CONTACT US

1300 89 22 00

white x 

Blog
How to tell if you have been infected with malware!   We have written articles on how to spot potential malware and even the 10 top ways to avoid being infected. Unfortunately, as we have seen time and time again, sometimes, these nasty & malicious emails catch us off-guard. Time is of the essence when infected, so if you experience any of the below symptoms, please call IT support ASAP and shut down the power to your machine.  Here are 12 symptoms of malware.  Your computer slows downnnnnnnnnnnnnnnnnnnnnnn Your computer freezes Pop-ups Your computer crashes Suspicious Hard Drive Activity Running out of Hard Drive Space Unusually high network activity New Browser Homepage, new toolbars and/or unwanted websites accessed without your input Unusual messages or programs that start automatically Your security solution is disabled Your friends/colleagues tell you they are getting strange emails from you Encrypted files   Please feel free to write or call 1300 89 22 00 with any questions. The ITConnexion Team
Friday, 13 January 2017 09:34

5 Common Traits of Malware

5 Common Traits of Malware   In 2016, we saw a dramatic increase of infected computers due to the malware (aka Cryptolocker).  Below are some common traits of Malware to look out for. Please share this article with your fellow colleagues so you and your friends don't become the person who shuts down your office. Zip files Fake sender email address Disguised links or buttons Request or threat of urgent attention Too good to be true offers Here are some real-life examples of Malware. Some are very professional-looking, so if in doubt, don't click or open any attachments. As always please call our IT support team for any advice on 1300 89 22 00.     Please feel free to write or call 1300 89 22 00 with any questions. The ITConnexion Team
This article has been created with the employee in mind, in particular the Administration or Finance Teams. Unfortunately, we are seeing a rise in phishing attempts that target individuals within organisations. These emails are designed to appear as normal internal communication and any staff in the management and finance area should be particularly mindful of the source of any fund transfer requests. There are emails currently circulating where the senders name is being forged (spoofed) so as to appear to be from a legitimate and familiar name, the following is an example of how such an email header appears: On close examination you will note that there is a “Reply-To” field below the “Subject” that shows the real senders email address. Also note, that the "Reply-To" field may not show. Therefore it is also important to always check once you hit reply and before you send, that the reply email address is the email address you intend to send to (that is it doesn't change to an unknown suspicious email like the one above). These emails are Phishing attempts designed to make you believe a request for funds or information is from a genuine and trusted source. To learn more or to report this type…
3 ways to decrease your cyber vulnerability Unfortunately, companies are experiencing a rise in cyber attacks. While there is no sure fire way to protect against cyber criminals, there are simple measures your business can take to help safeguard and reduce your risks. At the moment, most companies are sitting targets. In order to protect your business, you need to make it more difficult for criminals to attack. So here are 3 methods you should employ: # 1. Get the right technology working for you Installing the right anti-virus and anti-spam goes a long way to protecting your machines and servers. This may seem common sense, but surprisingly, not everyone implements these simple measures. # 2. Streamline IT Security Updates THEN once, you have properly installed the technology security measures. Now it's time to monitor them and keep them up-to-date. Cyber criminals are continuously finding new ways of stealing data and holding companies to ransom. So regularly updating (aka "patching") your security technology is imperative. # 3. Staff policies and education Employee education is half the battle. As Business Managers you are responsible for keeping employees up to date on the latest email scams and how to avoid them. Another…
Page 1 of 3

Socialise with us

Back to top