Protect data from ransomware

Protect data from ransomware attacks to your systems. You have probably heard of computer malware, however have you heard of ransomware? It’s what criminals use to target the data in your business. Your system and data are crucial to your business. Don’t gamble with your security. Make sure your business is protected from the outside world.

Ransomware is a form of malicious software placed on your devices. It locks you out of your data and it is terrifying. The criminals will then demand cash to unlock your data. Every business  should protect data from ransomware, as it is at risk all the time. Hackers use automated tools to sniff out opportunities.

Our new video has three ways you can protect your business from ransomware.

Hackers can force victims to pay a ransom to regain access. It can infect your computer when you download an innocent-looking email attachment. If you visit a website that secretly executes malicious code. This ultimately encrypts critical files or denies access to the computer. The two main forms of this malware are currently widespread:

  • Blocker ransomware locks users out of basic computer functions. For example, it might deny access to your desktop by partially disabling files the computer uses to boot. You could still use your computer to pay the ransom, but otherwise it would be useless. The good news? Locker malware typically avoids encrypting critical files in favour of simply locking you out, meaning there’s less chance of total data destruction.
  • Crypto ransomware encrypts your critical data — documents, photos, and videos — while leaving more basic computer functions untouched. Crypto creators often include a countdown in their ransom demand. Many users ignore or don’t understand the importance of backing up files to an external storage device, so they often choose to pay the ransom because they can’t see any other way of getting their files back.

How to respond to ransomware attacks

Unfortunately, ransom malware is here to stay. What if you have already become the victim of a ransomware attack? If you’re concerned about ransomware, need to update your security, or need any assistance properly backing up your data, get in touch. Contact The LIS Help Desk today to talk to one of our team to make sure your business is protected.

#ransomware #beware #FreeInfoVideo

Location Monitoring

We announced last month that Lodge Information Services (LIS) launched its latest product The Office 365 Security Package. This is final part of the package, focusing on Location Monitoring.

One of the biggest concerns within any business is IT security. The rising use of the cloud and mobile devices has bought with it cost savings. As a result, there are increased data security risks. Take a look at our latest video below for more information.

Automatic alerts are sent to the LIS Help Desk whenever a login is spotted from a suspicious location. What’s more, LIS can choose the zone you want monitoring based on country, region, city or IP address. Exclusions can also be added for example if an employee is on holiday or working away from the office. It’s in our control! If we detect any changes, we will obviously inform our clients.

Our Office 365 Security Package is a bundle of software tools

The package works continuously on Microsoft Office 365 accounts. They provide genuine protection benefits that EVERY business ought to have. We manage EVERYTHING for you. It’s all in our hands, which is exactly how it should be. Giving you peace of mind to allow you to concentrate on your business.

Download our Office 365 A Risky Business booklet to find our more.

Track login access for your employees when they are abroad. With location monitoring there is no time to waste. You can change the password straight away. This ensures your data is safe to attacks from the outside world. Location monitoring will help your business control cybercrime and your staff’s security.

LIS can help your company to protect your IT system. As a result, making sure the outside your team have the right access. Giving you peace of mind that your files are safe. We take care of your IT security to enable you to concentrate on your business!

Contact us to make sure you are protected.

Google Malware Threats

Google has been busy removing malware threats from Google Play, but now they’re back. Here’s what to watch out for take a look at this recent article about Google Malware Threats. So, how has this happened? Google Malware Threats can steal sensitive information or send fake emails from a user’s email account. This often happens without the user’s knowledge.

Contact the LIS Help Desk to discuss our latest Office 365 Security Package, Anti-Virus and Anti-Spam software solutions.

Google Malware Threats

Android malware authors have been relying on a solid trick for bypassing Google’s security scans and sneaking malicious apps into the Play Store.

Almost 2 billion malware installs thwarted by Google Play Protect in 2019

Strengthened app safety policies, a better developer approval process and enhancements to its machine learning detection system made the Google Play Store an even more secure place last year, according to Google.

“Last year, Google Play Protect also prevented more than 1.9 billion malware installs from non-Google Play sources,” Google Play Product Manager Andrew Ahn. He wrote in reference to Android’s built-in threat protection tool. The figure represents an increase from 1.6 billion malicious apps from outside of the official Android storefront that were blocked.

A new Android marketplace policy introduced in 2018, also recorded a 98% decrease in apps accessing users’ SMS and call log dat. The remaining 2% require access to data in order to perform core functions. (In some cases, the new policy affected legitimate services from using SMS permissions for security, privacy and safety reasons.)

The tech giant also ramped up its protection against malicious apps. It praised its collaboration with partners in the Android App Alliance, of which ESET is an inaugural member. Enhanced vetting mechanisms helped Play Protect stop over 790,000 policy-violating apps from being published to Google Play. The store’s threat protection service now scans over 100 billion apps every day. This allowed it to double the number it scanned in 2018.

More improvements required

Other improvements include a new policy aimed at protecting children and families. This led to the removal or updates of tens of thousands of apps last year. The policy introduced new requirements concerning the disclosure of Personally Identifiable Information (PII). As well as the suitability of content and adverts for children.

Having said all that, Google stressed that there’s more work to be done. They reiterated its commitment to enhancing users’ privacy and security.

All things considered; you can always take several easy steps that will go a long way towards beefing up your protection. These include being cautious about the apps you install. Be carefull especially – but not only – from outside the Play Store. Users need to pay attention to the permissions that the apps request. Maake sure you have a reputable mobile security solution installed on your device.

Contact the LIS Help Desk to make sure your protected, stay safe and be secure!

#GooglePlay #MalwareThreats #AndroidUsers

 

Entertain The Children

How to you entertain the children whilst working from home? Guilty of giving your children your phone to watch YouTube for 5 minutes while you try to complete some work? Well now you can do that without them opening 100 other apps and calling your Grandma. Look at this cool trick to entertain the children.

https://www.thesun.co.uk/tech/11607292/iphone-lock-touchscreen-ipad-kids-cat-pet-how

It means parents can hand an iPhone to their kids to watch a YouTube video without fear of them getting into the phone’s other apps. The setting can be found in any iOS device, so it works with iPads as well. The trick was shared on Facebook where it quickly picked up thousands of likes and shared more than 128,000 times.

Entertain The Children

Parental controls. Have peace of mind that your children are safe without them having access to all your apps.

How to use Guided Access to lock an iPhone touchscreen

If you have an iPhone (or iPad) go into the Settings menu and find the ‘General’ tab. Scroll down to Accessibility and tap it, then go to the bottom to find the option to toggle on Guided Access. Once you’ve toggled it on, all you need to do is triple-click the power switch (or Home button if you’re using an older iPhone or iPad) to enable it. Now you can hand the phone over to your partner, child or pet without worrying about them poking and prodding through your phone.

Other iPhone Hacks You Never Knew About

There are dozens of cool iPhone features hidden beneath the surface that you probably weren’t even aware of and not just the knowledge that cat litter can bring your phone back from a watery death. Readers Digest have recently published some other iPhone Hacks might not know about. Check out full article click here.

If you would like to discuss the latest technology, phone systems, laptops or computers for your business contact us. The LIS Help Desk are more than happy to help you with your requirements and troubleshooting.

#iPhoneHack #5MinutesOfPeace #LockScreenForKids

Admin Forwarding

We announced last month that Lodge Information Services (LIS) launched its latest product The Office 365 Security Package. This is part three of the package, focusing on Admin Forwarding.

One of the biggest concerns within any business is IT security. The rising use of the cloud and mobile devices has bought with it cost savings. As a result, there are increased data security risks. Take a look at our latest video below for more information.

 

Get notifications when a new admin account or changes are made to Office 365 accounts with admin forwarding. This ensures you are in control of your data and documents. Impressive!

LIS act fast, with a simple click of a button the LIS helpdesk will advise you of any changes that are detected. We will also email you weekly reports about any admin changes to your accounts

Our Office 365 Security Package is a bundle of software tools

The package works continuously on Microsoft Office 365 accounts. They provide genuine protection benefits that EVERY business ought to have. We manage EVERYTHING for you. It’s all in our hands, which is exactly how it should be. Giving you peace of mind to allow you to concentrate on your business.

Download our Office 365 A Risky Business booklet to find our more.

Track admin login access for your employees. With admin monitoring you do not need to remember when they have logged out. Do not worry if you have not turned permissions off as we will alert you. Your team will have access to data at the right time, ensuring your company files are safe and secure.

LIS can help your company to protect your IT system. As a result, making sure the outside your team have the right access. Giving you peace of mind that your files are safe. We take care of your IT security to enable you to concentrate on your business!

Contact us to make sure you are protected.