Binswanger Management Corporation

Binswanger Managed IT Services and Support, CIO Servicesquotation bubble

“It is not often that you get asked to do a favor and you actually enjoy doing it. You have asked me to share my experiences working with your organization and it is my distinct pleasure to do so.

Binswanger Management Corporation established a relationship with ITData three years ago. At the time, Binswanger was struggling with a number of IT initiatives that had stalled as well as an IT infrastructure that had not kept pace with the needs of the business and technology. After a very brief integration period, you and your colleagues became an integral part of the IT operations of Binswanger. ITData provided Binswanger with staffing, systems and an IT project plan to upgrade the Company’s IT Infrastructure, protect data integrity and implement best practices. Additionally, ITData took ownership of the uncompleted IT initiatives and was instrumental in seeing them through to completion.

ITData is now positioned as a business critical resource in the operations of Binswanger. Throughout the tenure of the relationship, you have provided the Company with both best in class systems design and configuration, as well as policies and procedures to effectively execute the strategic plan you have created for the Company’s IT function. You and your colleagues are very responsive and thorough and have added tremendous depth to many facets of the operations of Binswanger.”

Peter D. Miller
Executive Vice President, Binswanger

Tips from the Help Desk: GodMode Management Feature

Omnipotent Windows 10 Management Featureapplication-icons-computer-technology

Millions of people have now taken advantage of Microsoft’s free upgrade and are running the Windows 10 OS. Windows has some new features that make management an easier process. Windows now has a hidden feature called “GodMode” that allows for easier management. In GodMode a user can view and manage over 262 different settings all in one view. Add printers, uninstall programs, schedule de-frags, customize your layout and restore to a backup all in one place.

To set up this folder for yourself just right click the desktop and select “new folder” and rename the folder GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}. The folder will take on the appearance of the control panel icon and you can now manage your PC from a central location. Enjoy the easy access to all of the built in management tools in one view.

Contact ITDATA today if you need help managing your Windows environment.

Zachery Albeitawi
Help Desk Technician, ITDATA, Inc.

Tips from the Helpdesk – The Good, The Bad and the Browser Extension

The Good, The Bad and the Browser Extension

GHOSTERY

When downloading files from the internet, many of us have a healthy suspicion of what we are downloading. We can check the file name and run scans on downloads to ensure integrity of the download. However, these healthy habits do not translate over to browser extensions for many of us. Extensions are very easy to add on, and seem safe enough. Unfortunately many companies have been exposed to be pre-loading their extensions with tracking software. These companies then sell your browsing history to the highest bidder. The website “How to Geek” exposed multiple extensions and add-ons that have known trackers built in, check out the somewhat outdated list here. If you are using an extension that is on the list, delete it.

If you would like to download a beneficial add on that lists and blocks all trackers on any website you visit, join the 2 million people already using Ghostery. Ghostery will show you every tracker, including Google, attempting to mine your data. Keep your browsing history and personal data safe and secure with these quick solutions.

Contact ITDATA today if you are in need of higher level internet security.

Zachery Albeitawi
Help Desk Technician, ITDATA, Inc.

Urgent Alert for Businesses Using Gmail

scam alertAn Attempt to Capture Credentials

If you receive an email with the subject “VALIDATION Required for” with a “Continue with Verification” link that redirects you to what appears to be a Google Sign In page, do not click on the embedded link or enter your information.

A member of our team recently received a phishing email appearing to be from Google, requesting verification.

unnamed

This is an attempt to harvest log in credentials.  Take note of the “From” line in the phishing email.  Both Google and gmail in the email address are spelled incorrectly.  The salutation is from “The Adrnin tearn” instead of “The Admin Team.”

Noticing these small details can be helpful in spotting phishing emails and avoiding being scammed.

Please share this alert with your business colleagues that you think could be affected. If you are unsure of how this email phishing tactic pertains to your company, feel free to contact us to receive more information.

Tips from the Helpdesk: Flash Problems in Internet Explorer

Having Trouble Viewing Streams in Internet Explorer?flash_player_11_icon_rgb

If you have experienced issues with streaming video in Internet Explorer 11 in Youtube or elsewhere on the internet, you are not alone. If you have to be in Internet Explorer to run a certain application for work, this can be a frustrating issue to deal with. One quick fix is to enable ActiveX Filtering. This will block certain apps and content from loading in the browser. By default ActiveX filtering is turned off. Enable it by going to tools- scroll down to the ActiveX filtering tab and release to enable. Restart Internet Explorer and hopefully your stream now works.

If you can pinpoint when the issue started occurring you may be able to narrow it down to an Adobe Flash upgrade. Before you revert back to an older version of Flash that you know worked, first make sure there is not a newer update that you need to install first. Adobe usually catches these issues and will release a patched version so check to make sure before you revert back. If you end up needing to revert back, check out Adobe’s guide here.  To see which version you have installed click the gear icon a the top right and scroll down to “Manage Add-ons”. Click on “ Toolbar and Extensions and click on “Shockwave Flash Object”. You should be able to see the version listed at the bottom.

Another solution is to turn off Enhanced protected Mode in Internet Options. Go to the gear icon in the upper right hand corner and click on Internet options. Click on the Advanced tab and then scroll down to the Enable Enhanced protected Mode check box.

The last option is to add the website you are having problems with to the Compatibility View Settings list. To do this go back to the gear icon and choose Compatibility view settings. Add the website you are using. If you are stuck using IE for a specific application and are not able to use it, try these solutions to be able to view your stream.

For more information about how we setup networks to avoid small glitches like this  Contact ITDATA today.

Zachery Albeitawi
Help Desk Technician, ITDATA, Inc.

 

Tips from the Helpdesk – Ensure File Integrity by Comparing Hashes

Ensure File Integrity by Comparing Hashes

Buying-Tips-for-Performance-Appraisal-Software

Downloading a program off of the internet these days is all too easy. Often times you may go through two or more websites trying to find a good file that is not corrupt, or has not been altered in any way from the original. Saving documents onto a shared drive at work may feel a little less secure than you would like. How do you know that the file was not altered while you may have been away? Luckily most files and programs have what is called a “digital signature”. When someone wants to ensure that a file is not altered from when they last utilize it, they can input a hash algorithm to the file which will generate a unique key of different characters. You can then compare this key with the digital signature of the file or program when you come back to it to make sure that nothing has been altered. If the file has been altered in any way, the hash value will be completely different, no matter how small or large the change might be. This ensures file integrity, a key concept in IT security.

Many companies already offer their hash values so that users are not fooled into downloading files that may contain malware. Microsoft offers their hash values to be compared with the file downloaded.hashtools-1

If you are using  a windows machine and want to start generating some hash values for your documents and programs, you need to download a third party software to generate and compare hash values. There are many options on the market, a very easy one to use is called “Hash my files” and can be downloaded here https://www.raymond.cc/blog/download/did/1823/. You can also generate hash values for your own files at home or work, to make sure that no one is altering important documents without your approval. Many times you can find a hash value of a program or file and copy and past it into a browser like Google. If it is a common file, the search results may be able to tell you that the file is known to have malware attached to it. Spending a few minutes researching a hash value before you click the download button may save you hours of battling a Trojan virus or other malware. You don’t have to be an IT forensics specialist to utilize this great tool to keep your files safe.

For more information about file hashing and data secure, contact ITDATA today.

Zachery Albeitawi
Help Desk Technician, ITDATA, Inc.

New Android Malware Alert

Two New Kinds of Android Malware: SlemBunk and Marcher

May 2016android-antivirus

ITDATA’s cybersecurity partner, Layer 8 Security, has an on-going relationship with local and federal law enforcement. We receive bulletins from the FBI on a continuous basis. We are sending this alert because it is important to us that your company stays informed on the latest cybersecurity updates to keep you and your business protected. If you have questions or concerns regarding this alert please contact us at sales@itdata.com.

The FBI has identified two new kinds of Android Malware; SlemBunk and Marcher -designed to target US financial institution customers. These two bugs are phishing for specified US financial institutions’ customer credentials. The malware monitors the infected phone for the launch of a targeted mobile banking application to inject a phishing overlay over the legitimate application’s user interface. The malware then displays an indistinguishable fake login interface to steal the victim’s banking credentials. It defeats two factor authentication by its ability to monitor SMS (Short Message Service) messages. This also obscures the cell phone as the source of the infection. The Slembunk malware infects social media phone apps as well as instant messaging apps, using the same fake login overlay to collect data.

The malware is downloaded to the phone in one of the following ways: 

  • SMS or MMS phishing, with messages requesting the user to install malicious Adobe Flash Player software
  • Malvertisements or pop-ups from an adult website prompting the user to download malicious Adobe Flash update
  • Mobile applications downloaded from third-party vendor sites
  • Phishing emails

For further details regarding this alert and recommended cyber hygiene protocol to avoid infection please see our blog, Savvy New Android Malware – Buyer Beware.

For more information about avoiding malware and system security, Contact ITDATA today.

Security Insights: Speeding Ticket Spear Phishing

Security Insights: Speeding Ticket Spear Phishing

Spear Phishing Alert – Wednesday, May 4, 2016fake-speeding-ticket-email

There is a new local email scam: fake speeding tickets. The spear phishing email appears to be a speeding ticket. Several people in Tredyffrin Township have received emails which appear to be from their local police department. The emails contained accurate driving information: date and time, speed, license number and street address. Even more shocking, the drivers were actually speeding on the dates and times listed in the emails, which demands payment through an attached link. There is no apparatus for payment, instead the link downloads malware onto the user’s computer.

Authorities suspect the accurate information is being obtained through a traffic app which tracks a smart phone’s GPS data. It is believed the hacker was able to exploit a security flaw but it is still unclear exactly how the app is able to access this data.

The Tredyffrin Police Department warns that “citations are never emailed or sent in the form of an email attachment.” Scam Alert Speeding Ticket Email Scam – Tredyffrin Police Department

Please contact ITDATA to discuss ways to help your team avoid downloading malware, ransomware or other malicious software that can negatively impact your technology.

Related Links

A New Scam Sends Fake Traffic Tickets to Speeding Drivers – Yahoo Finance

Tips from the Helpdesk – Reduce the attack surface of your computer through system hardening

Reduce the attack surface of your computer through system hardening

Internet security.Laptop and opening safe deposit box's door.

Computers are capable of performing a seeming infinite amount of tasks. They are made to be adaptable and capable to open and execute many different programs and applications. Unfortunately this is also the reason why your machine may be susceptible to a malicious attack. Every application that is installed on your machine is door to your data and the network it resides on. If these applications are not kept up to date with patches, hot fixes and new versions, then these doors may be wide open to anyone strolling along the internet. Keeping up with the bad guys is a constant process.

Ever wonder why Adobe needs to be updated so much? In most cases it is not because there are new features to the application, but because they are trying to fix vulnerabilities in their code so that hackers do not take advantage of an application that is installed in nearly every organization. On April 5, 2016 Adobe released a security advisory citing a critical vulnerability in their latest version of Flash Player 21.0.0.197 and any version previous to version 21.0.0.182.  If you have been ignoring an adobe update for the past few weeks, make sure to update it now. This is not a new issue for Adobe’s Flash player. If you do not use Adobe Flash, delete it from your system. Don’t just delete Adobe though, delete anything that you don’t use frequently.

A large part of system hardening is deciding what applications that you use and what you can delete. If your computer is for work purposes, this may already be done for you by your system admin. If not, you should go through your programs under “Control Panel\All Control Panel Items\Programs and Features” and uninstall anything you don’t use frequently. If you need to use the application you can always install the latest version which will be safer than falling behind on patches and updates. Watch out for add-ons when you install a new browser such as Adobe or Chrome. Often times you must remove the check mark on a box if you do not want a Yahoo toolbar or some other program installed along with what you were intending on installing. This is another good reason to skim through your installed programs, you never know what piggybacked onto your latest installed program that needs to be removed.

By removing unwanted programs, you are decreasing the “attack surface” of your machine. By removing these programs you are making it very difficult for a hacker to find a vulnerability in your system. System hardening and regular virus scans can help to ensure that your data and your company’s data stays secure.

For more information about our system hardening procedures and keeping your companies data secure, Contact ITDATA today.

Zachery Albeitawi
Help Desk Technician, ITDATA, Inc.

New Tech Support Scam

Social Engineering Alert – A Call Regarding Hacked Email Account, April 2016

Scam Computer Keys Showing Swindles And Fraud

The Federal Trade Commission’s Division of Consumer and Business Education is warning consumers of a new tech support scam. The FTC has received reports of individuals getting calls from someone claiming to be from Global Privacy Enforcement Network – a legitimate organization known to work with various governments. The caller informs you that your email account has been hacked and is sending fraudulent emails. They threaten to take legal action, unless you allow them remote access to your computer in order to fix the problem immediately.
If the caller raises questions, the scammers have been known to increase pressure and give FTC’s staff numbers for further authentication.

  • The FTC advises that you keep the following points in mind when receiving a tech support call:
  • Don’t give control of your computer to anyone who calls offering to “fix” your computer.
  • Never give out or confirm your financial or sensitive information to anyone who contacts you.
  • Getting pressure to act immediately? That’s a sure sign of a scam. Hang up.

If you have concerns, contact your security software company directly. Use contact information you know is right, not what the caller gives you.

For further details regarding tech support scams and government imposter scams please visit the Federal Trade Commission website or contact us Contact ITDATA today.

1 2 3