Securing your privacy has never been more important than it is now for several reasons. Not only does the average computer user need to protect data from hackers and viruses, but the NSA’s PRISM program is still active and ISPs are now allowed to spy on you, too.
It seems there are endless ways for third parties to capture your data. Even if you use a cloud storage service that encrypts data during transport and storage, it’s possible for cloud storage employees and hackers to access your data (with the exception of zero-knowledge providers).
Unfortunately, some services like Dropbox are notorious for poor security practices that make data easier for hackers to pluck than low-hanging fruit. In the past, the solution was simple: just use TrueCrypt to encrypt data before shipping it off to the cloud for storage.
The problem with that solution is, however, that TrueCrypt has gone the way of the dinosaur and is now defunct.
Ransomware is currently the subject of the hour. Attacks are happening more frequently and are costing users time and money to resolve. Often the simplest solution is to pay the ransom to give you access to your documents again.
We at UA Technology Services believe that prevention is better than cure. A robust backup strategy that is both offsite and incorporates versioning will allow you to recover your documents without needing to pay the perpetrators.
A new website Fight Ransomware has been launched to try and bring together news and information about the subject, to help users be aware about the current state of play and to inform them about what can be done to combat this malware.
A few Statistics about Ransomware to give you an idea about the size of the problem
The amount cybercrime will cost the global economy in 2016. The primary driver of loss will be ransomware.
The increase in ransomware attacks from Q1 of 2016 compared to Q1 2015. That’s as many as 4,000 ransomware attacks per day.
The time it takes a hacker to compromise a computer with ransomware.
Contact Us to book an appointment or to discuss your needs further.
• a website is secure before entering account or card details. Look for the ‘https’ in the web address and the padlock or unbroken key icon at the top of the page.
This is no good as any domain can have an HTTPS address and a padlock. All it tells you is that the site has paid for a certificate. You need to check that the address you are seeing in the address bar is actually what you think it should be. i.e. paypal.com NOT paypa1.com
• your personal or security information on a website you’ve clicked to from a link in an email or text. We will never email or text you a link that takes you straight to the Online Banking page.
WRONG!! Never click on link in email or text in the first place. It is trivial to hide the real address that a link is taking you too (in an email or even on a website). If you want to go to a site obtained from an email, type the address YOURSELF. That way you know it is what it says it is.
Act with care…
• by keeping your internet security software up to date. Help protect yourself with our free* Kaspersky™ security software at barclays.co.uk/kaspersky
OK, this last one is fair comment. But don’t assume that the scanner will save your bacon. You need to take care where you go and what you click on.
Look here Keeping safe on the internet for more tips. If you move your mouse over that link, and look in the bottom left of your browser window, you will see where it is taking you.
Contact Usto book an appointment or to discuss your needs further.
should never run more than one antivirus program at the same
time. The two programs could slow down your computer, and they
might even identify each other as a virus, which could lead to
file corruption or other conflicts and errors that make your antivirus
protection less effective—or not effective at all.
Microsoft respects your privacy.
To learn more please read our online Privacy
If you would prefer not to receive The Microsoft Security for Home Users
Newsletter from Microsoft and its family of companies, please click here.
These settings will not affect any other newsletters you’ve requested or any
mandatory service communications that are considered part of certain
To set your contact preferences for other Microsoft communications click here.
TrueCrypt, a fantastic free whole disk encryption tool has recently vanished of the face of the planet. No one quite knows why, but everyone is wondering if it is safe to use (the last comments from the authors tend to indicate that it is not!).
Rather than reinventing the wheel, I thought I would pass on the following blog entry by Steve Gibson, a respected Tech/Security Guru, that gives his take on it and an answer to the question “Is TrueCrypt safe to use?”
Steve Gibson posted: “So opens the short editorial I wrote this morning and placed at the top of GRC’s new TrueCrypt Final Version Repository page. The impetus for the editorial was the continual influx of questions from people asking whether TrueCrypt was still safe to”
The impetus for the editorial was the continual influx of questions from people asking whether TrueCrypt was still safe to use, and if not, what they should switch to, and so on. By this time, one of the TrueCrypt developers, identified as David, had been heard from, and his interchange confirmed the essential points of my conjectured theory of the events surrounding the self-takedown of TrueCrypt.org, etc.
Rather than repeating that entire editorial here, I’m posting this as a pointer to it since folks here have thanked me for maintaining a blog and not relying solely upon Twitter. And also, this venue supports feedback and interaction which GRC’s current read-only format can not.