Top 5 Ways To Prevent Virus, Malware and Spyware Infections

securedownload (1)

Protecting you computer systems from virus, malware and spyware infections is a never-ending game of cat and mouse. Both sides are constantly devising new ways to out manoeuvre each other. Employing the latest, most advanced and up-to-date antivirus software is an important step, but as we advise our customers in Lytham St Annes, there are other ways to help protect yourself.

1: Always Install Quality Antivirus Software

It is not enough to rely on the antivirus applications provided by your Internet service provider. While free and usually included in your bundled service, these types of antivirus software applications do not offer the best protection against virus and malware threats. Windows users should be proactive and use a pro-grade antivirus system that offers better protection through continual updates while the computer is in use.

2. Don’t Forget Your Daily Scans

By conducting daily scans of your PC’s hard drive, you will better protect your overall system from spyware and virus threats. Even the best antivirus software is vulnerable to infection, so the added protection of daily scans goes a long way in deterring malware from getting past your first line of defence.

securedownload (2)

3. Do Not Click on Email Links or Attachments

As much as we rely on antivirus software to protect our PCs from harm, discipline and diligence is required of the user as well. This means resisting the urge to click on the links and attachments we receive in emails. Even emails from trusted sources can be Trojan horse files just waiting for the opportunity to attack our computers. It can take only a minute or two to unleash a torrent of destructive malware that can take down Windows on your machine and others in the network. Attachments should be scanned and links should be keyed into the Browser manually.

4: Be a Smart Web Surfer

Browser plug-ins that come with anti-malware apps should be enabled to offer protection against a variety of threats online. Phishing attackers, for example, attempt to mimic real web pages so they can retrieve your personal data. By enabling features like link protection, you can limit your risk to this type of attack, and other drive-by infections, while you safely surf the Internet. Automatic pop-up blockers are another effective way to protect yourself while online and are included in most browsers.

securedownload (4)

5: Always Deploy DNS Protection

Whenever you are connected to the Internet there is an increase in the risk of infections. A Web page that has been compromised, once visited, can infect not only an individual PC, but all the machines in a network. This poses a risk to customers as well, and that is a gaffe that can be difficult for a business to recover from. Some sites may also distribute infections in the form of applications and files. A service like OpenDNS offers protection against phishing attacks and other viruses by allowing users to change the way their PCs interact with the DNS system.

AGT Computer Services has Answers and Solutions

No matter what your business is, or how many employees or customers you are linked to, whether you are in the Lytham St Annes area or anywhere else the world, you need protection against virus, malware, and spyware. AGT Computer Services can help with all your security concerns, even if it’s just explaining to our customer how to prevent virus, malware and spyware infections.

securedownload

Case Study – Fostering Company Data Security (Tablet Solution Blackpool Area)

The Request…

All businesses have sensitive or confidential data, but some have requirements that go beyond the standard for data security, a fostering company is a prime example of one such business.

AGT were approached to develop a solution where data could be locked down, accessed only by specific users and where documents were only available to be viewed for a certain period of time.

The Analysis…

Discussions with the business highlighted the level of importance of the data security, and that just a password protected document or device would be insufficient in order to maintain the confidentiality of the data. Regardless of the level of security required, Wi-Fi capability would still be needed on the device.

The Solution…

Various types of software were tried and tested with the strengths and weaknesses of each one evaluated as to its suitability towards the requirements. The software must not only be able to password protect documents and data, but also the ability to print had to be removed and an expiry time or date needed to be applied too. Meaning the data would become inaccessible once certain criteria had been met, for example once it had been viewed or once it had reached a specific date or time.

Utilising multi-layered authentication we were able to achieve the level of security the business needed, meaning if the tablet was lost or stolen no data could be accessed and an additional failsafe allowed the tablet to be wiped remotely if there was any doubt it could be compromised.

Once the software was found that met all the required criteria, it was then loaded onto a tablet, configured for testing and presented to the customer to ensure it fulfilled their requirements.

The Outcome…

With the authentication in place, the applications were locked down and the tablet and SD card were encrypted – meaning if someone even tried to hack the tablet using an SD card it would become encrypted and therefore be rendered useless.

Several tablets were loaded and configured with the necessary security requirements and enabled for Wi-Fi access, proving to carry out exactly what was needed. These tablets are now being used throughout the business.

Case Study – Gift Company IT Equipment Office Move Blackpool Area

The Request…

AGT were asked to help accommodate a proposed office relocation for a large company. Where relocations are involved the logistics must be planned down to the last detail, ensuring minimal impact to the business and that any unnecessary downtime doesn’t occur.

The Analysis…

An audit was carried out of the existing office and infrastructure as well as at the proposed new location. This enabled us to clearly identify our involvement as well as highlight any potential problems that may arise or benefits to the business that could be incorporated into the relocation.

The Solution…

With careful planning and liaison with 3rd parties, the preparation stages involved working out the infrastructure requirements at the new office, from the basic cabling and power needs through to the network and phone needs including the procurement of new kit where needed.

It was identified that the business would benefit from some new hardware, with the relocation providing an ideal time to implement this new hardware. This consisted of new, higher specification servers and new VOIP phones.

We arranged for the new site to have three ADSL broadband lines installed, two of the lines to be used for load-balancing and the third line for the SBS/Exchange server. Getting the lines in place prior to the move is essential so that all machines could be plugged in and up and running as soon as they arrive at the new location.

The Outcome…

The relocation was a success. With the infrastructure ready in place at the new location the users were back up and running in no time, along with new virtualised servers running on the network and VOIP phones installed ready to use.

After the work AGT carried out on installation and configuration of the VOIP network, we were granted reseller rights through the VOIP suppliers . Another example of how AGT is constantly building trusted, reliable working relationships within the IT and Data industry.

Case Study – Healthcare Business Upgrade (Server 2003 migration to Server 2012)

The Request…

AGT were asked to come and assess the current infrastructure of a Healthcare business, a large company that was planning further developments and expansions of services within the UK. As with any business in this day and age, especially where expansion is involved, the IT requirements are an imperative foundation which allows a business to function effectively and proactively.

The Analysis…

The business consists of three sites – one Head Office and two remote sites, which together were running a total of eight servers. All servers were using Windows Server 2003 technology and had limited resources which was the first issue to be addressed, especially as mainstream support for Windows Server 2003 ceased in July 2010.

The Solution…

AGT sourced some new, powerful servers and built them with Windows Server 2012 and MS Exchange 2013. In order to retain the data currently held on the servers, they were cohabited with the existing servers to allow a seamless transfer of data, and once complete the old servers were removed and decommissioned.

As well as the server technologies being dated and out of support, the client machines were also running Windows XP, for which Microsoft will be ceasing support in April 2014. Therefore all the client machines were upgraded to Windows 7, added back to the domain and tested to ensure full functionality.

Using bespoke software is very common with businesses and this often means liaising with 3rd party suppliers. AGT spent a lot of time working with external suppliers to ensure the data and functionality of the non-standard software remained intact during the upgrade. Due to the close working relationship that was formed, this was carried out flawlessly.

The Outcome…

Within the timeframe of 3 weeks, from start to finish, the business was brought up to date with current, more efficient technologies. Removing any risk associated with dated or unsupported hardware and software. All work was carried out with the minimum possible downtime, with most of the work being out of hours to ensure as little disruption as possible.

As a result of this the Healthcare business now use AGT Computer Services as their contracted support channel.

Case Study – Large Hotel Wi-Fi / Wireless Setup & Installation Lytham St Annes Area

The Request…

AGT were asked to look at the current Wi-Fi setup at a large Hotel in Lytham St Annes. With Wi-Fi now being a highly demanded requirement of hotel guests, the hotel wanted to ensure that they could suitably accommodate their guests’ requirements and provide a reliable Wi-Fi internet service throughout the entire hotel.

The Analysis…

After the initial site survey it was discovered that the hotel currently had a mixture of wireless networks in place, one of which was starting to fail. Whilst on site it was also noted that the server cabinet and cabling could benefit from being relocated and re-cabled as well as implementing a new EPoS system, so this was also drawn up in the proposed solution.

The Solution…

It was decided that the most efficient course of action would be to roll out a full managed system with multiple Wi-Fi access points throughout the hotel, utilising BT Infinity broadband lines to ensure sufficient bandwidth could accommodate heavy usage by the guests, not just in their rooms but around the hotel as well.

A new web-based EPoS backend server and network was set up on its own VLAN to ensure it had a secure and dedicated workspace. A new network switch was installed and the current till points were re-patched to it.

Setting up the new Wi-Fi system for the hotel could actually be done off-site, meaning all the work could be carried out at the AGT headquarters, then once it had been configured and tested, it could be moved straight into place at the hotel. Thus making the implementation extremely fast with minimal disruption to the hotels day to day working.

The Outcome…

Utilising the many Wi-Fi access points, the hotel guests could now access the internet anywhere within the hotel and the hotels grounds without losing connection. A captive portal (or splash page) was created so that the guests could be authenticated prior to internet access being granted, giving that extra piece of security to the setup of the network.

Case Study – Hotel WIFI / Wireless Installation Blackpool Area

The Request…

Due to the success of the work AGT carried out at the hotel, we were once again approached to carry out work on the hotels brand new expansion project. Situated just 50 metres away from the main hotel, this building required a full technical solution creating from the bottom up.

The Analysis…

With this being a new installation we weren’t forced to use any existing infrastructure, therefore giving us free reign to implement the best, most effective technologies available. This would include a full refurbishment and wiring, wireless network points, VOIP phones, CCTV and a wireless door locking/key-card system.

The Solution…

Working with electricians we helped compose the structure of the cabling throughout the building, forming part of the foundation required for the technologies that were to be installed. Once in place the networks could begin to be built.

As with the parent hotel, access points were installed throughout the new building, once again utilising a VLAN for the wireless connections and VOIP phones that use POE cables to transfer data as well as power.

CCTV with DVR was set up and configured on the network. Part of this configuration allows the CCTV to be checked from anywhere with an internet connection, which enables an excellent element of security.

AGT worked with SALTO Systems to set up and implement the wireless access key-card system for the new building.

The Outcome…

At the end of the project was a plush, technologically advantaged building with full wireless access, a low carbon footprint and exceptional detail right down to the networks chrome faceplates. But what makes this stand out is that this building is unmanned (yet secure) with no server housed on the site. Making this essentially an IT maintenance-free building!

Blackpool, Layton Exchange – Fibre Optic Broadband / BT Infinity date set

 BT troops have been let out to upgrade part of layton’s fiber optic network. Confirmed on thier website, it’ll be available by September 2013.

check out our previous blog post where it explains speeds and how to check for your area.

troops-installing-fiber-blackpool-lytham

avast! Pro Antivirus quick review …

I think Microsoft Security Essentails or MSE has had its day (check out its review from PC Pro) and as a result we’ve decided to give avast! Pro Antivirus a try this month.

It took  less than 24 hours for us to receive a suspicious email:

blackpool maware virus  removal

avast! did the perfect job of detecting and blocking the threat. It’s early days yet but so far the software gets a thumbs up from AGT. If you’re currently still using MSE and would like information on how to purchase  and install avast! then get in touch here or pop into any of our repair shops located in Blackpool and Lytham.

5 types of malware explained

Know your Malware!

You’ve heard the word ‘Malware’ many times before, no doubt. But what does it actually mean?

The word Malware is short for Malicious Software and is a general term used to describe all the different types of Viruses, Trojans, Spyware and all other forms of software that is developed specifically to cause harm to your computer or steal information stored within. Here are some specific examples of the different types of malware:

Viruses

A fitting name for this malware as it is able to spread from one computer to the next, infecting each computer as it travels through via the document or software which it is attached to. It is then passed along through emails, file sharing, networking or external storage devices. A virus can transmit by inserting a copy of itself into a legit program. Once the executable file for the infected software is opened, the virus is executed along with it. The effects of a virus range from annoying effects to damaged data, damaged windows files and other damaged software.

Worms

Computer worms, similar to the nature of viruses in the way that they replicate functional copies of themselves and are known to cause similar types of damage. The difference here is that worms are standalone programs and do not require a host program to infect and execute. To spread, worms exploit network vulnerabilities so make sure your firewall is enabled, locked down and up to date. In the past, worms have been known to have cost billions of pounds worth of damage to business companies.

Trojans

The name comes from the ‘Trojan Horse’. A wooden horse that the Greeks hid inside to infiltrate the city of Troy. A harmful piece of software in a package that is made to look legitimate. Users are tricked into opening a file on their system which can cause attacks such as pop ups, damage to system files, deletion of files, data theft and the infection of other viruses.

Scareware

Scareware is developed to look like a legitimate program that will produce alarming warnings or threat notices. Often mimicking security software to deceive unsuspecting users into paying fee’s to remove fictional malware. It can also be very persistent, not allowing you access over your system while it is active. If you are unsure that you have legitimate security software installed then you are welcome to give us a call.

Keyloggers

A keylogger is a malicious program that can monitor the real time activity of a user on a computer, namely each individual keyboard key which is pressed. These keystrokes are then sent to a malicious individual who can the use this information to steal passwords or credit card information. Detecting the presence of a keylogger can be difficult so we suggest a full format of your computer if this malware is thought to be present in your machine. In fact, due to the serious fraudulent nature of keyloggers.

All types of malware removal are dealt with regularly in both of our Blackpool and Lytham laptop repair shops. If you are concerned that your computer may be infected, then do not hesitate to have your PC health checked and give us a call.

-JS