Tag: malware

  • Avoiding industrial nightmares

    Avoiding industrial nightmares

    The Iranian nuclear program is crippled by a virus that infects their control systems while a hacker claims a Texas waterworks can be accessed with a three word password.

    Any technology can be vulnerable to the bad guys – obscure systems like office CCTV networks and home automation services can be as vulnerable as the big, high profile infrastructure targets.

    While there’s good reasons to connect our systems to the web, we need to ensure our networks are secure and there’s a range of things we can do to protect ourselves.

    Does this need to be connected?

    Not everything needs a Internet or network connection, if there’s no reason for a device or network to be connected then simply don’t plug it in.

    Keep in mind though that threats don’t just come through the web, both the Iranian malware attack and the Wikileaks data breach weren’t due to hackers or Internet attacks.

    Get a firewall

    No server or industrial system should be connected directly to the public Internet, an additional layer of security will protect systems from unwanted visitors.

    All Internet traffic should go through a firewall that is configured to only allow certain traffic through, if the router or firewall can be configured to support a Virtual Private Network (VPN), then that’s an added layer of security.

    Disable unnecessary features

    The less things you have running, the fewer opportunities there are for clever or determined hackers to find weaknesses.

    Shut down unnecessary services running on systems – Windows servers are notorious for running superfluous features – and close Internet ports that aren’t required for normal running of your network.

    Patch your systems

    Computer systems are constantly being updated as new security problems and flaws are found.

    Unpatched computers are a gift to malicious hackers and all systems should be current with the latest security and feature updates.

    This is a lesson the Iranians learned with the Stuxnet worm that was almost certainly introduced through an unpatched system – probably one running an early version of Windows XP or even 98 – which was vulnerable to known security problems.

    Have strong passwords

    Passwords are a key part of a security policy, they have to be strong and robust while being different to those you use for social media and cloud computing services.

    It’s also important not to share passwords and restrict key log in details and administrator privileges to those who require them for their work.

    With online services like social media, cloud computing and other web tools becoming a part of business and home life, we have to take the security of our systems seriously. Hardening them against threats is a good place to start.

    Similar posts:

  • Cloud Computing Explained: 702 Sydney Weekends

    Cloud Computing Explained: 702 Sydney Weekends

    What on earth is cloud computing? Is it just another IT buzzword or something that you can use in your home and business?

    On the November 20 ABC Weekends show, Paul and Lex Marinos discussed what cloud computing is and how it can help you.

    We also helped out listeners with various computer and tech questions, including the following;

    Malware

    Sue was caught out by the DNS Changer Trojan that was recently busted by the FBI. Probably the best fix for this is downloading and running the free Malwarebytes software.

    Our IT Queries site has instructions on the somewhat convoluted process for removing this Trojan and other viruses from your computer.

    Synchronising an iPhone with iCloud and Google Calendars

    One advantage we have with the cloud is that it means you can use devices anywhere, however there is a bug where iPhone calendar functions aren’t synchronising with Google Calendar.

    Unfortunately the problem is the iCloud and Google services aren’t compatible on the iphone so one has to be turned off.

    If your preference is to use the Google services, then you will have to turn off the iCloud services through the iPhone’s settings app and turning off all of the calendar and contact settings.

    You may then want to check your Google services are being synchronised through the iTunes settings.

    Sharing data between laptops.

    One of the advantages with networking is that you can share data between computers. Sonya wanted to know how she can setup her windows 7 laptops to share data to an external drive.

    The best option is to use a Windows 7 compatible Network Area Storage device that sits on the network.

    For the setup to work, the network name has to be the same on all three devices, Microsoft has instructions for setting Windows7 network name and the hard drive will have the instructions included for setting it up correctly.

    It’s also worthwhile using Microsoft’s Active Sync software to synchronise machines as well so you have files stored on your computer.

    If you missed Sunday’s ABC program, there’s more details at Netsmarts’ Cloud Computing explained and The Networked Business, we’ll also be running a Demystifying the Cloud webinar on the Australian Businesswomen’s Network at the end of November.

    That will probably be the last ABC 702 Weekends spot for 2011 unless there’s something else that comes up.

    Subscribers to our newsletter get early notice of any upcoming programs and other useful information on getting more value online. Don’t miss the next program.

    Similar posts:

  • Protecting yourself from the Conficker worm

    Nearly a year after it was identified, the Conficker computer worm continues to plague Windows users, infecting systems controlling everything from fighter planes to bus lane fines.

    The problem has become so great, a consortium of vendors have set up the Conficker Working Group to deal with the malware’s spread, and Microsoft are offering a $250,000 reward for the identity of the writer.

    It’s not a problem that should be understated – the worm’s main use appears to be as a controller of botnets, networks of remote controlled computers used to launch attacks on other systems or to hide the tracks of scammers and password thieves.

    Update your systems

    Given the risks and embarrassment of being infected, avoiding this worm and others like it should be a priority for your business. First of all your Windows computers should have the latest updates as Conficker relies on some old security bugs that Microsoft patched last October.

    Run an anti-virus

    Naturally, you should be running an up to date anti-virus. Most widely used AV programs will do the job, including Open Source detectors like Clam AV and freeware programs.

    Note though that the licences for freeware programs like AVG and Avast! are specifically for home use only. If you are running those on your office system, respect the developer’s right to make a living and buy a commercial licence, they are actually cheaper and more reliable than many of the better known brand names.

    Restrict your users

    Finally, make sure your users log on in Limited User mode. The reason why Windows computers are more prone to viruses than their Mac and Linux cousins is because most users run their Microsoft systems as the powerful Administrator mode which is the equivalent of leaving your car doors unlocked all night.

    I’ve some instructions on setting up Limited User Profiles for Windows XP systems on the PC Rescue website. If you have an office with a Windows 2003 or 2008 server, your IT department or consultant will be able to do this through the network, which is a lot more secure way of doing things.

    Be warned that some programs won’t work unless they run in Administrator mode. If you find this is a problem then you should consider replacing that software as the vendor has shown they are either incompetent or are prepared to put their customers at risk to save a few dollars.

    Either way, you don’t need suppliers that have no respect for their customers.

    Your computers are too important to your business and shouldn’t be exposed to these sorts of embarrassing and expensive risks. Get your IT people to make sure the office systems are locked down properly.

    Similar posts:

    • No Related Posts