Categories
Casserly Consulting Blog

Artificial Intelligence Can Be Useful To Hackers, Too

ai_head_circut400.jpg

Man matching wits with computer isn’t new territory. In 1830, a locomotive raced a horse to see which was superior in terms of speed and distance. 1956 saw the first time a human played chess against a computer. Today, the time has come when an artificial intelligence has begun to break into a new territory that was dominated by humans for thousands of years: crime.

At a recent technology expo, a human hacker and a sophisticated computer that is capable of machine learning each attempted to spear-phish as many victims as possible through Twitter. For two hours, both entities refined their message in an effort to be more effective against the target. At approximately 1.075 tweets per minute, the human was able to make 129 tweets, 49 of which were successful. The computer was able to make 810 tweets in two hours, which is about 6.75 tweets per minute. In that time, 275 victims were converted.

Even though humans had a higher attempt-to-victim percentage, the machine was able to get 5 times as many victims in the same amount of time.

In a Cylance poll held during ConFab, attendees were asked if criminal hackers will use AI for offensive purposes in the coming year, to which 62 percent answered in the affirmative. Even though no one could cite any specific incidents, the overwhelming consensus among experts is that hackers have already begun using AI. Like all high-tech crimes, AI is a global issue that changes fast and often, making it extremely difficult for law enforcement to find and prosecute perpetrators. Even when they’re able to identify offenders, they often run into issues where the laws and statutes are well behind the technology in question.

Another reason that identifying and combatting AI is so difficult is because there are constant debates among experts around the globe on what exactly constitutes as AI. Think about it like this: millions of people consult virtual assistants, like Siri and Alexa, every day. However, if you ask the majority of them if they were using artificial intelligence, they’d say ‘No.’ In reality, they are both examples of AI being put to use to enhance the lives of its users.

There are a lot of potential uses for AI by cyber criminals. For example, hackers could use machine learning capabilities to write programs that personalize emails with malware attachments. As that technology is developed, there will likely be a time when distinguishing actual email and phishing attacks is nearly impossible. Another probable use of machine learning and AI for hacking is drastically reducing the time and resources it takes to find and exploit vulnerabilities in software though automation.

For a small business, AI might not be not something that you need to concern yourself with – and perhaps it isn’t, at the moment. However, AI is already being incorporated into many aspects of business with great success and many experts feel it will be very important in the near future. What do you think? Would you be willing to give AI a try? Let us know in the comments!

Categories
Casserly Consulting Blog

Tip of the Week: Android Oreo Is Double-Stuffed With Features

oreo_phone400.jpg

Earlier this year, Android released Oreo, version 8.0 of their popular mobile device operating system. Whether you’ve already updated to the latest version of this OS or are still waiting for your update, it has several new or improved features that you’ll want to consider using. Let’s look at five of our (many) favorite additions to the OS.

Autofill Passwords for Apps – Considering the widespread popularity of using an application over accessing programs within your browser, Google has decided to bring autofill beyond its use in the Chrome browser. The ability to autofill and store passwords for applications are a feature that many people will welcome.

Picture in Picture – Have you ever been in a video conference on your mobile device at the same time you needed to access an email or other information from an application? With Android Oreo, you can continue a video call or view a clip started in Chrome using the picture-in-picture mode by just tapping the home button when the video is playing.

New Emojis – Even though the use of emojis in business correspondence is marginal, they’re still one of the features that users are looking forward to with the Android Oreo release. Luckily, many mobile devices are used for both professional and personal communications, which means that you’ll have plenty of opportunity to use these fun additions to your library of emojis.

Smart Text Select – Anyone who regularly uses a computer likely considers the Select Text, Copy, and Paste functions to be very handy tools. To improve functionality, Oreo has introduced a Smart Text Select feature that is much easier to use than trying to drag and highlight text manually on your smartphone.

Snooze Notifications – Especially when you use a mobile device that for both work and personal uses, you’re probably going to receive notifications that you might not want to deal with immediately – but would like to check out a bit later when you get a chance. With Android Oreo, you can snooze notifications. Simply swipe to the right on the notification until a clock icon pops up. From there, select the amount of time you want to delay the notification by and go back about your regularly scheduled activity.

How do you feel about Android’s latest release? Have you found any other useful features? Or perhaps you still prefer to use iOS, regardless of how many new features Android adds? Sound off in the comments! We’d love to hear your opinion!

Categories
Casserly Consulting Blog

3 Ways Your Business Can Prioritize Data Security

data_security_switch400.jpg

In the wake of the Equifax data breach, which placed the personal information of 143 million users at risk, the issue of data security is at the forefront of social consciousness. Your organization needs to go about its daily business as if it will experience a data breach at any given moment. This involves looking at the worst-case scenario, and planning for it so that you’re never caught unaware.

Here are three preventative measures that you can take to secure your business.

Use Strong Passwords and Two-Factor Authentication
Passwords are often the only thing standing between your online accounts and your personal data. Think about it; a string of maybe 8-to-10 characters is the only thing keeping your sensitive information secure. Doesn’t it make sense to make this password as complex and difficult to crack as possible? You would think so, but a surprising number of folks still use the word “password” as their password. You should be using both upper and lower-case letters, numbers, and symbols, formed into a seemingly random string of characters. Doing so keeps hackers from guessing your password and accessing an account.

Secure Your Network with Unified Threat Management
Network security depends on both internal and external measures, which include network-attached security devices like a Unified Threat Management (UTM) tool. A UTM consists of an enterprise-level firewall, antivirus, spam blocker, and content filter, all to keep threats from taking root on your network in the first place. Furthermore, you’ll be able to react to issues that become prevalent before too much damage is done, which is a valuable opportunity in its own right.

Educate Your Users on Best Practices
Your employees access important information on a day-to-day basis, and they are often in contact with more threats than you’d like them to be. Something as simple as a spam message in the wrong inbox or a carefully disguised link could be all it takes to expose your business to dangerous situations. Take the time to teach your employees how to identify potentially dangerous scenarios, like phishing phone calls and sketchy emails or attachments. Often times, you’ll stop attacks from taking off simply by keeping your employees informed.

By using these three methods to secure your organization, you’ll be less likely to suffer from a data breach. To learn more about network security and other ways to keep yourself secure, subscribe to our blog, and call our IT professionals at PHONENUMBER.

Categories
Casserly Consulting Blog

Without A Data Backup, You Aren’t Ready

sledge_hammer400.jpg

Most modern companies rely on computers to at least some extent, particularly if there is some sort of delegation of services involved. Whether it’s an office filled with computers and server units, or simply a retailer with point-of-sale equipment, the companies of today need computers and data in order to function as intended. To protect this data, you need a method to preserve it–which is where data backup comes into play.

Your business’s data is susceptible to all sorts of danger stemming from malware, hackers, hardware failure, and even user error. It doesn’t take much to expose your data to something that could cause it harm, so it makes sense that you should have a plan put into place to protect it. Most small businesses that fail to recover from a disaster within 18 months following a data loss incident will be forced to cease operations, which showcases the importance of data backup. What’s the best way to combat data loss?

A Backup and Disaster Recovery, or BDR, is a great way to protect your network and data infrastructure. It’s a network-attached backup system that allows you to take a preventative stance against even the worst disasters. Since the device is attached to your network, it can perform backups at various increments automatically. All you have to do is set which parts of your infrastructure you want it to back up. Furthermore, you can set it up so that backups only occur on files that have been changed since the last one has been taken, allowing for a more lightweight solution.

The most important part of BDR is that your data is automatically uploaded to the cloud. The best part of this is that it’s safe and secure, tucked away from anything that could cause it harm. While your data is hosted in an off-site data center or the cloud, it’s protected and prepared for the worst, allowing your organization to ensure survival even under the most desperate situations. It’s just one way that preventative thinking can help your organization avoid downtime and the immense costs it can accrue.

To keep your organization from suffering due to data loss, a BDR solution is your best bet. To learn more, reach out to COMPANYNAME at PHONENUMBER.

Categories
Casserly Consulting Blog

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

travel_computer400.jpg

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

Know Your Wi-Fi Options
You can’t be productive without an Internet connection. This includes either mobile data or Wi-Fi. Chances are you’d rather look for an open wireless network than waste your mobile data, but unsecured networks can put your data at risk. One option you have is to check the reviews on sites like Yelp! and Trip Advisor to see what other guests have to say about Wi-Fi connections. Ideally, you want a VPN to secure your data while it’s in transit.

Bring Along Extra Accessories
You never know when that extra LAN cable or micro-USB cord will come in handy. Furthermore, if you’ve ever done any traveling, you’ll know that buying new equipment from an airport can be more expensive than you’d like.

Carry On Your Devices
If you need to travel for business, be sure to put your devices into your carry-on baggage at any airport. The last thing you need is for a screen to get cracked while your luggage is rolling around the cargo area of a plane. Furthermore, you don’t want your luggage to be either lost or stolen while in-flight. It’s just safer for you to keep anything important in your carry-on luggage.

Be Wary of Free Wi-Fi
You should keep your device from automatically connecting to any open wireless connection that it latches onto. The reasoning for this is that hackers will literally lurk on them, waiting to steal any data that presents itself to them. This can put both your own data and that of customers at risk–all because you checked your email.

Turn Off Your Autofill and Password Management
A password manager keeps you from entering in the same information over and over, but it should be disabled while you’re traveling. What if someone steals your device? They would have access to anything that was auto-filled on it. It’s like leaving the keys to your car in the front seat without locking the door. It’s not impossible to go a few days without auto-populating passwords, and it sure beats the fallout of losing a device.

Use External Drives and USB to Back Up Data
What if you are working on a project while out of the office on vacation, and you misplace your device or it’s damaged beyond repair? All of that progress would be gone. Now, imagine that you have that data backed up to an external hard drive. Now you don’t have to worry about losing data or progress while working out of the office.

There are just a few practices that can keep your organization from succumbing to the dangers of traveling and working at the same time. If you have any questions, thoughts, or concerns about using technology while out of the office, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

ponzi_pyradmid_money400.jpg

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved–njRAT–surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker–but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. COMPANYNAME can help with this task–to learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Don’t Underestimate The Value Of Managed IT

managed_it_services_good_for_your_business_400.jpg

Have you had to make substantial technology investments in the past year? How much money do you think you will spend this year? If you have a solid technology budget in place, you’ll know how much you expect to spend, but what happens if critical systems fail? Are you prepared to cover the cost of new technology, the management of that technology, and the staff that you’ll need to do so? If you are even a little unsure about it, managed IT services could have plenty of value for your business.

There are two critical facets to every IT strategy. The first is based in demand. What technology does your business need to be MOST successful? Do you need one server to deploy the software that your company uses? Three? Five? What do you do for communications? What do you do for storage? There are a lot of variables at work when deciding how to deploy technology solutions, and since there is so much cost associated with these systems, many businesses cut corners to provide their organization with technology solutions but end up putting their overall sustainability at risk.

The second facet, and often most costly, is based in supply. Your supply of technology has to be monitored, managed, and maintained to provide you a reasonable ROI on your technology investments. Typically, the cost of onboarding, training, and deploying a proficient technician far outweighs the cost of new technology; and, to make matters worse, the more technology your organization deploys, the more resources you need to have to ensure that all is running efficiently, and as intended. After all, the downtime that comes with fledgling technology, is a major problem for any organization.

COMPANYNAME can often provide a substantial cost reduction, better services, better technology, and a better return on your technology and management investments than buying new technology all the time, and hiring people to manage it. We utilize industry-leading remote monitoring and management software, leverage automation, and dispatch certified technicians to help businesses like yours build and maintain robust technology. We also have partnerships with some of the industry’s best vendors to ensure that every client has access to the technologies they need to build an efficient and secure IT infrastructure.

By delivering comprehensive IT management, our managed IT services are exceptionally valuable. If you run an AREASERVED business that is looking to improve your processes, deploy powerful technologies, and manage the technology you have, call us today at PHONENUMBER.

Categories
Casserly Consulting Blog

Tip of the Week: Use Microsoft Word To Create Envelopes For Your Contacts

Wordlogo400.jpg

Microsoft Office has long been a valuable asset for all types of businesses, but would you be surprised to hear that most organizations don’t take full advantage of it? All of the most recent editions of programs like Microsoft Word, Excel, and PowerPoint are designed with powerful, user-friendly interfaces that allow your business to do lots of neat things. In fact, you can create a professional envelope for your organization, add a list of contacts from a CSV file or from Outlook, and so much more.

Step 1: Open a New Document
Blank Page

Step 2: Access the Layout Menu
Layout

Step 3: Change the Size of the Page
You want the page to be set to the proper envelope size. If you need to know what size your envelopes are, try checking the box. #10 is generally the traditional letter envelope.
Envelope 10

Step 4: Check the Layout
Before proceeding, make sure that the layout has changed to the proper size.
Envelope 10 Resize

Step 5: Go to the Insert Tab and Select Text Box
Insert Tex Box

Step 6: Use the Simple Text Box Option
This will be used for your return address.
Insert Tex Box2

Step 7: Update the Address and Draft the Text to the Desired Location.
Drag to Position

Step 8: Remove the Border Around the Text Box
You can do this by right-clicking the box and selecting Format Shape. Switch the radial button from Solid Line to No Line.
Remove Border

Step 9: Style and Brand Your Return Address
You can use the Font options to customize the appearance of your return address. Make sure you don’t forget your logo.
BrandingAddress

Step 10: Start Your Mail Merge
First, let’s add another Text Box. You should remove the standing text and leave the cursor right where it is in the box.
Mail Merge 5

Step 11: Load Your Contacts
To do this, access Select Recipients and check the source of your contacts. You’ll need a CSV file for this next step.
Mail Merge 1

Step 12: Select Address Box. This appears in the text box that you created earlier.
Mail Merge 6

Step 13: Follow the Directions to Format Your Address
Mail Merge 4

Step 14: Preview Your Results
Use the Preview Results option to check that the addresses are displaying properly, are simple to read, and fit on the envelope. This might change depending on how many recipients you have. Just scroll through them to ensure that the formatting remains the same throughout them all.
Mail Merge 7

Step 15: Save or Print
That just about wraps it up. You can finish your work or print them out as you see fit.
Mail Merge 8

For more great tips and tricks, subscribe to COMPANYNAME’s blog.

Categories
Casserly Consulting Blog

Why Windows Ink Is So Useful In The Business Setting

windowsinkofficiallogo400.jpg

While computers, laptops, and tablets are incredible tools for productivity, there are many who miss the ability to scrawl out their ideas by hand. However, Microsoft has developed a means for your business to enjoy the benefits of both approaches with Windows Ink.

You may be familiar with the digital tablets that many artists use to transpose their ideas directly into their computer. The concept behind Windows Ink is very much the same. The primary difference is that, rather than using a separate tablet that you plug in via a USB connection, Windows Ink enables you to take notes right on the screen of your device with specialized writing utensils.

Naturally, as a Windows (and by extension, Microsoft) tool, Windows Ink is particularly suited to working with Microsoft Office products.

  • Microsoft Word: Windows Ink not only allows you to mark up documents, but allows you to edit them with different settings and gestures. Among other features, you can turn your stylus into a high-precision highlighter, or delete unwanted words or sections with a quick strikethrough.
  • Microsoft OneNote: With Windows Ink, OneNote turns into a freehand calculator. If you write an equation in the workspace, you can get the answer instantly–or, if you want to polish your math skills, OneNote will take you through the process step-by-step.
  • Microsoft PowerPoint: If you have ever used PowerPoint and wished that you could do more than what the toolbar allows you to do, Windows Ink is for you. Using the built-in ruler that comes with Windows Ink, you can draw with more precision than ever. Plus, Windows Ink gives you the ability to replay whatever notes others have made on a PowerPoint file.

Of course, there’s more that Windows Ink can do than work with the various programs of Microsoft Office. For instance, if you use Windows Ink to jot an address on a sticky note, Maps will step in to find you the best route. Another useful utility Windows Ink offers is its ability to take screenshots that you can then put notes on, allowing your reaction to be more easily understood.

The utility of Windows Ink in an office setting should be clear. Communications can be condensed from emails that list out the edits that a document needs, to contextual notes being made directly on the document itself. Windows Ink can essentially turn your device into an interactive notebook, allowing you improved utility and increased potential for productivity.

To learn more about Windows Ink and other useful solutions for your business, reach out to COMPANYNAME at PHONENUMBER.

Categories
Casserly Consulting Blog

Essential Cybersecurity Tips From The FBI

fbi_cybersecurity_400.jpg

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

For the average small business, it is more crucial than ever to avoid the pitfalls that lay on the internet. Victims of cybercrime deal with an endless number of issues, including drops in revenue, data loss, downtime, and fines/restitution if they are unable to keep their networks secure. Below are a number of line-items that the Federal Bureau of Investigation recommends to keep your data secure, and to avoid becoming a victim of the most pressing malware on the Internet today: ransomware.

  • Raise Awareness: Ensure that you make a point to make your staff cognizant of the threat of a ransomware infection.
  • Updates and Patches: Make sure to patch your operating systems, software, and firmware on all of your digital assets.
  • Auto Update Security Software: Lean on enterprise-level antivirus and anti-malware software to conduct regular scans and catch potential malware.
  • Limit Super Users: Ensure that you don’t just hand out administrator access to your mission-critical systems. Managing access is one of the best ways to keep untrustworthy entities out of your network.
  • Access Control: As stated above, access control is essential to ensure that you know who can and should be in parts of your network. If your users only need read-specific information, they don’t need write-access to files or directories, mitigating risk.
  • Filters and Application Control: Deploy software restrictions to keep programs from executing from location where ransomware may be found. This includes temporary folders found to support Internet browsers and compression/decompression programs.
  • Data Backup & Disaster Recovery Plan: Create data redundancy by having a comprehensive backup and recovery plan in place.
  • Multiple Storages: Ensure that each storage unit is stand-alone to avoid major problems with backups and other forms of storage.

Governments absolutely have to have a strategic plan on how to deal with cybercrime, and as a solid practice, businesses should follow suit. If you want to make sure your strategies are top-level, visit https://www.fbi.gov/investigate/cyber/news to see what the FBI is doing to protect their computing infrastructure. For more great security information, subscribe to our blog.