www.enetsystems.net | email | 281-403-9561

The Latest Ransomware to Beware

Just when we all got a handle on CryptoLocker, a new ransomware has emerged to take its place. In recent months, we've seen a number of clients get infected with CryptoWall, a Trojan Horse virus that gains access to your computer by masking itself inside a program download or an email attachment. Once installed on your system, it makes a network connection with a remote server, generates an encryption key pair associated with your device, encrypts all your files (from a pre-determined list of supported file extensions) performs a few other functions to make restoring your machine difficult, and displays the now familiar message demanding payment in bitcoin for the decryption key.

eNet Systems, Inc.

So what can you do to prevent this? Thankfully, there is much that can be done to both prevent this infection and also to minimize the effect if a computer does get infected.

Preventing Infection from CryptoWall

  • Up to date antivirus and malware software
    Now more than ever, it is essential to protect your system with antivirus and anti-malware software. It's also worth a check to be sure that regular scans are occurring and the definitions are up to date.

  • Safe and smart Internet practices
    When it comes to emails, the same cautions hold true. Don't open attachments unless it's from a known source and something you were actually expecting. A newer caution is to not click on the links within untrusted emails because they can lead to fake and dangerous websites. Simply visiting a page without even downloading anything can infect your computer. And speaking of downloads, only download programs and updates from the original source - never third party providers - those are where Trojan horse viruses lurk.

    Note: eNet Systems offers employee training programs on safe Internet practices. Learn more at 281-403-9561.

Minimizing the Damage from CryptoWall

  • Start a Cloud Backup not just Cloud Storage
    Some people think that as long as their data is in the Cloud, it is safe. Sadly, with CryptoWall, this is no longer true. This virus will track down every mapped drive from your main computer. The mapped drive may lead to an external hard drive sitting in your IT closet or it may lead to your Google Drive storage area in the Cloud. Both locations are susceptible to this ransomware. However, if you make a true backup of your software and store it online, that data will be safe. Talk to your IT firm or call eNet today at 281-403-9561.

  • Routinely check your Cloud backups
    Be sure your backups are functioning properly by testing a data restore on a routine basis

  • Never map drives to critical servers from admin workstations
    Use a software tool instead to make remote connections when they are needed
Photo credit - wisdomforawiredworld.com


Suggestions for iOS 8.1.1 privacy setting

In addition to fixing up to 53 security issues found in iOS 7, this update has a number of new features. We've covered many of these in previous issues, so for this column, we will address some privacy settings that you might want to change when you update.
  • Limit apps from tracking your location in the background
  • Prevent apps from accessing and uploading your data
  • Enable 'Find My iPhone' for lost and stolen devices
  • Prevent sharing your location to others
  • Prevent iPhone location-based tracking
  • Limit advertisers tracking your location and data
Courtesy ZDNET


Google Nexus 6
This first plus-size smartphone from Google features a sharp display and fast processor. It's the most powerful Android out there, but it's also heavier, wider and more expensive than its competition. Read full review.

Here's a tasty tidbit to nibble on during Thanksgiving break

You might not realize this, but the time between Thanksgiving and the end of the year is the busiest time of all for us here at eNet Systems. Why? Well, so many of our clients use this 'slower' time to plan, schedule and implement assessments and upgrades to their technology systems. So what are you doing to get ready for 2015? Email us now and we can share some tips.


We continue to uncover security risk assessments myths.

Myth #7:

"Each year, I'll have to completely redo my security risk analysis."

False. It certainly wouldn't hurt to do so, but it's not required. Each year or when changes to your practice or electronic systems occur, review and update the prior analysis for changes in risks.
Call us at 281-403-9561 to schedule your assessment today.


Apple now requires app-specific passwords for iCloud
Apple has offered two-step verification for iCloud accounts for a while now, but after a recent celebrity photo leak, more changes have been put in place. Apple now secures users iCloud accounts with both two-step verification and app-specific passwords.


Google signs long-term lease on Navy hangar in Silicon Valley

Google has signed a 60-year lease on a former Navy dirigible hangar, NASA said. The Internet company will pay $1.16 billion in rent for access to the 350,000 square foot structure. A Google subsidiary will use the hangar for research and development of technologies related to "space and aviation, assembly and testing in the areas of space exploration, aviation, rover/robotics and other emerging technologies," according to NASA.

AT&T drops plans for in-flight wireless

The carrier will not be bringing its 4G LTE service to the skies citing that in-flight connectivity is too risky of an investment. "We are focusing our capital on transformative investments, such as international and video," ATT said.