Category Archives: PC

  • 0

“How Clean Is Your PC?”

Dear Blast Readers,

 

When it comes to your PC’s Cyber security do you do everything possible to prevent Cyber-attacks and data breaches? Do you use strong passwords? Do you know what constitutes a strong password? Do you avoid any suspicious emails that could lead you into a phishing attack? Do you use two-factor authentication on the accounts that allows you to do so? Have you ever wondered if that is enough? If that is really all it takes to secure your digital information?

 

When you hear the phrase “spring cleaning” you automatically think of cleaning your home. Doing the dishes, sorting cloths, and scrubbing every inch of your home. But, “Spring cleaning” can also refer to cleaning up and separating your digital junk from your valued digital information.

 

If you think that you do not have digital junk, you do. Whether it is old and forgotten email accounts, forgotten thumb-drives, or years’ worth of information in the download folder, everyone has digital junk

 

All unwanted and forgotten files are considered liabilities, a danger to you and your valuable digital information. In the event your digital devices are hacked, stolen, and/or lost, holding onto accounts and files you do not want and/or need opens you up to all kinds of risks. So, cleaning your digital devices is important when securing them.

 

So, where do you start your digital “spring cleaning”?

  1. Address your physical devices. Devices should be cleaned, destroyed, and disposed of properly. Only after you go through all the data and back-up what you want to keep.
  2. Go through your desktop and all your documents. It is important to go through and get rid of any old documents containing personal information, such as: medical and banking information.
  3. Delete any emails you don’t need or want. With your email being the data center of your online life, secure the emails you want to keep and delete the ones that you do not want.
  4. Cancel any account you no longer use. Before deleting any software, clean out and close the account. By doing so, this makes sure the company retains the smallest amount of information as possible about you. It also prevents any more information about you from being collected.
  5. Cancel any email account you no longer use.

 

If you have any questions about Data Security, Cyber Attacks, Cyber Security, or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.


  • 2

“How Your Anti-Virus Can Turn On You”

Dear Blast Readers,

 

Imagine, you are sitting at your computer knowing that you did everything that you could to protect the files that are on it. You bought the best anti-virus software on the market, thinking that this would be your last line of defense. Now imagine the day you find out that your anti-virus software has been flipped and now works for the hackers. No one wants to believe that something that protects them could also be used against them. It is a nightmare when you find out that your anti-virus software is a double agent working for the hackers.

 

An Anti-Virus software is a computer program that is used for scanning, identifying, and removing viruses from your computer. Primarily, they are used to protect your computer. Now, image that this program that has access to all your files has gone to “the dark side” and has provided unfettered access to hackers. This type of attack used by hackers is called a “Double Agent” attack.

 

A “Double Agent” attack is an attack that takes over the anti-virus software of PC computers running Windows. This type of attack is performed by hackers. Once in control of the anti-virus software the hacker converts the anti-virus software into malware. The malware then acts on the hacker’s behalf to encrypt the files on the computer holding them for ransom.

 

A “Double Agent” attack can compromise the 14 major anti-virus software available. This type of attack can easily be executed by someone working out of their parent’s basement or a 13-year-old script kid. The way in which these individuals would infect a computer with a double agent attack can include having the user:

·        Access Malicious URLS

·        Download Malicious Attachments

 

To prevent the “Double Agent” attack from occurring, organizations and businesses should:

·        Monitor for spoofed emails.

·        Set up administration controls to prevent downloads from unknown sources.

·        Regularly update anti-virus software in all systems.

 

If you have any questions relating to “Double Agent” Attacks or Computer Forensics and Cyber Security contact FDS Global. You can reach us at your office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.