Home
About
Contact Us

Home>blog
Wed, 21 Aug 2019/

Fileless malware: Are you at risk?

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorised protocols to carry out malicious activities such as unauthorised data retrieval or data damage. It therefore pays to stay abreast of such threats. What is fileless malware? Fileless malware is stored in random access memory (RAM) instead of on the hard drive. In a typical fileless infection, payloads can be injected into the memory of existing software or applications by running scripts within whitelisted or authenticated applications such as PowerShell, which is designed to automate system administration tasks such as view all USB devices, drives, and services installed in the system, schedule a series of demands, or terminate processes (i.e., Task Manager). Because there are no files to trace, fileless malware escapes detection from most antimalware programs, especially those that use databases of precedents. Furthermore, most automated sensors cannot recognise illicit scripts, and cybersecurity analysts who are trained to identify them usually have a difficult time establishing where to start looking. Fileless malware isn’t as visible compared to traditional malware. They employ a variety of techniques to stay persistent, and can adversely affect the integrity of a business’s process and the infrastructures that run them. Fileless malware by the numbers Cybersecurity firm Kaspersky Lab first discovered a type of fileless malware on its very own network a couple of years ago. The final verdict was that it originated from the Stuxnet strain of state-sponsored cyber warfare. The high level of sophistication and government funding meant fileless malware was virtually nonexistent until the beginning of 2017. In November 2016, attacks using fileless malware saw an uptick of 13% according to a report. In the same quarter, attacks surged 33% compared to the first quarter. During the first quarter of 2017, more PowerShell-related attacks were reported on more than 12,000 unique machines. Kaspersky Lab uncovered over 140 infections across 40 different countries. Almost every instance of the fileless malware was found in financial institutions and worked towards obtaining login credentials. In the worst cases, infections had already gleaned enough information to allow cyberattackers to withdraw undisclosed sums of cash from ATMs. In 2018, cybersecurity firm Trend Micro detected a rising trend of fileless threats throughout the first half of the year. Is your business at risk? It is unlikely your business would have been targeted in the earliest stages of this particular strain of malware, but it’s better to be safe than sorry. Businesses should practice defense in depth, where multilayered safeguards are implemented to reduce exposure and mitigate damage. But apart from cultivating a security-aware workforce, what actionable countermeasures can organisations do? While your business might not be in immediate danger, you should employ solutions that analyse trends in behavior. It is also wise to invest in a managed service provider that offers 24/7 network monitoring, proper patches, and software updates. If you have any questions about Malware and how you can protect your business, please contact Multi IT today or give us a call on 011 435 0400.
VIEW MORE
Wed, 14 Aug 2019/

The dangers of the web and how to stay safe

You probably go to great lengths to keep yourself safe, whether at home or in public. But what happens when you get online? Learn more about how you could be exposing yourself and your personal information over the internet so you can stay safe. Staying up to date with Online Security is key. With the headlines about data breaches and cyberattacks greeting you every time you go online, it seems impossible to have a surefire, foolproof way to keep your information secure. Sometimes cyber predators are relatively harmless, but oftentimes, their goal is to steal identities and financial information. Virus scanners and firewalls can definitely help, but here’s an added layer of protection when you go online. What is private browsing? Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — stores the addresses of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded. This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see. With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed during a private browsing session is discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window. Private browsing also prevents cookies from being stored on your computer. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies. Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log in to two different Google accounts at the same time. Limitations of private browsing Although private browsing does prevent your web browser from storing your data, it doesn’t keep your online activities 100% private. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing, even if you’re in Incognito Mode. Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online. A keylogger malware records every key you punched in and may send this information to a predefined email address without you knowing. This means passwords, answers to verification questions, account numbers, credit card details, or even the words you type in a chat can be emailed to someone spying on your online activities. Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy. Your computers and mobile devices must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay. If you want to know where you can get these solutions or learn more about online security, please contact Multi IT today or give us a call on 011 435 0450.
VIEW MORE
Tue, 06 Aug 2019/

Tidy IT with O365: emails, chats, and files in one app

It can be overwhelming to have several windows pulled up to manage your email, company chats, and any cloud storage that isn’t compatible with your inbox. Microsoft Teams helps streamline the basic necessities of office work to help you overcome the tedium of multitasking. The convenience of chat apps has enabled workers to cut down on time spent away from their work space to quickly exchange information with colleagues. And work-related software isn’t just becoming more mobile, it’s also getting more user-friendly, with apps like Microsoft Teams bringing together several different platforms. Here’s how you can use that to your advantage: Use SharePoint to store and share files You might already be using SharePoint to store files and collaborate with your teammates. But did you know that in every Teams channel, you can click the Files tab to share files from SharePoint with team members? You can also access SharePoint files that are already shared in the channel and use Office Online or Office Desktop to collaborate on those files. Forward emails into a channel You get countless emails every day, many of which might be lost in your inboxes. Fortunately, Microsoft makes it easy to forward any email message from Outlook to a channel in Teams so they show up in both platforms. Just click the ellipsis next to any channel name and select Get email address. This generates an email address for the channel, which you can copy and use to forward files, documents, and messages. Stick with a few groups While you can create as many groups within your organisation as you like, going overboard can result in a cluttered messaging interface that overwhelms team members. We recommend you create groups based on the number of projects and team members involved; you can always add more if necessary. Set up audio conferencing Teams lets you host voice meetings with groups or with just one team member. This is particularly useful when communicating with remote workers or clients, in which case you can give them guest access to your Teams channel. Guest access ensures they’re able to communicate, but unable to view private information. Test communication strategies Just because some of the features in Teams overlap with other Microsoft platforms, such as Yammer and Skype for Business, doesn’t mean they’re all redundant. Think of it as a chance to test different communication strategies to find out what works best for you. For instance, if most of your clients have a Skype ID, you can use Skype for client calls and Teams for internal calls. Share conversations with new team members Teams makes on-boarding new hires easy. Rather than forwarding numerous emails and documents to new employees, you can use Teams to share past conversations and projects with them. This enables everyone to catch up without having to deal with cumbersome documents. Microsoft Teams and other Office solutions are equipped with plenty of useful features that can take some time to master. But by taking advantage of these tools, you’ll be able to save time and maximise efficiency, all without having to spend a dime. If you have any questions about Microsoft Office and how it can benefit your business, please contact Multi IT today or give us a call on 011 435 0400.
VIEW MORE
Wed, 31 Jul 2019/

Which social media platform is best for you?

Finding the right Social Media Platform to promote one’s business is a growing challenge in the digital age, with social media acting as an indispensable business tool. The question is, what else can you do aside from updating your status? Here are five ways to help you enhance your social media marketing. Social media has helped businesses not only to cut down on customer service costs, but also to cut corners in their marketing efforts. For you to get the most out of social media, you need to evaluate which tools work best in our industry, how much of your time a social media project is worth, and how to apply common best practices. 1. Choose the right Social Media Platform Since the internet offers a buffet of free, easy-to-use platforms, it’s tempting to sign up for all of them. Without due prudence, however, you might find yourself managing more accounts than you have time for. Ask yourself these questions before choosing which platform to use: Who is my target customer and what channels do they use?What do I hope to gain by opening a social media account?What kind of content do I want to share and create?How much time can I devote to social media management? Investing more time in fewer platforms helps you monitor the more important areas of your business. 2. Know when to update Are most of your customers online at 8:00 am or 8:00 pm? With a better understanding of your target users’ habits, you can schedule your posts so they create more traffic, increase brand engagement and, eventually, generate new leads and customers. Although the best time to post content changes based on your industry, location, and other factors, these are the most successful times on average: Facebook: 1:00 pm-3:00 pm on Thursday and FridayTwitter: 3:00 pm-8:00 pm, Monday to Friday for B2B and Wednesday, Saturday, and Sunday for B2C organisationsYouTube: 12:00 pm-3:00 pm, Thursday to SundayLinkedIn: 8:00 am-5:00 pm, Monday to Friday 3. Use attractive, professional-looking visuals One of the simplest ways to get followers to share your posts is by uploading high-quality photos, videos, and infographics along with your messages. Studies have shown that Facebook posts with images result in 39% more engagement, while tweets with images or videos create 200% more engagement. 4. Engage with your followers It’s important for businesses to maintain a healthy back-and-forth on social media. This means beyond sharing useful content, you should also respond to their comments and private messages as quickly as possible. You can build stronger relationships with customers by writing thank you comments to anyone who shared positive experiences with your business and by addressing negative comments with personalised and helpful responses. 5. Pump the brakes on promotional materials Although social media is a valuable tool, it’s important not to muddy the water with too many promotional posts. A rule of thumb for social media promotions is that 80% of your posts should be shareable and interactive content, while the remaining 20% should be about your business. This will result in more engagement, a more consistent brand image, and a healthier bottom line. Social media can help your business succeed, but only if it’s used correctly and effectively. If you’re interested in adopting the right social media platform to increase engagement and create a stronger brand reputation, contact us today or phone us on 011 435 0450 and we’ll help you get started.
VIEW MORE
Tue, 23 Jul 2019/

OneNote 101: Master OneNote in no time

OneNote is a useful but underutilised app that comes with Microsoft Office. It enables you to create and share digital notebooks that contain text, audio, video, and other multimedia, taking your note-taking to another level. Discover the ins and outs of this wonderful app by reading on. Organise your digital notebook While both Microsoft Word and OneNote let you create text-heavy documents, they store and display saved information differently. Word displays one document at a time, but OneNote shows you all your documents at once. When you open OneNote for the first time, it shows you a default Notebook called “My Notebook.” If you want to create another notebook, click on the < beside the name of your current Notebook, then choose +Notebook at the bottom of your screen. To use the default notebook, you can immediately customise it. The easiest way to do this is to separate the Notebook into sub-categories called Sections, similar to what dividers do in a physical notebook. For example, you can organize your client notes by dedicating a specific Section for them. Sections are shown as color-coded tabs along the top of the screen, next to the name of your Notebook. Add one by clicking on +Section at the bottom left of your screen. After you’ve created Sections, it’s time to add individual pages to them. For example, under the Section Client A, you can add pages pertaining to Client Contact, Project Status, and Billing Information. To begin adding pages under a Section, simply click +Page.Rename your Notebook, Section, or Page by right-clicking the bar with its name and choosing the rename option. Start experimenting There’s no hard-and-fast rule to enjoy OneNote, because each person’s note-taking habits are unique. The only way to find out if OneNote works for you is to try out all the features, and decide which works for you. Here are some things you can try to get a feel of the OneNote experience. However, keep in mind that these only work in OneNote for Windows 10. If you’re using an older version, you need to upgrade to the latest version to enjoy these benefits: Add tags to your notes so you can search for them efficientlyInstantly turn your drawings into shapes or text using the Ink to Shape and Ink to Text functions, respectivelySolve equations by using the Ink Math Assistant, an in-app function that will help you graph or solve math problemsUse “Immersive Reader” to read texts out loudWrite on a web page in Microsoft Edge and save your annotations to OneNote Share your OneNote So you’ve created a detailed plan for an upcoming event complete with visual pegs and handwritten instructions, and you want to share that with your team. That’s easy as pie with OneNote. Just go to the upper right corner of your ribbon, click on the Share button, and type in the email addresses of the people to whom you wish to send your notes. You can also set the sharing permissions to either “can view” or “can edit,” giving you more control of your data. OneNote has innumerable tricks up its sleeve, and it can take months for you to master all of them. Call Multi IT & Telephony Solutions today or visit us online, and we’ll make sure you’ll get the hang of OneNote in no time.
VIEW MORE
Wed, 17 Jul 2019/

5 Essential Steps to Moving Workloads to the Cloud

Migrating your business operations to the cloud isn’t a decision you can avoid. If you’re not among the 96 percent of businesses that are already leveraging multiple cloud solutions, it’s time to recognise that the cloud is here to stay, and your business needs to plan your cloud strategy – one step at a time. 5 Essential Steps to Moving Workloads to the Cloud Step 1: Consult with an expert The first step toward successful cloud migration is to find an IT partner with a holistic approach who can architect a solution that serves your strategy, business needs and budget. As one of Microsoft’s Top 100 Partners, Multi IT & Telephony Solutions is committed to Microsoft solutions, particularly Azure, Microsoft’s public cloud platform. Multi IT & Telephony Solutions is one of a select few managed service providers with a dedicated Microsoft Partner Development Manager (PDM) to provide essential, exclusive resources for ProviDyn clients. Step 2: Assess readiness Assessing your readiness to move additional workloads to the cloud helps determine what parts of your operations will benefit the most from the transition. You don’t have to move all functions to the cloud all at once or at all – your needs may be met with a hybrid combination of on-premise and cloud solutions. Our assessment also considers the anticipated ongoing costs. Metered cloud usage via Microsoft Azure allows businesses to pay as they go without incurring expenses for resources not currently being used. The assessment also determines if the timing is right for your business to begin moving new workloads to the cloud. Step 3: Plan the cloud migration project After assessing your readiness for this initiative, the next step is to decide how to execute your migration project. Will you have your in-house IT team take it on or would it be more streamlined to work with a consultant who has years of experience working in a wide variety of cloud environments? Problems could arise if your IT provider has no experience moving functions to the cloud. Challenges with keeping staff working and moving forward with your business may result in unplanned or excessive downtime. We use a project sharing tool that allows users to see and collaborate on migration projects in progress, increasing efficiency across departments. Our process also means Zero Downtime during migration. Step 4: Identify the right cloud solution The cloud readiness assessment and project management decisions bring you to Step 4 – figuring out which cloud solution is right for you based on your industry, business size, future growth projections and desired outcomes. The three options include: Infrastructure as a Service (IaaS) This is where you transition physical server and data centre assets to the cloud. You’re getting rid of your hardware, but still, managing your operating systems and software in the cloud. This option may include Rackspace, Amazon EC2 and Microsoft Azure. Platform as a Service (PaaS) You’re shifting operating systems and applications to the cloud, along with the management of those applications and systems. Planning is particularly critical if you choose this route. Examples are Microsoft Azure and AWS Elastic Bean Stalk. Software as a Service (SaaS) SaaS is simply your applications in the cloud and reduces or eliminates the need for supporting infrastructure; applications are accessed through a browser. This could be Dropbox, Box, Microsoft Office 365, G Suite, QuickBooks and Salesforce. Step 5: Determine how you’ll support your cloud After completion of your cloud migration project, the management and maintenance of your cloud solutions can be self-supported in-house or through Multi IT & Telephony Solutions ongoing fully managed services, which include 24/7 monitoring, cyber security protection, integration with other applications, proactive troubleshooting, help desk support, data backup and disaster recovery as well as managing the overall health of the environment. Where to start Check off Steps 1 and 2 with a cloud readiness assessment by Multi IT & Telephony Solutions expert IT team. Contact us by phone at 011 435 0450 or contact us online
VIEW MORE