Date:

Author

Category: IT Security, IT Support.

Not a week goes by without me receiving an email from a well meaning colleague, friend or relative warning me about a paricular nasty spam email or virus.

The scenario is usually the same, they have received this from one of their friends, colleagues, etc with a note to say that they should look out for a particular email and that they shouldn’t open the attachment if they get it. I don’t think that spam email has ever subsequently arrived in my Inbox!

The problem is that these emails are themselves spam and generally designed to clog up the internet with rubbish. If each person receives such an email and sends it to just 10 friends and those 10 friends do the same, after just 10 forwards that generates 1000,000,000 (one thousand million) emails.

The advice that each of these emails offer is standard advice that should apply all the time you are using email.

Read more »

Date:

Author

Category: IT News, IT Security.

It’s been an interesting week with no less than three calls about the dreaded “Internet Security 2010” virus. This seems to be a new strain of something that was around early in 2009 (maybe they write them over the Christmas break when you and I are have our turkey and pies !).

Symptoms
Internet Security 2010 will try to trick you into believing that your computer has serious security problems so that you buy the program. The Internet Security 2010 virus will start and perform a fake scan of your computer. The scan report will list a number of infections and when you try to remove them, you’ll “conveniently” find out that you need to buy Internet Security first. Do not buy Internet Security 2010.

If it got on your computer it will look something the image below.

Virus on your PC. Screenshot

 

Damage Done
The good news (if you can call it that) is that the virus does not actually seem to damage your data so once removed your computer will function as normal.

How to remove
Whilst we would never pretend that you can’t remove this virus yourself, it is worth stating that it is not a job for someone who is uncomfortable with editing the Windows Registry and generally dealing with low level utility programs. For that reason we do suggest that you get an expert to remove it for you.

Date:

Author

Category: Home Computing, IT Security, IT Support.

Criminals are now getting data from your computer via the phone! Is this some new secret device that the criminals have invented? No, they’ve just found a new way to scam people without technology.

The PC Support Group has received a number of calls recently from irate people who had money fraudulently taken from their accounts. Why did they ring us? Well one such scam company used our support number on their web site so victims unsurprisingly decided to call it. It was quite a shock but I’m pleased to report that we helped as much as possible and have now had the number removed. We have also reported the incidents to the police and trading standards but for now the scam continues and is a real concern.

It would appear that all the individuals had received unsolicited “cold” calls from someone claiming to be their Internet Service Provider (ISP). The caller seemed to have just enough information to make the recipient believe the call was genuine. They then offered “essential” IT support services and somehow gained access to their financial information. Within days they found money had been withdrawn from their bank accounts without their agreement.

Which? magazine also reported in December 2009 that consumers across the country had been called by scammers pretending to be from the computer software giant Microsoft or an internet service provider.

Read more »

Blackberry iPhone

Date:

Author

Category: Business, IT Security, Podcasts.

In recent years mobile computing has become one of the fastest moving areas of technology. So fast, in fact, it is sometimes difficult for businesses to know which options to take and how best to reap the benefits.

The rise of the iPhone as a serious business contender is one area of great debate. Blackberry Bold or iPhone 3G, that is the question.

The iPhone is undoubtedly the sexier device with a simple touch-screen interface and thousands of “cool” applications. The general opinion appears to be that the iPhone wins on the following features: range of applications, browsing, calendar, watching videos and listening to music while the Blackberry wins out on keyboard usage, battery life, and email. It is, however, fair to say that both do everything very well.

For business usage the BlackBerry is the hands-down winner for a perfect desktop extension. When setup with the Blackberry Enterprise Server (BES), pretty much whatever you can do from Outlook on your Exchange server, you can do from your BlackBerry. Also, BES offers a simple way of managing, controlling, and deploying mobile devices throughout an organisation although this only becomes relevant if you have more than about 20 mobile users. RIM’s focus on security also make the BlackBerry the obvious choice for a corporate environment.

Our advice would be that right now if you are a serious business user (i.e. email and security are important to you) or you are in a business with more than 20 mobile users then Blackberry is still the best choice. If you want a more general device then iPhone is the obvious choice. Next month we might think differently though!

Date:

Author

Category: IT Purchasing, IT Security.

Trading standards officers have reported that an increasing number of UK consumers are being tricked into buying fake goods by companies pretending to be UK based.

Unfortunately many people think that to have a .co.uk web address you have to be a UK based company but it’s estimated that nearly half a million sites with a .co.uk address are operated from overseas.

Trading standards officer believe the “co.uk” suffix is lulling consumers into a false sense of security. In fact it offers no protection whatsoever, and certainly doesn’t mean the site is operated by a UK company.

You can reduce the risks when selecting companies on line by:

  • Searching for any user reviews of the site;
  • Double clicking on the padlock symbol in the corner to reveal details about the company that registered the site; and
  • Trying to connect the site to the real world by finding phone numbers or UK addresses.
  • Call the telephone number (if there is one) and see who you get to speak – ask a few questions about where they are based

Nominet who is responsible for giving out domain names in the UK has no plans to change the rules for gaining UK web addresses. Basicaly anyone prepared to give their name and address, and pay £5, can buy a co.uk domain name for a two-year period.

So when shopping or choosing any service on line, do your homework and stay safe.

Date:

Author

Category: IT Security.

The PC Support Group has discovered a potentially serious problem with version 8.5.322 of the AVG Anti-virus software. It may partially uninstall itself leaving the computer exposed to potential viruses.

Although reported in some other parts of the world it would appear that The PC Support Group was the first company to discover and report the problem in the UK.

Users are typically noticing the problem when they open MS Outlook and get a message relating to the ‘AVG Exchange add in’ being removed or unavailable although they can check by seeing if the AVG icon is still visible (usually on the bottom right of the screen).

The PC Support Group has worked with AVG to understand the problem and ensure its customers are updated with version 8.5.323 which overcomes this issue.

We take the security of our customer’s systems very seriously and it’s one of the reasons that we recommend AVG as over the last few years it has regularly come out as one of the top rated anti-virus packages available. We were therefore very surprised to discover this problem.

AVG responded quickly and a fixed version is already available. Within hours of the discovery we had upgraded most of our customers and the remainder will be completed very shortly.

Business users not supported by The PC Support Group should go to AVG web site, click on Support, choose the Downloads tab and then select the appropriate version to download and run. Then select the ‘Repair’ option and follow the prompts.

If you’re in any doubt then contact your IT support provider who should be able to advise you.

Date:

Author

Category: IT Security.

In this ever increasingly cost concious environment it’s worth remembering that one area that small businesses must not neglect is IT security.

Updating anti-virus software, using encrypted technology and protecting confidential information are all vital as criminals and fraudsters look to take advantage of economic confusion and anxiety to target businesses and home users.

Recent research from the Department for Business, Enterprise and Regulatory Reform shows that the average cost of a severe breach of security for small businesses is between £10,000 and £20,000. If news of such breaches leaks out, the damage to the reputation of the business could cost much more.

The PC Support Group has also noticed an increasing trend for potential customers to check whether a firm has suitable technology and policies in place to protect against possible data loss, so taking responsible security measures could also help you win business!

Date:

Author

Category: IT Security.

With the economy shrinking rapidly most small businesses are looking to make savings and at least retain the business they have.

Unfortunately we all know where major savings can be made – reducing labour costs through redundancy. This is never easy for a business and it’s even harder on those on the receiving end of a P45.

One consequence of this of which all businesses need to be aware is that disgruntled employees may use security holes to take revenge. With more businesses having to take these drastic actions, Microsoft has recently warned that such malicious attacks are likely to increase.

A study last year by Verizon in the US found that insider breaches accounted for 18% of attacks.

Small businesses in particular are renowned for their “easy going” approach to security with many businesses using the same user name and password for all employees or extremely simple passwords such as the user’s surname. Whilst the staff are happily employed and focused on their work this seems a non-issue but if they feel badly treated then such basic security can often give them the freedom to inflict a huge amount of damage.

While insider attacks are lower in number, they can be more devastating because employees know where “the juicy stuff” is kept – unlike hackers who have to search for a company’s valuable assets.

These problems are easily prevented but most companies simply don’t see this insider threat. Our advice is to make sure you take your security seriously. Use secure passwords (ideally a mixture of upper and lower case characters and numbers – at least 8 characters long), limit access to the systems that employees need, immediately remove such access as soon as an employee is made redundant or sacked, and make sure your internet connection is secure.