Business Continuity Testing

As per recommended practices ITP recently performed a proactive Disaster Recovery / Business Continuity test for one of our Legal Services Clients.

We were succesfully able to verify that they could work in the event of a datacentre failure . We tested:

  1. the speed of spinning up the redundant protected servers in the cloud
  2. the dissemination of connection details to the test users located at their homes
  3. the ability/speed of the users to connect to the alternate DR environment independently
  4. the usability and responsiveness of critical line of business application and processes

ITP were able to implement additional procedures for processes that needed faster responses and update end user manuals that will be kept with off site pc’s.

The end user was very pleased with the results.

Sutton Business Awards

At a glittering Awards Gala, ITP ‘s awesome team won 2 Awards including Business of the Year 2019 & Best SME, a further Commendation for Innovation and Growth and were finalists in 2 more. Thanks to our team, clients and partners for the amazing journey.

Intel vulnerability – Meltdown

  • It has recently come to light that there is a vulnerability with Intel processors which could potentially give access to sensitive information on your machine via the use of malicious software. This information includes personal details and passwords. Intel processors are in around 80% of machines which can include laptop and desktop PC’s, Mac’s and some mobile devices.

At this moment in time there is no evidence that any malicious software has been written and distributed that can take advantage of this vulnerability, however it’s not something that can be ruled out and ITP would recommend taking the following precautions:

  • Make sure all your Windows / Mac OS updates are installed. There is a patch to be released this Tuesday for Microsoft Windows which should stop the vulnerability and it should be downloaded straight away. If any help is needed with this then please feel free to contact us.
  • Make sure you have Antivirus software which is in subscription and up to date. This is also something we can help with if you’re unsure.
  • Be vigilant when opening email attachments or website links. Always make sure it’s something you trust and if you’re unsure then don’t click it and delete any suspicious emails straight away.

As mentioned in the points above, Microsoft are releasing a patch on Tuesday to fix the issue. Some reports are suggesting that the patch could have a negative impact on the performance of Intel processors, causing anything from a 5% to 30% reduction in performance. Older machines are said to be the worst affected.

If you have questions or concerns about the Impact on your IT from this this or any other IT Matter, feel free to contact us.

Locky Ransomware

One of our Partners sent us over the information below:

On August 9, the first campaign of a massive, worldwide ransomware attack was detected—and 62,000 phishing emails related to the attack have been identified as of last week. This new Locky-variant continues to unfold, powered from more than 11,625 distinct IP addresses in 133 different countries (the top five being Vietnam, India, Mexico, Turkey and Indonesia). As an MSP, here’s what you need to know about this new Locky-variant ransomware and how you can ensure you remain protected against it.

Looking Out for Locky

Locky is a common type of ransomware that emerged in 2016 and has since been utilized in a wide range of cyber attacks. However, this new variant is one we have not seen before. So, how exactly does this variant work?

The main way this Locky-variant is spread is by social engineering. Through phishing emails, users are tricked or induced into opening a docx, pdf, jpg, zip or other file containing the ransomware called “IKARUSdilapidated,” after a phrase that appears in the code string. If the user follows through and opens the attached file, the ransomware then takes over.

From here, all files that match particular extensions are encrypted and filenames are converted to a unique 16 letter and number combination with the .locky file extension. After the files are completely encrypted, users are given instructions for downloading a Tor browser and directed to a site on the dark web where the cyber criminals demand a ransom payment of up to one bitcoin (which equates to over $4,000).

Many endpoint protection solutions have been updated to detect Locky ransomware, however, this variant is able to slip past certain tools because it is so new. Thus, as a new ransomware variant, it is read as an “unknown file” and is allowed entry by organizations not using a “default-deny” security posture (which denies entry to all unknown files until it is verified that they are safe to enter the IT infrastructure), making it more difficult to detect and remediate.

Due to this it is vital that you never open an email attachment unless you are positive you know where and from whom it has come from.

 

Unfortunately, no matter how strong your security solutions, attacks will continue to slip through the cracks. Therefore it’s very important that you have a proper, reliable backup and disaster recovery solution with online and offline backup solutions as the ultimate failsafe against successful attacks.

Please feel free to contact us regarding this and we’ll be more than happy to help.