Anti Virus Scams

Antivirus Software scams claim that the recipient's antivirus software is out of date, and provides convenient links allowing them to renew. The problem is, their software isn't out of date at all.

It's easy to understand why the scam works, but that makes it no less despicable.

If you know anyone who isn't especially computer savvy and you feel they might fall victim to a scam like this, here is what to do. Gently remind them that whatever antivirus software they're using, the software itself will remind them when it's about to expire. There is no email needed, and before they spend any money, it's better to do some checking to verify that their expiration date is approaching. Call us here at AIM Services 800.275.1353 and let us help.

We may not be able to keep these scammers from ripping people off, but we can certainly put a dent in their profits, and that's a very good thing.

NordVPN Confirms Hacking

NordVPN a virtual private network provider was hacked. VPN providers are increasingly popular as they ostensibly provide privacy from your internet provider and visiting sites about your internet browsing traffic. That’s why journalists and activists often use these services, particularly when they’re working in hostile states. These providers channel all of your internet traffic through one encrypted pipe, making it more difficult for anyone on the internet to see which sites you are visiting or which apps you are using.
More Information

Experts expect hospital ransomware attacks to continue

 Image result for healthcare ransomware

One week after being hit by a ransomware attack, hospitals in Alabama are turning away patients while working on recovery, and experts warn of similar attacks in the future.

One week after being hit by ransomware, several hospitals in Alabama are recovering, though experts believe similar attacks will continue.

Hospital ransomware attacks hit three facilities that are part of the DCH Health System in Alabama on Oct. 1 and despite paying the ransom, the "methodical process of system restoration" of the thousands of affected systems continued on Monday.

 "We have been using our own DCH backup files to rebuild certain system components, and we have obtained a decryption key from the attacker to restore access to locked systems," DCH wrote in an update on Saturday. "We have successfully completed a test decryption of multiple servers, and we are now executing a sequential plan to decrypt, test and bring systems online one-by-one.  This will be a deliberate progression that will prioritize primary operating systems and essential functions for emergency care."

DCH spokesperson Brad Fisher told media outlets Saturday morning that the ransom was paid, but did not disclose the amount or when it was paid. DCH also did not put a timetable on how long restoration would take. As of another update on Monday, the hospital ransomware attacks were still causing the affected facilities to turn away non-critical patients.

Experts said hospitals will continue to be the focus of ransomware because they tend to be more likely to pay ransoms in order to restore operations as quickly as possible.

Shawn Kanady, director of digital forensics and incident response at Trustwave SpiderLabs, said he believes "hospitals will remain a top target for ransomware for the foreseeable future."

"Not everyone is paying, so attackers want to hit institutions or companies that are going to hurt the most because they'll be put in a position where they'll have to pay, like hospitals or city municipalities," Kanady told SearchSecurity. "Locking down vital systems in a hospital could literally mean life or death. Imagine a hospital not being able to perform emergency operations because patient records and the databases housing them are fully encrypted."

Felix Rosbach, product manager with data security company Comforte AG, based in Weisbaden, Germany, added that even if hospitals have a backup strategy in place, "the resources needed to do a complete rollback after threat actors have performed a successful ransomware attack can be higher than paying a ransom."

"While it's never a good idea to pay a ransom, hospitals depend on their infrastructure and sometimes need access to some of their systems urgently. This results in hospitals being sought-after targets for ransomware attacks -- even if those attacks are one of the most reprehensible ones," Rosbach told SearchSecurity. "Keeping that in mind, healthcare organizations are required to implement strong cybersecurity and data protection. Not only are healthcare records and PII data very sensitive, business continuity becomes a significant factor when it comes to medical treatment."

Gerrit Lansing, field CTO with Stealthbits Technologies, noted that beyond the risks to patients, hospital ransomware attacks may continue because hospitals don't have the resources to protect themselves.

"Economically-motivated crime will continue to increase, and hospitals and healthcare organizations remain prime targets," Lansing told SearchSecurity. "Many hospitals and healthcare organizations lack the resources -- namely the funding and staff -- to address these vulnerabilities with the same force as the major enterprises, which is precisely why they remain favored targets."

Backup Data Even When Using Cloud Services

Backup Still Necessary Even When Using Cloud Services

Do you keep all of your data on the cloud? If so, you're certainly not alone. The past few years have seen a massive migration away from storing critical files locally to placing them on the cloud, where they're more secure and accessible from anywhere you can get internet. In fact, many people are so comforted by the amorphous nature of the cloud that they use mass file storage there as a substitute for making regular backups.

If you're one of the millions of people doing exactly that, you may want to rethink. Recently, author and programmer Andy Hunt tweeted about an Amazon outage that cost him the files he had stored on the cloud when the company experienced an outage. His tweet reads as follows:

"Amazon AWS had a power failure, their backup generators failed, which killed their EBS servers, which took all of our data with it. Then it took them four days to figure this out and tell us about it. Reminder: The cloud is just a computer in Reston with a bad power supply."

Cloud based companies often tout their virtually bullet proof up-time and the low failure rates as big selling points for their services. While those things are undeniably true and accurate, what Andy said is also true. At the end of the day, what we blithely call 'The Cloud' is just a series of computers located somewhere else. Unfortunately, those computers like the one on your desk are prone to catastrophic hardware failures.

That's why it's important that even if you're using the cloud extensively for your most important files, you also take the time to make backups on a regular basis. Cloud storage isn't the best solution, and it certainly shouldn't be seen as a substitute for robust backups.