Project Management Showdown Office 365 vs. G Suite

Project Management Showdown Office 365 vs. G Suite

Comparing Project Management Solutions from Microsoft and Google

Getting tasks done efficiently is a top priority for any modern business. A huge part of driving efficiency is implementing strategic procedures for project management. A good project management platform can make a huge difference for business owners and allow them to keep on top of ongoing tasks and track project progress.
As technology continues to evolve, a variety of software programs are available to help business owners better manage projects. There are free and priced options, but for business owners who already use a variety of applications, adding on another platform for project management probably seems like another task in and of itself.
That’s why many business owners are looking to their existing software platforms for tools to help optimize project management. However, many don’t know where to start and aren’t even aware of what’s available to them. Since Microsoft’s Office 365 and Google’s G Suite are the leading for-business software platforms, let’s break down the customized project management solutions for each platform.
Microsoft Office 365: Fully Compatible Project Management Tools On & Offline
It’s no secret that Microsoft has long been at the forefront of technology for business. Office 365 is an incredibly popular platform used by professionals across the globe. Office 365 is feature rich and has countless applications that help business owners better manage tasks and streamline processes.
However, Microsoft has recently unveiled a new app, appropriately named Microsoft Project, that can be easily added on to an Office 365 platform. The new app doesn’t require additional software licenses and users are able to easily subscribe to the app for a low monthly fee. Microsoft Project is designed for full integration with all Office 365 apps and makes it easier than ever to manage all core business tasks from a centralized location.
Let’s break down the key features and benefits of Microsoft Project for Office 365:

Task Management with a Birds-Eye View

The great thing about Microsoft Project is the way it consolidates all business projects onto a single screen. This gives business owners and administrators the ability to have a ‘birds-eye’ view of everything that’s happening at a given time. All projects can be titled, and a corresponding project plan can be attached.
This way, no matter the project, administrators can keep tabs on progression and potential challenges. Furthermore, when and if issues arise, administrators can easily access, review and/or change project plans to help get things moving. This makes it easier than ever for business leaders to stay in tune with employees and fill gaps as needed to streamline efficiency.

Integrated for Server & Cloud

In true Microsoft fashion, Project is designed to be compatible with both server and Cloud versions of Office 365. Microsoft knows that some businesses prefer the Cloud, while others are sticking with on-server platforms. No matter the preferred style, Project is designed as a dynamic task management solution for either.
The greatest thing about the Cloud version is that it allows for anytime, anywhere access to Project. Since users don’t need on-premise software installed, they can log in anytime using a web-browser to check in on project updates and progress.

Customizable Templates

Just like Office 365, Project is jam-packed with features that can be customized to suit the needs and preferences of any modern business. A project is equipped with a variety of pre-made, built-in templates to optimize project management including work breakdown charts, task and duration logs, assigned resources lists and more.
Including templates makes it easier than ever for business administrators to create new projects and immediately start organizing assignments, timelines, and resources. Templates can be customized to reflect project-specific issues and/or company regulations and employee expectations.

Business Intelligence

Finally, to really optimize project management potential, Project features can be used to develop strategic insight into business operations. As you make and manage project templates, the application will identify consistencies and implement them into new templates – no matter who is creating them.
The application also creates critical path schedules as well as critical chain and event chain methods which provides strategic visuals of whose responsible for what and what the chain of command is for each project. Finally, Project is equipped with dynamic administrator controls that allow for access management and user classification.
G Suite: Project Management Designed for the Cloud-Loving Business User
While Microsoft is the long-held favorite, Google has been making waves lately with the new version of Google for Work, dubbed G Suite. The web-based platform is loaded with features much like Office 365 and is offered at varying budget-friendly price-points, depending on the size and shape of your business. G Suite boasts some of the same built-in project management features as Office 365, and following Microsoft’s lead, Google has also recently unveiled a new project management application called Wrike, designed to be fully compatible with G Suite.
Let’s break down the key features and benefits of Wrike for G Suite:

Workload & Task Management

In Wrike, users have the ability to create blocks or sections of work necessary to complete larger goals. By breaking down big jobs into more manageable sub-sections, administrators can keep a better eye on tasks and overall project progression.
Wrike is also designed with real-time file editing capabilities and report generation tools so that information can flow easily and resources can be requested as needed. Finally, Wrike is designed with automation in mind and allows for tasks and resources to be automatically assigned when new projects are created.

Real-Time Updates & Strategic Reporting

Wrike also has built-in updating and reporting capabilities that keep users informed of project updates and progression. The app includes a real-time newsfeed where all project news flows freely, as it happens.
There are reporting tools available for individual projects and overall team productivity which makes it easier than ever to identify weak spots and iron out efficiency challenges. Furthermore, sharing reports and project updates is made incredibly easy by the user dashboard feature that acts as a central hub for all project info.

Collaboration

Of course, a huge part of any team project is the ability to communicate and collaborate. Whether a team member needs to check the information from an old email or send a project to a superior for approval, Wrike is designed with built-in collaboration tools that make creative and efficient teamwork a breeze.
Wrike offers email and calendar synchronization features that allow for a seamless transmission of important data. There are also strategic mentioning tools that allow users to easily get the attention of specific team members with questions or updates. Finally, Wrike is designed with a dynamic proofing center that allows users to get final stamps of approval from management before updating a project’s status to complete.

Integration

Last but not least, Wrike is designed specifically to be an integration powerhouse. In a modern business world, so many different software applications play a part in getting work done. Wrike offers compatibility with a huge variety of business apps which makes the synchronization of important data very simple.
No matter what companies are using third-party apps for, Wrike is designed to promote integration and seamless compatibility. Maybe a company uses Photoshop for design projects or Zapier for app consolidation. Wrike allows for integration with these apps – and countless others – to ensure the chain of information is never fragmented.
No matter which platform you use, both applications can be customized to support a dynamic project management solution. Taking the time to get to know the features that both Project and Wrike offer will help you implement a fail-proof approach to project management. Furthermore, by choosing a project management tool that’s fully integrated with your current platform, data remains centralized and keeping tabs on business tasks will be easier than ever.
If you use Microsoft’s Office 365 or Google’s G Suite and are looking to optimize the platform, use this outline as a guide for understanding each provider’s approach to project management. Then, it’s as easy as subscribing to the add-on of your choice and making your software platform work for you.

Your Business Requires Technology, But Technology Shouldn’t Be Your Business.

Businesses today are faced with fierce competition. Keeping your small business afloat, much less making a profit, takes your full attention. This, coupled with an increased reliance on complex technology can put undue pressure on you and your employees.

Whether you want to compose a sales presentation or proposal, keep track of inventory, or communicate with your employees and clients, you can’t do this efficiently without working computers, a properly functioning network and a reliable connection to the Internet.

And technology it isn’t always dependable. With network outages, Hard drives that crash, and computers, routers, switches, servers, printers that eventually fail, your business productivity can come to a halt.

Doesn’t it always seem like technology fails you when you need it most?  When this happens it’s imperative that you resolve these problems and resume normal business operations as soon as possible—Time is money. It can be precarious to be so dependent on technology, but without it, you just can’t compete today.

Few small businesses have either the required skills or the time to maintain and repair computers, networking equipment, or other technology. And, they can’t afford to hire dedicated, full-time employees to deal with IT maintenance.  Even if they could, there isn’t enough need for a full-time expert.

So, what do they do? They try to “fix” things themselves. They find the most tech-savvy employee to double up on their duties and deal with hardware procurement, software licensing, and day-to-day IT troubles.

Trying to resolve and keep up with inevitable technology failures is no longer a simple matter. And as your business has grown, you’re probably using computers and network equipment from a variety of dealers. So, getting the support you need is more difficult.

Plus, you have to manage warranties, support contracts and deal with finger-pointing between vendors when problems occur. Doing this on your own can be a volcano waiting to explode. Below the surface are IT issues and vulnerabilities that can cause big problems down the road.

Do you rely on your non-IT employees to deal with technical problems? If so, it’s best to let them stay focused on their duties, and enlist the aid of expert IT support. The time and resources dedicated to managing technology problems can negatively impact employees, their stress levels, and ultimately, your customers.

 The smart thing to do is to outsource your IT support to a company that makes sure all your technology stays up and running.  They should be experienced in maintaining and troubleshooting desktops, laptops, servers, and network hardware. And they should have the knowledge and skills to keep things running smoothly and securely.

Large enterprises address this problem by hiring the right people for the job. They rely on experts for what they need: marketing, accounting, legal services and more. They know to leave the technical responsibilities to the experts.

If you’re worried about the cost, don’t be. The cost of outsourcing IT service and support will pay for itself because your tech issues will be addressed quickly and correctly so you can continue to focus on meeting your customers’ needs and growing your business.

Plus, you can get all your IT support and management for a fixed monthly price. A fully managed program is the best solution for small businesses and provides the most reliability, security, and quality of service.  You’ll have 24×7 access to IT assistance from technicians who will provide both remote and on-site support with guaranteed response times to prevent downtime and ensure your business stays up and running.

All aspects of your network will be monitored and maintained: security, data protection applications, and hardware. This optimizes your network’s performance, so it will work at peak efficiency to meet the demands of your business.

Your IT expert can also act as your CIO and IT Advisor, and help you with:   

  • Technology Planning,
  • Solutions that align with your budget and increase your operational efficiencies,
  • Business Continuity and Disaster Planning,
  • Expert Security Planning,
  • Cloud Solutions that save you money, eliminate storage issues, and can be scaled to meet your specific requirements,
  • Spam and Email Protection,
  • And more.

Your time is important. You have more important issues to deal with than IT problems. Outsourcing your IT support and service allows you and your employees to focus on your duties, and grow your business.

Our Fully Managed IT Service is the ideal solution for small businesses like yours. We know how hard you work to afford your technologies, and we’ll ensure you get the most from them. We’ll offer the value you need, and protect your technology investments.

Just ask our clients: We provide the utmost in network reliability, security and quality service. For a free, no-obligation assessment of your IT needs, call us at 866.205.8123or email us at sales@compnetsys.com

7 Ways to Protect Yourself While Shopping Online

7 Ways to Protect Yourself While Shopping Online

Online shopping is something many are becoming increasingly familiar with in the digital age. From Amazon Prime to special online-only sales, anything one could ever want, or need can be bought online. However, an aspect of online shopping that is often overlooked is security. This means being aware of what sites you are visiting as well as what information you are providing. There are several steps that are easy and effective in ensuring online safety that anyone can and should work on implementing into their everyday lives.

Don’t Shop on Public Wi-Fi
Inputting your personal information on any site while on public Wi-Fi or a hot spot is just asking for that information to be stolen. These Wi-Fi spots are not secured and allow anyone access to them. Everyone can see what everyone else is doing, including shopping. You wouldn’t want to type out your Amazon password with a stranger looking over your shoulder, but that’s essentially what you’re doing when on a public network.
You also want to be wary of stores that use Wi-Fi or Bluetooth to track your movements within their stores or websites. This could be another potential avenue for hackers to get into your device and steal your data.
Password protection dos and don’ts
You’ve probably heard this a thousand times before, but protecting passwords is the easiest thing you can do to safeguard your information. You should have a different password for each site or app. Using a password manager can be helpful with this. You also want to make sure that you are changing your passwords on a regular basis, at least every thirty to ninety days.
Unique passwords or sentences as passwords are also a good idea. The more complicated the password is the better. It’s also a good idea not to share your passwords with too many people. Is it really secure if ten people know it?
Virtual account numbers
Virtual account numbers are special cards with a set time and amount to spend, and after they expire the card and money on it are no good. This is a safe alternative to using your debit card online. If someone gets access to your debit card, they have access to your bank account and could end up costing you plenty before the transactions are sorted out.
If you don’t have access to this type of card a standard credit card is still more secure than a debit card. Most credit card companies give you 60 days to report theft, while some banks only give you 2 business days for reporting debit card fraud.
Beware of links in emails and on social media
The days when you could safely click a link on Facebook and buy that new amazing thing safely and securely are gone. Today hackers are using links and attachments to deliver malicious malware and ransomware to your system. It is always best to type in the address to your address bar manually, rather than clicking the link. Always make sure that the site you think you are going to is actually the site you end up on. You can verify that the link is legit by hovering your mouse over it, which will display the address it links to. This way you can see where the link takes you before clicking it.
It doesn’t hurt to follow the old adage, “if it’s too good to be true, it probably is.” So, if that post on Facebook for the $20 iPad seems like too good of a deal, it most likely is. Stick to reputable sites and places you have shopped before. Losing your money to thieves is not worth saving money on a tablet.
Beware of what info is asked for
Would you enter your social security number on Amazon if they suddenly asked you to provide it to make a purchase? Of course not. Be wary of what information the site is asking for. If it seems strange or out of place, it’s probably not legit. Things like name, phone, email, and address are all pretty standard things for a shopping site to ask for. Social security numbers, bank account numbers, or driver’s license number however are not standard practice for shopping online.
You also want to make sure that what the site is doing with your information is legit and that they aren’t selling it or stealing it for themselves. Always know the privacy policy and terms of service, especially when you aren’t sure about the site. Also, make sure that the site is protected and secure before entering any personal information.
Look for the https
When you visit a webpage look for the https in the address. The difference between http and https is how secure the site is. The extra “s” means that the site is secure and safe. It encrypts the message so that only the intended recipient sees the information. If you’re shopping there it should have https in the address bar. If it doesn’t, don’t shop there.
Beware shopping on mobile devices
We all do it. We hit up Amazon or some other shopping app on our phone or tablet because it’s easy and convenient. We like shopping from our couches or chairs without going to the computer. But the potential for identity theft or the theft of your payment information is far greater from a mobile device than the family desktop.
Beware of shortened URLs. It is common to see them on a phone or mobile device, but could also be a trick to get you to click on them. Use the full address and avoid these shortened ones. Another thing to remember is to download a virus protection app for your device. Most devices don’t natively come with one, but the device is just as prone to hackers and malware as your PC. You want to keep them clean and safe, especially if this is your primary means of shopping or browsing.
Understanding how online security works is a valuable skill that can help prevent implications in the future. By being aware of your online presence and who can see your information you can better protect yourself from identity theft or credit card fraud. Implementing these techniques into your online life is easy, simple and could save you a number of headaches in the future.

FLORIDA BUSINESS OWNERS: Are you FIPA Compliant?

FLORIDA BUSINESS OWNERS: Are you FIPA Compliant?

Implications of the Florida Information & Protection Act for Business Owners
For Florida organizations that handle sensitive healthcare information, federal HIPAA compliance has probably been a handful in and of itself. However, these organizations, along with all other Florida business owners, have an entirely separate set of information privacy standards to comply with.
Florida Governor Rick Scott implemented and signed The Florida Information and Protection Act (FIPA) into law on June 20th, 2014. And yes, just to keep things consistent, FIPA does indeed rhyme with HIPAA. The law went into effect as of July 1st, 2014, however, the regulations have some key differences compared to HIPAA’s collection of compliance standards.
Understanding FIPA: How Florida Business Owners are Impacted by The Act
The protection of client personal information is a huge responsibility. So much so, compliance standards have been codified into law. For business owners, this can seem like a huge and often frightening responsibility. However, taking the time to get to know the basics of compliance standards, can lift a huge weight off the shoulders of business owners and make data security less of a burden.
Let’s look at the top 5 things Florida business owners should know about FIPA:

FIPA Terms are Similar to HIPAA, But Definitions are Different

A covered entity is the legal jargon for who is impacted by Act regulations. Under HIPAA, covered entities include healthcare organizations only. However, under FIPA, the collection of covered entities is much more wide-reaching. FIPA regulations apply to any Florida business that acquires, maintains, stores, or uses personal information – the act is not limited to healthcare providers only.
Furthermore, the FIPA definition of “personally identifiable information” is also more expansive than personal information covered under HIPAA. Whereas HIPAA defines personal information as critical patient health data, FIPA defines personal information as client name’s, driver licenses, social security numbers, banking information and credit card numbers. This means any Florida business that collects, uses or stores client cardholder information is required to uphold FIPA compliance.

Implementing a Data Security Strategy is The Top Priority

FIPA requires all covered entities and their third-party vendors to implement reasonable measures for the secure protection of client data in electronic form. This means Florida business owners need to create deliberate FIPA policies and procedures to ensure consistent and reliable measures are implemented to protect client data.
For organizations already subject to HIPAA, adding FIPA provisions to existing HIPAA policies and procedures could be the best option. While Florida healthcare organizations may already be carefully safeguarding information in EMR programs, it’s critical to reexamine these protocols and others that might be holding ‘personal information’ as defined by FIPA.

Breach Notification Mandates

In the increasingly dangerous cybercrime climate, breaches happen all the time. Under FIPA, organizations have a series of obligations to uphold in the event of a breach. First and foremost, if a breach impacts over 500 people, organizations must notify the Department of Legal Affairs in writing. The written notice must include the specific details of the Breach and the Department may also ask organizations to forward a copy of their FIPA policies. This is slightly different than HIPAA, which only requires breach notification to the Department of Health & Human Services.
Second, if a breach impacts more than 1,000 individuals, organizations must notify all consumer reporting agencies. Additionally, if a third-party vendor experiences a breach, it must notify the covered entity within ten days, rather than the 60-day mandate under HIPAA.
Finally, FIPA requires that individuals impacted by a breach must be notified of the breach within thirty days. Again, this is more stringent than the 60-day HIPAA requirement for breach notification. However, it should be noted that FIPA does outline an exception to this rule that may enable providers to notify individuals in accordance with original HIPAA guidelines.

Proper Disposal of Client Information Records

FIPA requires organizations and third-party providers to implement all reasonable measures for proper disposal of customer records containing personal information.  FIPA specifically references the implementation of policies for shredding, erasing, or otherwise rendering the personal information undecipherable.
While HIPAA provides guidance on the disposal of records containing protected health information, this is the first time that the state of Florida has specifically set out similar specifications. Again, organizations will be required to create FIPA-compliant policies and procedures for record disposal or expand on existing HIPAA disposal policies and procedures.

What’s the Penalty for Non-Compliance?

If an organization or their third-party providers violate FIPA mandates, it will be deemed an unfair or deceptive trade practice and could result in a civil penalty of up to $500,000. The Department of Legal Affairs will be the enforcing body in the state of Florida, as FIPA does not allow the private right of action for individuals to pursue legal action in the case of data violation.
Next Steps: Strategies for Staying FIPA Compliant
So, now that we’ve nailed down the basics, Florida business owners are probably very alert to the fact that FIPA compliance is no joke. However, all the rules and legal mandates can understandably leave your head spinning. So, if you’re wondering the next steps for getting and staying compliant, let’s explore the top three priorities for FIPA compliance:

First, update company data protection policies and procedures accordingly to address areas where FIPA imposes additional requirements, like breach notification and investigation.
Second, ensure all contracts with third-party service providers reflect the implications of FIPA. Be sure all your vendors know what is required of them in terms of protecting data and issuing breach notifications.
Third, train your staff on FIPA compliance. Keeping staff informed about FIPA regulations and giving them strategies to maintain compliance is an incredibly beneficial strategy. Arming your workforce with knowledge, top-to-bottom, is the most efficient way to uphold consistent compliance.

As mentioned, the cybercrime landscape is only getting worse. For businesses, cyber attacks on client personal data can take a huge toll on business security and reputation. That’s why federal and state compliance regulations, like HIPAA and FIPA, are put in place. While many organizations may consider compliance standards an annoying burden, they exist to protect companies from the overwhelmingly negative impacts of an unexpected breach.
Wondering how your company is impacted by FIPA compliance regulations? Don’t waste any time getting compliance policies in place. If you need a hand laying out reliable FIPA policies, reach out to a local technology firm for guidance. When it comes to data security and compliance, checking in with the professionals can make all the difference.

Tapping into Your Customer Insight

Tapping into Your Customer Insight

How Modern Marketers are Using Technology to Learn from Target Audiences

Marketers are continually challenged in the modern marketplace. Whereas marketing used to be a very internal, company-controlled business strategy, the digital transformation has opened up an entirely new realm of marketing possibilities. Companies across the world are now developing dynamic and interactive corporate identities in their online spaces.
Furthermore, that identity is largely shaped by customer interaction. Social media networking allows corporations to be ‘humanized’ and followers are able to engage directly, providing praise, feedback or grievances. In order for any modern business to remain competitive, companies must work with and learn from their customer base in order to better shape brand messaging, product development and organizational culture.
Industry Transformation: How Marketers Are Realigning Themselves for the Future  
With this new, digital marketing universe upon us, marketers are looking for the best ways to optimize online connections with consumers. Determining the best ways to learn from audience interaction to build strong, resonating corporate identities is a top priority for any modern marketer whose paying attention.
The Association of National Advertisers (ANA) established the Masters Circle, an elite program that brings together America’s top marketers, to tackle some of the toughest challenges faced in corporate tech-marketing. Recently the ANA facilitated a chat-series with marketing giants, in hopes of highlighting the key challenges and opportunities that marketers face.
Let’s check out how leading corporate organizations are adapting to a completely new marketing landscape:

Consumer-Oriented, On-Demand Business Models

Now more than ever, customers want services on demand. The internet has made it easier than ever for consumers to get what they want, when they want it, often from the comfort of their own home. For consumers, modern commerce has to be convenient. However, convenience looks different to every consumer.
This means that modern-day marketers need to get to know their customers and build on-demand business models that cater to client preferences. Furthermore, it’s important to understand the different preferences of different target markets. An on-demand business model for Millennials will look much different than an on-demand business model for Baby Boomers. Building consumer profiles for all the targets you wish to reach will help you build on-demand business models that reach consumers on their terms.

Innovative Marketing Technologies

Technology is revolutionizing the way countless companies do business. In terms of marketing strategy, organizations should be utilizing tech innovation to strengthen their connection with consumers. The relationship between IT and marketing is much closer today than it ever has been before, and companies of all shapes and sizes should be capitalizing on that reality.
Using technology to better navigate online interactions with consumers offers huge benefits. It allows organizations to be more instant, precise, social and adaptable. Developing tools for online integration and consumer analysis allows business owners to identify trends and adapt marketing strategies to better reach target markets. This offers huge growth potential and allows companies to optimize productivity and better identify profitable opportunities.

Rebuilding the Marketing Skillset

In the past, the marketing strategy was limited to the boardroom. Marketing specialists would come up with the ways they thought consumers would be most effectively reached. However, technological innovation has changed that game entirely. In turn, business owners need to realign their marketing skills tool-kit to optimize customer interaction and make the most out of marketing efforts.
Social media analysis, search engine optimization and digital analytics are a huge part of expanding the marketing skill set. Furthermore, it’s critical for businesses to develop a ‘tech-marketing curriculum’ to help train old and new marketing employees on strategies for successful online marketing.
For traditional marketing specialists who are used to ‘controlling the conversation’, giving up power to the social media jungle can be difficult. However, embracing the online consumer market helps modern marketers optimize influence by developing skill-sets that are data-driven and market-relevant.

Consumer Empowerment & Community Connection

Another key part of the digital marketing revolution is focused on the empowerment of consumers and the championing of community causes. First, empowered consumers who have a say on digital platforms are made to feel as though they’re part of your business team. They’re empowered because they feel like they have a direct influence on the products and services you offer them and the messages you send them. This offers the potential to create a strong bond between the company and consumer and lays the groundwork for loyal, long-standing customer partnerships.
Additionally, going a step further to include a social responsibility strategy in your overall marketing effort offers HUGE benefits. Bonding with consumers to identify community causes they care about allows your company to serve as a champion for these causes. By identifying these causes and using your online platform to support and promote them, you build trust with consumers and position your company as an ally in ‘fighting the good fight.’ Most of all, championing community causes means your company is giving back, and that’s never a bad thing.

Make Marketing Fun Again

Above all, the key to optimizing your marketing strategy in a digital climate is all about bringing the fun back to marketing strategy. Online audiences are led by young, digitally-engaged consumers. So, business owners need to find the ways to excite this consumer base and revitalize some of the older target market groups.
Getting to know your online audiences is a huge part of ensuring your marketing strategies are fun and engaging. Treat your marketing strategy like a craft or an art form. Get diverse and inclusive – work to ensure that all members of your target market can resonate with your messaging. Inspire your target markets to think, dream and act. Most of all – create incentive and include consumers in your process. Engage your consumers and invite them to help you develop products, services, and brand identities that stand out.
Going Forward: Lessons Learned from the ANA Chat Series
All the information above is a summary of the insights provided by key marketing experts from consumer giants like Walmart, Lego, and Facebook. Taking the time to digest these ideas is a critical first step in revitalizing your marketing strategy to meet the demands of the digital marketplace.
No one can say for sure where the marketing world is going because tech innovation is continually evolving the digital marketplace. Therefore, it’s critical for modern-day marketers to stay adaptable and continually work alongside tech development to optimize messaging and maximize target reach.
Change isn’t easy but so long as business owners remain open to evolution, marketing strategies of the future will foster tangible connections with consumers that will help promote corporate growth and profitability. Furthermore, using technology to transform your marketing strategy and optimize your relationship with consumers, lays the foundation for a corporate identity that will stand the test of time.

SCARAB – The Latest Ransomware Threat

SCARAB – The Latest Ransomware Threat

A new strain of ransomware — SCARAB — began hitting millions of inboxes last week; make sure your business knows how to protect against it.

Ransomware is now a household name, and there’s no going back. Even though cybercriminals have been using ransomware for years now, it wasn’t until the global Wanna Cry ransomware attack earlier this year that awareness reached critical mass – but that was just the beginning.

The latest development in the ever-evolving series of ransomware attacks uses the internet’s largest email spam botnet to propagate a relatively new ransomware known as “SCARAB”. This strain works similarly to the “Jaff” ransomware, relying on the now infamous Necurs botnet to reach millions of potential targets.
This threat was first detected by Forcepoint Security Labs as a part of a malicious email campaign that arrived in target inboxes on November 23rd at 7:30 AM UCT. From the time of the first detected email and over the following 4 hours, Forcepoint observed an increase in SCARAB emails from just under 100,000 separate incidents to nearly 350,000. At its peak, the SCARAB ransomware campaign was sending more than two million emails per hour. A vast majority of the emails carrying SCARAB are targeting .com addresses, followed by various European domains.

Identifying SCARAB – Look Out For This Email Subject Line
Ransomware emails sent by Necurs carrying SCARAB have the subject, “Scanned from {printer company name}”, a phishing ruse similar to those employed by cybercriminals involved in the Locky ransomware campaign. The includes a .zip file that is assumed to be a scanned document or image file but actually contains a VBScript downloader.
Once executed, SCARAB drops a copy of itself, creates a registry entry as an autostart mechanism, and encrypts files using a “.scarab” extension. The ransom note is then placed in every affected directory, named “WANT TO GET ALL YOUR FILES BACK, PLEASE READ THIS. TXT”.

Contradictory to other major ransomware campaigns, SCARAB does not necessarily state a specific monetary amount for the ransom, instead of saying, “the price depends on how fast you write to us”. Payment can be made through an email address, or through an alternative BitMessage contact mechanism.
What Can You Do To Protect Your Business From SCARAB?
As with any strain of ransomware, there are a few key steps you and your employees can take to protect your business:

Be suspicious of emails and attachments from people or companies that you don’t do business with, as most ransomware infections arrive via infected word/xls/zip/exe files.

Backup your data on-site and off-site, and test your backups regularly.
Create a plan for getting infected, and regularly test your plan.
Consult with trusted cybersecurity and IT professionals.

Remember – you don’t have to do this alone. {company} will help you set up robust backup solutions, develop cybersecurity response strategies, and help you protect against threats like SCARAB ransomware.
For more information about SCARAB and how to protect against it, contact the {company} team at {phone} or {email}.

Stay Safe and Productive on Email

CompNetSys Mail Protection offers an ultra-secure, ultra-reliable email protection and archiving platform that protects businesses from phishing, malware, and other email-borne threats. Mail Assure provides best-in-class  spam and AV filtering and mailbox continuity