Last week one of our customers was contacted by “Microsoft”. He was told that a virus had been discovered on his computer and that the “tech” needed access to his machine. By the end of the call his perfectly good computer was so infected with malware his best option was to wipe the device and start fresh, losing his personal data.
The worst part of the story is he thought he was talking to a Databranch engineer.
This scam has been around for a few years now and is showing no signs of slowing down. Here are a few tips to help you recognize the situation and avoid becoming their next victim.
- Unless you are expecting a call from Microsoft or Databranch, it is relatively safe to assume the call is not legitimate. If you are concerned, please hang-up and reach out to Microsoft or our office (716-373-4467) directly. Our business hours are Monday-Friday, 8am-5pm, so if you get called outside of that time or at your home, please hang-up!
- DO NOT download any software, go to any links, or provide any personal or credit information. These scammers are looking to install malicious software on your machine to steal your passwords, online banking info, etc., trying to get you to click on links that give them remote access to your machine, or get you to provide them credit card information to pay them for their services. In the end, it’s all about the money and how much they can get from you!
- Common organizations the scammers pretend to be from:
- Windows Helpdesk
- Windows Service Center
- Microsoft Tech Support
- Microsoft Support
- Windows Technical Department Support Group
- Microsoft Research and Development Team
If you have been victim of a telephone scam please take the following steps:
- Change your passwords
- Scan your computer for malware. One free program we recommend is called Malwarebytes.
- Install/Update Anti-Virus Software
- Report the call to the FTC – 1-877-FTC-HELP
When your system is compromised, the best thing you can have is a good back-up of your data. If your system is recoverable, the consequences of an attack are less severe. Click here to learn more about are favorite back-up/disaster recovery solution.
For another take on this scam check out this article from Forbes Tech: http://onforb.es/VOG9FI
Have you been a victim of a telephone scam? Share your story or ask any questions in the comments below!
Last week it was announced that financial institution, J.P. Morgan had suffered from a security breach. This cyber-attack has affected 76 million households and 7 million small businesses, the exact number of individuals who have been exposed is unknown and has not been released.
- The attack is under control and has been stopped.
- The hackers were unable to obtain any credit or debit card information, social security numbers, passwords, or date of birth information.
- If you use Chase.com, JPMorganOnline, Chase Mobile, or JPMorgan Mobile your name, phone number, address, and email have been compromised.
What Should I Do?
- Be prepared for an increase in phishing emails, especially emails that appear to be coming from JP Morgan. A reputable company will never ask for your personal information through an email. If you believe an email is legitimate, take the time to reach out to a company representative at an established phone number. The primary goal of a phishing email is to steal your personal information or money.
Please comment below with any questions or concerns you may have about this recent security breach.
Our Databranch account managers can help you develop a security solution that fits your business’s needs. We offer a comprehensive network security assessment and our engineers have the security expertise to keep your network safe. You can reach us at 716-373-4467, firstname.lastname@example.org, or click here to get started.
Over the past year the tech world has been flooded with talk about Windows XP, which went out of support this past April. Recently, Microsoft has announced Windows Server 2003 will experience the same fate as XP and on July 14th, 2015 this highly used server operating system will no longer be supported.
The primary concern when a software product becomes end of life is security. Microsoft will no longer be creating or releasing updates for Server 2003 leaving your business vulnerable to security threats. In 2013 thirty-seven critical updates were released for Server 2003, without these patches you leave your network and company data exposed. If you’ve been watching the news lately you know hackers have been having some success, think Home Depot or Target. It is predicted these attacks will become even more prevalent as companies fail to upgrade outdated technology. As a business, you also need to be concerned about staying in compliance with your industries standards and regulations. Many times software that is no longer supported will not measure up.
The time to start planning your migration from Windows Server 2003 to Windows Server 2012 is now. The first thing to do is determine how many, if any, instances of Server 2003 are being utilized in your current network set-up. Next, assess the upgrade path for all applications that are currently running on the Server 2003 operating system. We often find that business specific applications that are currently running on this older operating system will also need to be upgraded or replaced to be compatible on newer systems. Finally, allocate resources and budget for any necessary hardware upgrades that may need to be completed prior to transitioning to Windows Server 2012. It is likely that your business will need to upgrade your server infrastructure for the new operating system to run at its most effective levels.
The good news is we are still almost a year away from the end of support date but it’s important to start preparing soon. At Databranch, we have successfully migrated numerous customers from Windows Server 2003 to newer, supported operating systems. Our account managers are excited to work with you to create a migration plan for your business and are available to talk now. You can reach us at 716-373-4467, email@example.com, or click here to get started.