Blue Lightning IT Services Logo
CALL US
470-236-2584
Blue Lightning IT Services Header
  • Home
  • Services
  • Plans
    • Home Support Plans
    • Business Support Plans
    • Cybersecurity Protection Plans
    • Data Backup & Recovery Plans
    • Network Management Plans
    • Business Phone Plans
      • Hosted PBX Features
    • Video Surveillance Cloud Storage Plans
    • Video Surveillance Cloud AI Storage Plans
  • Blog
  • Sign In
  • Contact
  • About

Cyber Attacks are on the Rise and are Incredibly Expensive

April 27, 2019 by Matthew Schulz

Cyber Attacks

Malware and web-based cyber attacks are the most popular forms that are growing in their complexity and method of delivery.

In 2015 companies saw an average of 160 successful cyber attacks per week, more than three times the 2010 average of 50 per week (The Ponemon Institute’s 2015 Cost of Cyber Crime Report).

Malware includes viruses, worms, Trojans, ransomware, spyware, adware, etc. and is primarily installed via phishing schemes. When employees click rogue links or open malicious attachments, they unknowingly give hackers remote access to infect their systems.

One wrong move and sensitive company data or personally identifiable information, such as your social security number, could become encrypted and/or stolen.

Ransomware is the malware of choice now. You may have heard of CryptoLocker, CryptoWall and now Locky, malicious software that locks you out of your files and demands ransom payment for recovery.  Factoring in this ongoing trend, cybercrime is becoming increasingly costly.

Data Security Now Requires Consistent, Vigilant Monitoring & Maintenance

With all of the various threats to your company’s data and factoring in the impact of exploited network or system vulnerabilities, you simply don’t have the time to do what it takes to keep your business secure.

IT security must continually be revisited. How much time would you say you’ve spent working on cybersecurity issues in the last six months? Are you staying up-to-date with cybersecurity threats?

If you don’t have someone constantly and actively monitoring your network, you may not detect any issues until it’s too late. What if you didn’t know you were hit with ransomware until after the ransom payment window closed, and you couldn’t access any of your files?

The average time to detect malware or criminal attack is 170 days (Heimdal Security).

Did you know?

79 percent of small- to medium-sized  businesses (SMBs) don’t have an incident response plan. Signature-based antivirus solutions detect on average less than 19 percent of malware threats. Ransomware is becoming more expensive, with the average ransom averaging around $679. The number of new ransomware families is predicted to rise 25 percent in 2017. 51 percent of business owners are unfamiliar with unified threat management (UTM) and do not fully understand its security benefits.

Examples of time-consuming, but necessary cybersecurity tasks you can offload include:

  • Reviewing firewall rules  
  • Updating your firewall 
  • Patching the latest vulnerabilities discovered 
  • Maintaining required controls and standard certifications, such as: ISO, SSAE16, HIPAA, SOX, etc.
  • Filtering web content 
  • Updating software

Dedicated Cybersecurity Expertise Combined with Advanced Threat Intelligence

Do you have the budget, skills or resources to have inhouse experts devoted solely to cybersecurity?

You may have employees who handle cybersecurity along with other general IT responsibilities, but that’s not enough. Through no fault of your own, you’re unprepared to protect against and remediate these cyber  threats. If you’re attacked, you won’t be ready.

An MSP provides the proactive, preventative maintenance and technology you need to secure your workstations, servers, devices and networks. Working with an MSP is also a more cost-efficient way to address your information security needs. Some additional benefits you’ll receive include:

Multi-Layered Threat Protection and Prevention

You don’t always have the time, bandwidth or resources to stay up-to-date on the latest security processes and implement the proper defenses to keep your network protected. The easiest and most beneficial solution for you is to partner with an MSP like us and fully leverage our services and expertise. Together, we can minimize your business’ risk and develop a plan that focuses on resiliency, not only prevention. The best approach to IT security is a multi-layered approach, and we can provide that for you.

Simplified Management

If your IT security strategy is a patchwork of different devices from multiple vendors, it may be putting too much strain on your in-house team to manage. Our unified threat management and cybersecurity services allow for a more centralized management of threats to local and remote environments from a single console. And as your MSP, we can take care of the deployment, management and monitoring for you – thereby addressing your security needs in an efficient and simplified manner.

Your Ultimate Failsafe

We can be the expert you can turn to in case of a ransomware or other cyber attack. As your MSP, we’ll give you the steps you need to take so as to minimize interruption to your business and profitability, and also provide you and your employees with training and education to prevent future attacks. The key to protecting your business is to take preventative measures now. When you work with us, you can rest easy knowing that your network is secure, your data is protected and that we’re available for any and all of your support needs.

Don't waste any time protecting you and your business.

Contact us today to start protecting you and your business from cyber attacks.

Contact Us

Filed Under: Antivirus

Share:

How to Tell if You’ve Been Hacked

October 7, 2018 by Matthew Schulz

Are You Hacked

Being hacked is the single biggest fear of most computer users.  Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control.  But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs?  What does being hacked really look like? 

There is an important distinction to make between being hacked by a person and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system, steal your data, or both.  There are of course ways that we can defeat these processes, but what if we are instead hacked by an individual?

Logins are not working

One of the first steps a hacker might take would be to change the computers passwords.  By doing so, not only do they ensure future access to the account, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control.  With this in mind, we always want to make sure to keep on top of our own login details and how often we change them.

Security Emails or SMS's from online services

Many services track which device and location you logged into your account from last.  If your account is accessed from a new device or a different country it might trigger an automated email or SMS to ask if this new login is your own. 

If you have logged in using a new computer, tablet, or phone; an email that asks "hey, is this you?" need not be cause for alarm.  If you haven't, it may be time to investigate further. This service is an important part of information security. It may be a key first step to identify someone else gaining access to your account.

Back accounts missing money or strange transactions

Most commonly today, hackers commit crimes to steal money. The end goal for hackers is typically to profit from their crimes by taking money from people online.

It always pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account. 

You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction. 

Alternatively small, hard to notice transactions may appear.  These often account for small purchases where attackers have tested the details they have to make sure they work.

Sudden loss of cellular connectivity

Network interruption is a symptom that few people expect but occurs commonly when hackers attack. Many banks and online services use a security feature known as Two-factor authentication.  To do this they send a short code to your phone or app when you log in.  Two-factor authentication is ideal in most cases and a great boost to security.  

Hackers can try to work around this by calling your mobile service provider to report your phone as lost or stolen.  During this call, they will request your phone number be transferred to a new sim card that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who may be able to log in.  From your perspective phone service will simply stop working.

Keeping vigilant and maintaining security

These are only some of the modern techniques that hackers can try to use to gain access to your accounts.  It pays to be extra vigilant and pay close attention to the signs and signals that indicate you may have been hacked.

Do you suspect that you and your business has been hacked?

Contact us and we'll improve your business security today.

Contact Us

Filed Under: Antivirus

Share:

Can Private Browsing Protect You Online?

August 6, 2018 by Matthew Schulz

Private Browsing Protect Online

Maintaining your privacy while using the internet has become more challenging over the years. The recent Facebook privacy scandal made that abundantly clear, with users shocked at how much information had been recorded about them. While it’s almost impossible to enjoy the internet and leave zero digital footprints, there are things you can do to hide your online activities - some more effective than others.

  1. Get a virtual private network (VPN) - VPNs aren’t just for business and downloaders now, they’ve gone mainstream. Once set up, it creates an encrypted connection from your computer to the VPN providers computer. The other computer could be in another city or another country. When you visit a website, it can only see the VPN computer - not yours. You essentially run around the internet pretending to be another computer, in another location. Since your connection is encrypted, even your ISP can’t see what you’re doing online, making your usage anonymous. The downside: Because your internet usage has to route through another computer first, your browsing and download speed could be affected. They can be tricky to set up and not all VPNs offer the same privacy levels (the better ones tend to be more expensive). Some websites may even block visits from people using VPNs, so you may end up switching it on/off as required.
  2. Go incognito - Most browsers have a private browsing mode, each called something different. For example, Google Chrome calls it ‘incognito’, Microsoft calls it ‘InPrivate’. Before you take the name at face value, it’s a good idea to talk about how they define ‘private’. Unlike a VPN where you can dance around the internet anonymously, private browsing simply means it won’t show up in your browser history, or what you entered into forms. This feature is free, so you always have the option to use it, and it’s actually more helpful than you might think. Common uses include price shopping to reset sale timers and access local-only pricing and overriding usage limits on certain sites. Some sites use cookies to control your free trials and private browsing can help you get around that. For example, some news sites limit you to 5 free articles a month unless you pay. Private browsing can extend that trial quite easily!  The downside: It can’t pre-fill saved passwords and it won’t help you type in the website name even if you’ve been there before.
  3. Think about who's watching - While you might be naturally careful when using a public computer have you thought about who’s watching what you do on your work computer? Some workplaces have employee monitoring software that tracks all sorts of data, including taking screenshots of your desktop. It helps them create rules about computer usage but it may also provide them with evidence you’ve been breaking those rules. Stepping out to the internet cafe can be even more risky, as people can install keyloggers that record every keystroke, including your credit card numbers and logins. You’ll never know your activities are being recorded, even if you use private browsing.  The downside: None. Awareness of the risks and the possibility of being watched ensures you’re more likely to use the internet safely.

While private browsing can help keep your internet usage under wraps, it’s not a magic bullet to cover all possibilities. Many people believe they’re invisible AND invulnerable while private browsing, a mistake they end up paying for. You’ll still need solid anti-virus and password habits to protect against threat, and to be a smart internet user who avoids suspect websites. Consider the options above as privacy-enhancing measures, not one-stop solutions.

Need help with your online privacy?

Contact us today!

Contact Us

Filed Under: Antivirus

Share:

How to Tell if Your Computer Has a Virus?

March 25, 2018 by Matthew Schulz

Sometimes computers do wacky things that ring alarm bells and make us dive for cover. Next thing you know, you're running scan on repeat and demanding everyone to come clean about their browsing habits. Fortunately, not all weird occurrences are caused by viruses - sometimes your computer is simply overloaded, overheating or in desperate need of a reboot.

How to Tell if Your Computer Has a Virus?

Here are the tell-tale signs of a malware attack:

  1. Bizarre error messages - Messages popping up from nowhere that makes no sense, are poorly worded or plain gibberish - especially if they're about a program you don't even have. Take note of antivirus warnings to make sure the warning is from YOUR antivirus protection and looks like it should. It a message pops up that isn't quite right, don't click. Not even to clear or cancel the message. Close the browser or shut down the computer instead, then run a full scan.
  2. Suddenly deactivated antivirus /malware protection - You know the best way to get past the guard? Send him for a coffee break! Certain viruses are programmed to take out the security systems first, leaving you open to infection. If you reboot and your protections aren't back on the job, you are more than likely under attack. Attempt to start the antivirus manually and you'll know for sure.
  3. Social media messages you didn't send - Are your friends replying to messages you never wrote? You login credentials might have been hacked and your friends are not being tricked into giving up personal information or money. Change your password immediately, and advise your friends of the hack.
  4. Web browser acting up - Perhaps you've noticed your homepage has changed, it's using a n odd search engine or opening/redirecting to unwanted sites. If your browser has gone rogue, it's definitely a virus, usually one intended to stead your personal or financial details. Skip the online banking and email until your scans come up clear and everything is working normally again.
  5. Sluggish performance - If your computer speed has dropped, boot up takes an eternity and even moving the mouse has become a chore, it's a sign that something is wrong. But not necessarily a virus. Run your antivirus scan and if that resolves it, great. If not, your computer likely needs a tune-up or repair.
  6. Constant computer activity - You're off the computer but the hard drive is going nuts, the fans are whirring, and the network lights are flashing like a disco? It's almost like someone IS using the computer! Viruses and malware attacks use your computer resources, sometimes even more than you do. Take note of what's normal, and what's not.

Does your computer have a virus?

Contact us today and we will be happy to help.

Contact Us

Filed Under: Antivirus

Share:

Why Do People Create Viruses?

January 19, 2018 by Matthew Schulz

You'd be right in thinking it's hard to program a computer virus that can spread across the world in a flash - we're talking days of constant desk-jockey nerd-work. So why do they bother? Well, it generally comes down to 3 reasons: Money, showing off their skill, or simply being a jerk. While showing off or being a jerk is pretty self-explanatory, the money side is fascinating.

Why Do People Create Viruses

Here's how people are making money with computer viruses:

Bank account theft: Virus creators are more than happy to help themselves to your bank details, sneaking in to grab your login details or credit card info. They can either transfer your funds away or use your credit card details to go on a shopping spree. Sometimes they'll leave the fun to another person though, and simply sell your details to the highest bidder.

Ransomware: Rather than a financial snatch and grab, sometimes a virus will encrypt your files and demand money for the unlock code. Without a true backup plan in place beforehand, you're at their mercy. You'll be given very helpful information on how to pay, plus a firm deadline before your files are destroyed permanently.

Ad swappers: A cheeky technique, this is when they create a virus that either puts annoying ads on websites you visit, or places affiliate codes on pages so that when you buy something legitimately - for example, from Amazon - they get a percentage as a "referral fee". Their kickback doesn't make your purchase cost more and you may not even know you're supporting their activities.

Bitcoin mining: You might have heard of digital currencies being used for payment, but did you know you can also earn them with your computer processing power? Unfortunately, "renting" out your computer's processing power means paying more in running costs than you'd make - unless you were very clever and sneaky, and used a virus to rent out other people's computers.

Botnets: Certain infected computers can be remotely controlled to do whatever the virus creator wants. In this case, they'll usually set the infected bot computers to overwhelm a target web server, like an e-commerce store. Sometimes it's done as revenge, but more often it's blackmail. The "Botmaster" says "pay me thousands of dollars or I'll crash your site during the biggest shopping day of the year."

Account stealing: Subscription accounts like Netflix and Hulu are often hijacked, leaving you to pay the bill for someone else's entertainment. But sometimes, virus creators go one step further with online gaming accounts. All those digital items that you fought so hard for (special clothing, weapons, etc.) can carry real world value and be stolen from your account  and sold on a black market. Yes, that's cheating!

Is your computer secure?

Contact us at today so that we can help you make sure your computer is secure and protected.

Contact Us

Filed Under: Antivirus

Share:

Services

  • Technology Asset Disposal Service
  • Print and Copier Services
  • Video Surveillance
  • Proactive Computer Management
  • PC & Mac Support
  • Cybersecurity Protection
  • Data Backup & Recovery
  • Network Management
  • Microsoft 365 Administration
  • Business Phone Service
  • Managed Print Services Partnership
  • 5 Red Flags of Phishing Emails: Think Before You Click
  • What Hackers Target in a Small Business
  • LetMeIn101: How the Bad Guys Get Your Password
  • Is Misconfiguration Making Your SMB Vulnerable?

Categories

  • Antivirus
  • Managed Print Services
  • Microsoft 365
  • Phone Services
  • Security
  • Tips
  • Tune Ups

Blue Lightning IT Services

470-236-2584
1911 Grayson Hwy STE 8-113
Grayson, GA 30017

Services

  • Technology Asset Disposal Service
  • Print and Copier Services
  • Video Surveillance
  • Proactive Computer Management
  • PC & Mac Support
  • Cybersecurity Protection
  • Data Backup & Recovery
  • Network Management
  • Microsoft 365 Administration
  • Business Phone Service

Recent Posts

  • Managed Print Services Partnership
  • 5 Red Flags of Phishing Emails: Think Before You Click
  • What Hackers Target in a Small Business
  • LetMeIn101: How the Bad Guys Get Your Password
  • Is Misconfiguration Making Your SMB Vulnerable?

Copyright © 2025 · Blue Lightning IT Services · 1911 Grayson Hwy STE 8-113, Grayson, GA 30017