Crypto Recovery

We recently had a client who was hit with a Crypto attack which we have now fixed and restored all their data. The infection got on the machine via a malicious link in an email. It then encrypted all of the local files as well as spread onto the network and encypted all of the network shares.

We removed the infected machine from the network and have formatted it back to factory settings so there can be no doubts about it causing another infection.

The client are using a very powerful Cloud Backup solution provided by ITP and we were able to use that to recover the data back onto the server quickly and efficiantly.

https _specials-images.forbesimg.com_dam_imageserve_1144604134_960x0.jpg fit=scale

How can you protect yourself against these kind of attacks?

There are many ways in which people can a Crypto infection onto your PC but the most common one now days is by sending what looks like a perfectly legitimate email out and getting someone to click a link within that email. At this point the local machine is infected along with any network shares.

It is there for extremely important to never click a link in an email unless you are positive that this email in genuine. Some ways you can check to see if an email is legitimate is to check the senders address and make sure that is correct, also check the URL of any links before clicking them by hovering your mouse over them and seeing what comes up in the bottom status bar.

If you’re in doubt, get in contact and we’ll be happy to help. We also provide Cyber Security Training to help train you and your staff against these sorts of things happening.

Sutton Business Awards – 1 Year On

Its almost a year since ITP won both Business of the Year and Best SME at the Sutton Business Awards. And what a year it has been ! Full of challenges and excitement. We can’t change that, so we have been busy building even better and relevant solutions and creating services with our Suppliers and Partners to deliver  technologies and strengthen our existing offerings to enable Businesses to survive and even thrive in the “new Normal”

We’d like to thank all of our clients for their continued support and we look forward to working with new ones in the future.

To chat about how we can help your business navigate the future, Get in contact using the form below, or give us a call on 02039715757

Phishing attacks on Microsoft Teams

What is this attack about?

It has recently been reported that attackers are exploiting the surge in the use of Microsoft Teams in an attempt to trap unsuspecting users. This is being done by emails being sent out with links to a Team’s meeting. When you click the link you will be taken to a spoofed Microsoft page and asked to log in with your Microsoft credentials. This allows the attackers to steal your username and password and then use it themselves.

How can I avoid it?

  • The first and most important thing is never click a link in an email unless you are 100% sure it's legitimate. This goes for any email, not just Microsoft Teams.
  • Check the email sender, often it will be from a random email address rather than Microsoft. Although this is worth checking we must note that email addresses can be spoofed
  • Check the URL of the link in the email. If it's a real Teams link it should start with teams.microsoft.com
  • If you're still unsure, please contact us and we'll be happy to help

What are we at ITP doing about it?

It’s difficult to combat these sorts of attacks as they often look very legitimate and therefore can bypass spam filters. However, the best way to avoid being hit by these kinds of attacks is to be aware of them and know how to avoid them in the first place. ITP offer a range of Cyber Security help and training so please feel free to get in contact if you’d like us to help protect you.