Ransomware attacks via RDP.
Ransomware attacks will always be prevalent. As part of our service here at Binary Bank we will always endeavour to keep you informed and keep reminding you, how to protect yourselves and your companies.
We choose Avast for our cyber-security software and one of their recent blogs explains how you can protect yourself from cyber criminals.
In short the key points are:
1) Make sure your RDP connection is not open to the internet.
2) Always use strong passwords.
3) Back up, back up, and… BACK UP!
Our New Survey Response
We have recently introduced a survey response service, which we email out to clients once a case is closed or scheduled work has been completed, inviting clients to give us their feedback.
This is an opportunity not only for positive feedback but also a chance to iron out any issues.
We welcome all feedback to help maintain our relationship with our clients. Read more
Nearly every business in the world – from small and mid-sized business to large enterprise organisations – needs to keep data safe and available during planned and unplanned downtime. If downtime does occur, due to natural disaster, malicious attack, or human error, organisations must be able to recover to normal working conditions as soon as possible.
Most customers find it burdensome and costly to maintain the hardware and software required to protect all their workloads when outages occur. Binary Bank’s Disaster Recovery service protects your server and data in real time, if your server fails and your data and applications are lost we can have a backup server running in our data centre within 15 minutes. No drama, no fuss, its business continuity at its best.
We are experts in data backup and disaster recovery. For the last 15 years we have protected our client’s data from loss and corruption through our off-site data backup and disaster recovery service. Read more
I was reading this article, it got me thinking about how easy it is to catch a user off guard and get access to their accounts. A dot in an email address is a subtle difference but in that case is the difference between a legitimate request and a phishing one. For some reason, Gmail will let you own all the dotted variations of your email address. So, if you are email@example.com, you can still receive emails on joe.bloggs and jo.ebloggs. There aren’t even any alerts to tell you that an email has been sent to a variant of your primary Gmail address.
Office 365, on the other hand, alerts their users when they spot any signs of a phishing email and prepends the email with something like this: Read more
Last week one of our clients became a victim of a Ransomware attack. The Malware infection encrypted important files on the server at ‘ITS’ and demanded payment.
Binary Bank provides a comprehensive Data Back-up and recovery service to ‘ITS’.
When the Malware hit; ‘ITS’ were fully prepared with an up to date Back-up and did not have to succumb to the demands. With the Disaster Recovery also in place, a restore to the previous back-up that is taken daily, ‘ITS’ were able to continue with their daily business with drama or fuss.
Binary Bank can back up any type of server, application or database from virtual or physical machines, we then store that backup in our data centre securely. Every time you add data or change a file on your server, we copy those changes to our data centre so your ‘backup server’ is always up to date and ready to run. Read more
Here to Help.
The Binary Bank team have a wealth of expertise and experience when it comes to tailor made solutions, ensuring a supportive way of working.
We have a thing about keeping IT simple creating a straight forward life.
Consulting us in the early stages of your requirements lets us build and create strategies that help keep your costs down and ensures business continuity. Read more
When did you last back-up your Data? Do you have a Disaster Recovery plan? Contact us for help!
Data Back-up is an essential part of our Disaster Recovery plan.
If you rely on your servers and accessing your data is critical to your business, what do you do if your server fails or your data becomes corrupted? How long can you survive without access to your IT system before it starts to impact on your business? Read more
Don’t let Malware hold your business to ransom.
Malware and computer viruses have become more damaging than ever with over 60% of cyber-attacks now containing ransomware. When ransomware infects your PC or server it will encrypt your files and demand you pay to have them decrypted and released back to you. Read more
On Friday 12th of May the NHS and other organisations across the UK and Europe were hit by a massive virus attack that caused wide spread disruption to their computer systems. The virus was a type of ransomware that encrypted files and demanded payment before the files were released. This virus most likely spread through an email which had either an attachment or possibly a link to a compromised web site controlled by the hackers. That web site would have triggered a download when you clicked on it.
The authorities are expecting a second wave of attacks to happen on Monday 15th of May. It is essential that you and your staff are especially vigilant at this time.
IF you receive an email and you are unsure of its authenticity DO NOT OPEN IT – DELETE IT.