to 10.5 trillion dollars. These numbers are devastating, especially when a recent survey done by Sophos, a worldwide leader in next-generation cybersecurity, found that only 8% of organizations managed to get back all of their data after paying a ransom, with 29% getting back no more than half of their data.
In that same study, they found that ransomware attacks fell from 51% to 37% in 2020. Good news, but also troubling. What that number indicates is a different strategy is being deployed by cybercriminals. They have become emboldened by the ease of deploying a ransomware attack on victims. These types of malware are not complex, are very inexpensive, and are deployed via phishing attacks most of the time. They have now narrowed their attacks to a more targeted assault that cripples entire sectors, states and even countries, simultaneously. What we all recently witnessed with the Colonial Pipeline attack is the power of bad actors to move beyond trying to just gain money, but the power to disrupt a country’s economy and cause chaos in the lives of citizens. Cybercriminals having the ability to infiltrate not only the financial sector but also power grids, schools and hospitals, is extremely alarming since these institutions are the very foundation of our society.
The techniques for ransomware have increasingly become more aggressive and by upping the ante, attackers believe they are more inclined to get what they want. For example, hackers are now demanding ransom but also adding conditions to their request; for example, if the requested ransom is not received in a timely manner, they will permanently delete files every hour they have to wait for the funds. But now instead of just files, they are able to stop the production of crucial resources that are required for businesses and its customers. This provides a sense of urgency and making a victim more reluctant to contact officials right away since time is of the essence. Deleting crucial data could be devastating to a company financially, but more so can result in loss of life if such attacks are geared towards hospitals or other entities that provide public health to communities. Another threat would be to expose sensitive data to the public such as credit card information, social security numbers or trade secrets of an organization. This, too, will also have a negative impact on a company setting them up for lawsuits, loss of business and loss of trust from consumers.
The creators of ransomwares invest lots of money to fight against antivirus and antimalware protection that so many depend on. These cybercriminals want to be able to fly below the radar and produce a resistant code that will not be detected by malware protection software. They also continue to invest in ways to create encryptions that will be impossible to be decrypted. They also have no interest in playing fair. As mentioned before, what we have seen is despite paying the ransom, many companies never receive all their data back or recoup all their funds paid out.
All organizations should have a plan in place to deal with such attacks:
- A layered protection approach should be deployed on networks.
- All data should be backed up using different medias and have an offline option.
- Organizations should continue to train employees about the pitfalls of opening sketchy emails and links.
- And always consult with law enforcement before paying any ransom to a cybercriminal. Paying a ransom never guarantees a release of data.
Just because all attacks don’t make headline news does not mean it is not happening daily. This year it is predicted there will be a ransomware attack on businesses every 11 seconds. That is up from 2016 which was approximately every 40 seconds. Ransomware is no longer an anomaly; it is part of all of our lives.
|
|
|
|
Microsoft Confirms Windows 10X is Dead
|
The dream of a lightweight Windows is over, for now
Microsoft is confirming that it no longer plans to release Windows 10X. The operating system was originally supposed to arrive alongside new dual-screen devices like the Surface Neo, with a more lightweight and simplified interface and features. This was all before the pandemic hit, and Microsoft then decided to prioritize Windows 10X for single-screen laptops instead. Windows 10X is now officially over, and Microsoft is now planning to bring its best bits into Windows 10.
Some of that has already started appearing in the form of a new app container technology, better voice typing, and a modernized touch keyboard for Windows 10. Microsoft says it will now “continue to invest in areas where the 10X technology” makes sense for both software and hardware in the future. It’s unlikely that we’ll ever see the Surface Neo device now, though.
Windows 10X was going to appear in 2021 as more of a Chrome OS competitor, and Microsoft had spent years trying to modernize Windows in an attempt to bring a more lightweight version to market. Windows RT first released alongside the original Surface tablet in 2012, and then Windows 10 S arrived in 2017. Both failed to simplify Windows, but Windows 10X had some promising features that will now start to appear in Windows 10 instead.
While Microsoft released a smaller Windows 10 update in May, a larger one is planned for October. This next major update includes some big visual changes in the form of new system icons, File Explorer improvements, and the end of Windows 95-era icons. Microsoft is also focusing on some key features and additions like fixing the rearranging apps issue on multiple monitors, adding the Xbox Auto HDR feature, and also improving Bluetooth audio support.
|
|
|
|
Privacy - Protecting Your Digital Footprint
What is Privacy?
There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today's digital world, you would be astounded at all the different entities that not only collect information about you, but who then legally share or sell that information. Each time you browse or purchase something online; stream a video; buy groceries; search the web; visit your doctor; or use an app on your smartphone, smart TV, or other home devices, information about you is being collected. This information can be used to sell you goods or services, decide your interest rates for loans, or determine the type of medical care you get or the jobs you are eligible for. Additionally, if this information falls into the wrong hands, it can be used by cyber attackers to target and attack you.
The goal of maintaining personal privacy is managing your digital footprint, i.e. - attempting to protect and limit what information is collected about you. Be aware that in today's digital world, it is almost impossible to eliminate your digital footprint or stop every organization from collecting information on you; we can only reduce it.
Steps You Can Take to Help Protect Your Privacy
There is no single step you can take to address all of your privacy concerns. Instead, you will need to take a variety of steps, with each step helping in a small way. The more steps you take, the more you can help protect your privacy.
- Limit what you post and share with others online, such as on public forums or on social media. This includes being careful of what pictures or selfies you share. Even on private forums or when you enable strong privacy options, assume whatever you post will become public at some point.
- When creating online accounts, review what information the sites collect about you by checking their Privacy Policy and provide only what you absolutely need to. If you have concerns about what they collect, then don’t use the site.
- Be aware that regardless of what privacy options you set, information about you is being collected, especially on free services, such as Facebook or WhatsApp. These services base their business model on collecting data on what you do and who you interact with. If you are truly concerned about your privacy, don’t use such free sites.
- Review mobile apps before downloading and installing them. Do they come from a trusted vendor? Have they been available for a long time? Do they have lots of positive comments? Check the permissions requirements. Does the mobile app really need to know your location or have access to your contacts? If you don’t feel comfortable, then choose a different app. Look for apps that promote privacy and give you privacy options. While you may have to pay more for an app that respects your privacy, it may be worth it.
- Consider using a Virtual Private Network (VPN) for your internet connections, especially when you’re using a public network, like free WiFi.
-
When using a browser, set the privacy options to private or incognito to limit what information is shared, how cookies are used and stored, and protect your browsing history. Consider privacy extensions like Privacy Badger or privacy-focused browsers.
-
Consider using anonymous search engines designed for privacy, such as DuckDuckGo or StartPage.
In many ways, privacy is something very hard for you to protect, as so much of your privacy depends on the privacy laws and requirements of the country you live in and the ethics of the companies you deal with. Although you can never truly protect all of your privacy in this technological age we live in, these steps will help limit the amount of information collected about you.
|
|
|
|
2021 Company Holidays
Monday, July 5, 2021 - Independence Day
Monday, September 6, 2021 - Labor Day
Monday, October 11, 2021 - Columbus Day
Thursday, November 11, 2021 - Veterans Day
Thursday, November 25, 2021 - Thanksgiving Day
Friday, December 24, 2021 - Christmas Eve Day (AaSys will close at 12:00 PM)
Saturday, December 25, 2021 - Christmas Day
Saturday, January 1, 2022 - New Year's Day
|
|
AaSys Group, Inc.
11301 North US Highway 301
Suite 106
Thonotosassa, FL 33592
(813) 246-4757 Phone
(813) 246-4576 Fax
|
|
|
|
|
|
|