Recently our help desk has received quite a lot of queries stating that scammers have contacted our clients claiming that they know their passwords and even more worryingly how correct they actually are. The scammers go on to demand a secure payment via Bitcoin threatening blackmail if failure to do so. This has come via […]
Ransomware attacks via RDP.
Ransomware attacks will always be prevalent. As part of our service here at Binary Bank we will always endeavour to keep you informed and keep reminding you, how to protect yourselves and your companies.
We choose Avast for our cyber-security software and one of their recent blogs explains how you can protect yourself from cyber criminals.
In short the key points are:
1) Make sure your RDP connection is not open to the internet.
2) Always use strong passwords.
3) Back up, back up, and… BACK UP!
Nearly every business in the world – from small and mid-sized business to large enterprise organisations – needs to keep data safe and available during planned and unplanned downtime. If downtime does occur, due to natural disaster, malicious attack, or human error, organisations must be able to recover to normal working conditions as soon as possible.
Most customers find it burdensome and costly to maintain the hardware and software required to protect all their workloads when outages occur. Binary Bank’s Disaster Recovery service protects your server and data in real time, if your server fails and your data and applications are lost we can have a backup server running in our data centre within 15 minutes. No drama, no fuss, its business continuity at its best.
We are experts in data backup and disaster recovery. For the last 15 years we have protected our client’s data from loss and corruption through our off-site data backup and disaster recovery service. Read more
I was reading this article, it got me thinking about how easy it is to catch a user off guard and get access to their accounts. A dot in an email address is a subtle difference but in that case is the difference between a legitimate request and a phishing one. For some reason, Gmail will let you own all the dotted variations of your email address. So, if you are firstname.lastname@example.org, you can still receive emails on joe.bloggs and jo.ebloggs. There aren’t even any alerts to tell you that an email has been sent to a variant of your primary Gmail address.
Office 365, on the other hand, alerts their users when they spot any signs of a phishing email and prepends the email with something like this: Read more
Don’t let Malware hold your business to ransom.
Malware and computer viruses have become more damaging than ever with over 60% of cyber-attacks now containing ransomware. When ransomware infects your PC or server it will encrypt your files and demand you pay to have them decrypted and released back to you. Read more
5 Top Tips for an effective and safe digital workplace.
Whatever the size of your business, creating a digitally effective and safe environment to work from enables everyone to work smarter and to innovate.
- Ensure Productivity everywhere. with the right access to devices and applications, means your teams are connected, secure and productive.
- Keeping everyone and everything connected. Products and solutions that fit together and meet your current needs allow high performance and reliability.
- Provide mobility as standard. Today everyone expects the same level of flexibility, availability and service at work that they get with their personal devices.
- Bake-in security at every level. Security built into the network reduces the risk and minimises the impact of attacks if they happen.
- Be prepared for the future. With the pace of digital change, ensuring that you have the right network in place keeps you ahead of the competitive game.
For more information please call us on 01277 280008 or contact us here
On Friday 12th of May the NHS and other organisations across the UK and Europe were hit by a massive virus attack that caused wide spread disruption to their computer systems. The virus was a type of ransomware that encrypted files and demanded payment before the files were released. This virus most likely spread through an email which had either an attachment or possibly a link to a compromised web site controlled by the hackers. That web site would have triggered a download when you clicked on it.
The authorities are expecting a second wave of attacks to happen on Monday 15th of May. It is essential that you and your staff are especially vigilant at this time.
IF you receive an email and you are unsure of its authenticity DO NOT OPEN IT – DELETE IT.
Many people may already know the dos and don’ts of financial fraud- that no-one should ever ask them for their PIN or full password, or ever make them feel pressured into making a decision. The trouble is, in the heat of the moment, it’s easy to forget this.
After all, trusting people on their word is something everyone tends to do instinctively. If someone says they’re from your bank or from the police, why wouldn’t you believe them?
Before you take their word for it though, Take Five (a new awareness campaign led by FFA UK and its members with partners Cifas and City of London Police) urges you to stop and consider whether the situation is genuine – to stop and think if what you’re being told really makes sense. Read more
Businesses warned about the boss’s email asking for cash! Latest scam! Fraudsters claiming to be your boss. Police say a growing number of workers are falling for a disturbing new money-transfer fraud. Fraudulent attempts are being made by hackers that clone emails and make contact with you acting as if they are your boss or […]
AVG offers free ransomware decryptor tools. AVG have just released six new ransomware decryption tools for partners and their clients. The free tools decrypt the recent ransomware strains Apocalypse, BadBlock, Crypt888, Legion, SZFlocker and TeslaCrypt. While AVG Business products help detect and block against all known ransomware strains – including this recent six – AVG […]