Why This Missouri Dentist Was Targeted by Russian Cybercriminals

Why This Missouri Dentist Was Targeted by Russian Cybercriminals

You don’t think about a small business in middle America being targeted by hardened Russian cybercriminals, but that’s exactly what happened in the case of Smile Zone. This Missouri dental office caters to children, looking for ways to provide them with a higher comfort level with dental procedures. Smile Zone had not yet invested in any aggressive cybersecurity measures, because they didn’t expect to become the target of malicious attack from overseas. Unfortunately, they were wrong, and their lack of planning for cybersecurity cost them over $200,000 due to a simple phishing scam — money that Smile Zone has never been able to recover.
Determining the Attack Vector
It didn’t take long for investigators to determine the attack vector, as it was a simple phishing email that was launched on the computer that Smile Zone used to conduct their banking business. With the information stored on that computer, the Russian cybercriminal and his associates were able to tap into the bank account of Smile Zone and create a transaction for $205,000 that looked perfectly legitimate to the bank. Unfortunately, that also meant that the bank would not accept liability for the transaction — something that they would have done if the account were a consumer account instead of a business account. What’s worse, the cybercriminals left the back door of the business open so they could help themselves to more funds in the future if the vulnerability was not addressed in time.
Why Russian Hackers Target Small Businesses
It’s hard to imagine, but why would a well-known Russian hacker who was on the FBI’s Most Wanted List waste their time attacking a small business for “only” a few hundred thousand dollars? The answer is simple: small businesses are less likely to have invested in cybersecurity. Not only are the businesses perceived to be less secure, but cybercriminals are looking for an ongoing payday — not a one-time bankroll. Small to mid-size businesses may not even notice relatively small amounts being shifted around until the dollars add up to a significant amount of money. This allows these nation-state actors to slowly siphon away funds that could otherwise be used to fund payroll or grow the business. Even if small businesses do have passive cybersecurity, they may not be actively monitoring their transactions and systems in a way that would allow them to see the fraud happening in near-real time. Symantec defines the time between the injection of malware or a data breach to the discovery time as “dwell times“, and they average 191 days before many businesses discover that their systems have been compromised.
Are There Legal Avenues for Recourse?
The unfortunate reality is that it’s difficult for the government, local police or anyone else to help regain access to your funds once they’ve been exfiltrated to a remote location. Hackers are extremely savvy, in taking just enough money that they can easily move it around without a lot of notice from others. It’s difficult for law enforcement to prove that there has been a crime, much less track down a slippery individual thousands of miles away from the crime. When your business suffers this type of loss, it’s unlikely that the money will ever be recovered — a devastating blow for a small business.
Are There Ways to Protect Your Business?
Fortunately, you don’t have to simply wait for your business to be hacked, and you don’t have to invest in over-the-top security solutions that are meant for enterprises instead of small to mid-size businesses. Your trusted technology services partner can help you understand the various options that are available to help protect your organization. This could include a variety of solutions:

Endpoint protection and monitoring of WiFi hotspots that are available to customers and employees
Rigorous password policies
Ongoing employee and contractor security training and testing
Active monitoring of your network by knowledgeable security professionals
Proactive notification systems so your technology partner can immediately begin remediation in the event of a breach
Email and website security software that helps filter out malware and spam before it reaches your staff
Robust backup and recovery procedures, to ensure your business can continue functioning even if you’re under attack
Systematic review of all potential fail points within your infrastructure on a regular basis
Rigorous management of user accounts and logins, to ensure that accounts are inactivated quickly when they’re no longer needed

Each business is unique, and working with your trusted IT managed services provider will offer more direct and detailed recommendations that will fit the unique needs of your business.
No one is expecting to be the target of a Russian hacker, and small businesses may be even less prepared than larger ones. No business is truly safe from cybercriminals unless your business is fully protected by a suite of cybersecurity measures that include active management of your infrastructure. It pays to invest a small amount upfront to protect your business from what could be a disastrous cyberattack in the future.

How to Share Notes with Microsoft OneNote

 
Here’s a quick tech tip for Microsoft OneNote. Today we’ll look at how users can share notes that they have created in Microsoft OneNote. First, though, since Microsoft OneNote isn’t one of the “Big Four” Office programs (Word, Excel, PowerPoint, and Outlook), we’ll look at what OneNote can do and why you should be using it.
What Is Microsoft OneNote?
Microsoft OneNote is an awesome but lesser-known part of the Microsoft Office family. At its core, it’s a high-powered note-taking program. When you first open a OneNote Notebook, it looks an awful lot like a Word document. However, it works quite differently. Click anywhere on the page and start typing. A text bubble will be created right there. Click somewhere else, and you can create another one. OneNote allows for free-flowing note-taking, and it lets users annotate their content using freehand drawing (with a mouse or on a touchscreen). It’s a great place to brainstorm or to take non-linear notes.
Sharing Is Powerful
Over the years, OneNote has also become a powerful collaboration platform. In all recent versions, users can share a notebook with numerous friends or coworkers, and those users can all edit the notebook simultaneously. This collaboration is powered using either Microsoft SharePoint or Microsoft OneDrive, depending on the version and edition (home or professional) being used.
How might this help you? Perhaps you want to create a table, sign-up sheet, or tutorial guide. Get one started, then share it with your coworkers or friends. They can jump right in, simultaneously filling in details, correcting mistakes, and fleshing out written procedures in real time. This is a powerful tool for businesses.
How to Share a OneNote Notebook
To share a notebook, open the notebook you want to share. In the upper right you should see the word “Share” between some other menu options, just below the Minimize button. Click the word “Share” to open the Share sidebar. In this sidebar you can select which notebook or notebooks you want to share. Fill in the email addresses of the people you want to share the notebook with. Next, click the drop-down menu and choose which level of access you want the people to have. You may want them to be able to edit, edit and share, or view only. Next, click the big Share button.
The people you’ve shared the notebook with will receive an email explaining the next steps. Soon they will start working with your document in real time. You can see initials next to people’s changes to help keep things straight. If you’d like to hide those, click “View” up in the ribbon, then click “Hide Authors.”
Now you know the basics of how to use and share notebooks in OneNote. Time to get collaborating!

Top Criteria for Selecting the Best IT Support Company

Top Criteria for Selecting the Best IT Support Company

Researching IT support companies can lead to confusion — and quite a headache! You may have started down the path of finding a technology partner due to internal frustrations or a lack of time to support basic technology needs, but your search can quickly expand due to the number of potential partners in the marketplace. Trying to determine exactly the level of support that you need and the associated costs may feel like an exercise in futility, but there are some basic tenets that will help you find the best IT support company for your needs. From reviewing the pricing models to service levels, here are the key considerations that will help you determine which partner is right for your business.
1. Does Your IT Support Company Offer Flexible, Scalable Contracts?
Technology solutions are rarely one-size-fits-all, and your IT services partner should recognize this and be able to provide you with customized recommendations that will meet your unique business needs. This could mean shorter contracts so you can evaluate the working relationship to support packages that provide you with scalable options that are designed to grow with your business. Your IT services partner should feel like they are on your side, making recommendations that will save you money while providing you with the support that your business desperately needs to grow.
2. Does Your IT Support Company Focus on Ongoing Education?
Technicians with industry certifications in various platforms should indicate to you as a client that your technology partner is placing an emphasis on ongoing education. The technology landscape changes dramatically in the course of several years. If your IT professionals are not maintaining their certifications or growing their body of knowledge, it can be challenging for them to provide your business with the support that you deserve. Key certifications to look for include Microsoft Silver or Gold Partner Certifications and CompTIA Certifications, to name a few. Your partner should be able to demonstrate that they value ongoing education by setting aside time for team members to attend training or continue their education.
3. Does Your IT Support Company Value Proactive Security and Account Management?
Proactive account management is crucial to your business success, as your IT services partner should be continually looking for ways to save you money and improve the efficiency of your operations. This should include a bi-annual or quarterly review of your business, that truly digs into the details and provides you with actionable recommendations. The right partner will be able to peek into the future and call out items that could become a problem in the future, so you can resolve them before they negatively impact your business operations. Active security measures are another valuable aspect of your partnership, as your IT services technicians are continually reviewing network activity to discover discrepancies so remediation of any problems can begin immediately.
4. What Are the Stated Response Times for Your IT Support Company?
There is no slick or easy answer that you should be looking for in terms of response times, as that can vary based on the needs of your business. Some businesses may find that getting a response within several hours is perfectly acceptable, while others need to get help desk support in a matter of minutes. What you are looking for is the best match for your business: an IT support company that is able to provide you with workable response times at an acceptable cost.
5. Is Your IT Support Company Aggressive About Cybersecurity?
Protecting your business assets is a mission-critical task for your IT support company, and they should treat it as such. You need to know that you will have access to cybersecurity professionals who are actively reviewing your account on a regular basis to ensure that all appropriate precautions are being taken to protect your digital assets. This includes everything from user training to backup and data recovery processes, all of which must be in line with your business needs.
Sometimes, it’s not a matter of finding the best IT support company — it’s a matter of finding the best fit for your business. You’ll want to consider everything from the support you want to receive from your account team to the quality of the training that technicians receive on an ongoing basis to find the best IT support company to meet your unique business needs.

Are You Good at Saying No & Setting Priorities?

 
There are never enough hours in a day, but how you spend the hours that you do have can make all the difference in the world. Just think: business leaders such as Steve Jobs and Bill Gates have exactly the same 24 hours available to them as you do! All good business leaders have to determine the best way to be productive, but this can be a challenging lesson to learn. Here’s a quick hack that will help you be more productive without adding to your stress level.
Just Say No!
Ask yourself this question multiple times each day: “Am I adding unique value to this conversation, or could someone else do (nearly) as well?”. You have to be honest with yourself, but when you rigorously apply this rule you might find that you can skip some meetings, delegate decisions and allow others to take the lead on smaller projects or tasks so you can focus on leveraging your core competencies. Getting rid of the smaller annoyances leaves you more time to focus on what’s truly important — moving your organization forward.
Effective Prioritization
Did you know that the word “priority” was never meant to be plural? That’s right, we talk about “priorities” all the time, but for more than 500 years it strictly meant the very first thing. When you think about it, it’s impossible to have multiple “first” things, there’s only one first. When everything is a priority, nothing’s a priority, but how can you make decisions about where to focus without freezing yourself or your team in a circle of indecision?
Multitasking is a Myth
Your brain can truly only handle one task at a time. When you’re jumping back and forth between several tasks, your brain takes a minute to adjust each time you make that leap. This mental price is time taken out of your day that could otherwise be spent on a single productive task, allowing your brain to work at peak performance. Even if you’re only wasting 60 seconds between each task, that can easily add up to more than an hour each day. This performance disruption reduces your focus and makes your delivery less consistent.
If you can’t help with a particular project, or don’t need to be involved in a decision, don’t be afraid to step away and let others handle it. You need to be able to trust that your team can take care of the rest. There’s no need to add what is essentially busywork to your day when you can harness the power of your mind to create value in your little corner of the universe.

Security Update: What’s PhishPoint?

Security Update: What’s PhishPoint?

The attack dubbed “PhishPoint” is a recent cyber-attack scheme being used by foreign hackers. It demonstrates the craftiness and the extent that cybercriminals will go to in order to harvest your Microsoft Office 365 credentials. It uses several familiar aspects of Office 365 to lull potential victims into an assumption that everything is above board. But it’s not. Here’s what you need to know about PhishPoint and how to protect your organization.
How Did The PhishPoint Attack Get Into Office 365?
The PhishPoint hackers use Microsoft SharePoint files to host their phishing links. Typically hackers use emails to host malicious links. Now, these crafty hackers have figured out how to bypass Office 365’s built-in security to leverage their attacks. This shows that there’s a critical flaw in Office 365 in this respect.
How Does The PhishPoint Attack Work?
You can recognize a PhishPoint malicious email by its use of “URGENT” or “ACTION REQUIRED” to urge you to respond. But beware, this email contains a link to a SharePoint Online-based document that you don’t want to click.
Here’s how it works:
The link will direct you to SharePoint. It will look legitimate and could trick you or your users unless you know what to watch for it.
At this point, you’ll be shown a OneDrive prompt –The SharePoint file will impersonate a request to access a OneDrive file with an “Access Document” hyperlink. This is actually a malicious URL, as shown below.
Then you’ll see a Microsoft Office 365 logon screen – Don’t enter your information even though it’s very authentic-looking login page. if you do, the hackers can access your user credentials!
What Else Should We Watch For?
Several things stand out here, and you should watch for them:
1. The email is unsolicited and has a generic subject of “<person> has sent you a OneDrive for Business file.”
2. Opening the document requires you to take a number of steps.
3. The URL for the logon page isn’t on the office365.com domain.
Why Didn’t Microsoft Stop This Scam?
Unfortunately, Microsoft didn’t see this coming. They continually scan emails for suspicious links and attachments, but even they were fooled. They didn’t think that a link to their own SharePoint Online would be malicious.
Another problem is that Microsoft link-scanning only goes one level down. It scans links in the email body but doesn’t scan files that are hosted on their services like SharePoint. If they did, they would have to scan for malicious links within shared documents.
And there’s another problem…they couldn’t blacklist the malicious URL unless they did this for the full URL for the SharePoint file. In this case, the hackers could just make a new URL in an uploaded file that contained content similar to SharePoint.
Since Microsoft isn’t scanning files hosted on SharePoint, hackers can easily use the platform to con their users and steal their credentials.
This scam exemplifies the risk associated with cloud-based applications. Using context and services that users are familiar with, cybercriminals can take advantage of a lowered level of alertness, and gain access to corporate resources online – all without the user or organization ever knowing it.
What Is Microsoft Doing To Prevent Scams Like PhishPoint?
Microsoft has been working behind the scenes to stop foreign attackers. Court documents that were unsealed on March 27, 2019 show that they’ve been waging a secret battle against a group of Iranian government-sponsored hackers.
Microsoft said it received substantial support from the domain registrars, which transferred the domains over to Microsoft as soon as the company obtained a court order.
What Can We Do To Prevent Being Affected By PhishPoint?
It’s important that you share this message with all of your users:
Be on alert! The bad guys have a new way of stealing your login credentials. They target you by sending an invite via email to open a SharePoint document.
The link takes you to an actual SharePoint page where you will see a OneDrive prompt. The prompt will have an “Access Document” link in it- don’t click this link!  
This link is malicious and will take you to a fake Office 365 login screen. Any credentials you enter here will be sent to the bad guys. Don’t be tricked!  
Whenever you’re submitting login credentials to any site, make sure to check the URL of the page for accuracy. Also, remember to always hover over links to see where they are taking you. Remember, Think Before You Click.
Here are some other things that you and your users should do:

Be wary of any email subject line that contains an imminent threat like “URGENT” or “ACTION REQUIRED.”
Always suspect URLs in the body of an email. It’s best not to click them. Most legitimate businesses no longer send links in emails.
Carefully review any logon page. Check to make sure that the URL is actually hosted by the service that you want to use.
If an odd-looking email shows up in your inbox from someone in your organization and you question its authenticity, contact the person by phone to see if they sent the email.
Use Multi-Factor Authentication for all of your software platforms and online accounts.
You should also sign up your users for Security Awareness Training. When you do, they’ll have a better chance of spotting the telltale signs of a cyber threat.

Are You Budgeting for Cybersecurity as You Would Other Expenses?

Are You Budgeting for Cybersecurity as You Would Other Expenses?

It’s difficult to scan through any news site and not see mention of yet another cybersecurity breach at an organization, and the devastation that can be caused to that business and the community are significant. Maintaining a robust cybersecurity presence is no different than budgeting for the cost of electricity to keep the lights on or the cost of basic internet — it’s something you simply have to consider. If your organization isn’t keeping cybersecurity top of mind, here are some suggestions for sharing the scale of the potential risk with your decision makers.
All Hail the IoT
We have been hearing a great deal about IoT (Internet of Things) in recent years, but the market may leave people wondering when the actuality will live up to the hype. Experts predict that 2019 will be the year that hackers truly take a shot at connected devices, looking for new and creative ways to infiltrate your networks and data centers. Nothing is sacred, as everything from wearables to connected toys and smart speakers are all potential attack vectors for the next generation of savvy hackers. This type of vulnerability is mostly preventable, as long as you’re actively managing endpoints and connectivity within your organization.
Malicious Mobile
As it turns out, your organization has more to lose from malicious mobile apps than thousands of hours of productivity (although that’s a problem, too!). Mobile attacks are becoming more evident with Symantec recently sharing that more than 24,000 mobile apps are blocked on a daily basis by their software. If your corporate mobile phones are connected to your network in any way and are infected, it could lead attackers directly into your data structures and other applications. It’s crucial that you protect all devices that can possibly connect to your network, or you risk a massive breach. A prime example is the recent hack of popular app My Fitness Pal, which could potentially be integrated into HR to track steps for corporate wellness programs. UnderArmor reported that this particular hack affected more than 150 million users of the app.
Costs of Ransomware
Ransomware is a significant cost for organizations — and it is growing every year. In 2017, the costs of damage to organizations from ransomware expanded to $5 billion — a number which increased a dramatic 15 times the 2015 expenses. Organizations regularly lose access to their records, but are often able to quickly return their business to full operations if they had previously invested in robust backup and disaster recovery solutions. An inability to regain operations within a few days can lead to long-term and drastic damage to the reputation and operations of an organization.
Machine Learning Gone Bad
There are many wonderful applications of machine learning, some of which exist in cybersecurity as engineers “train” systems to identify the hallmarks of an attack to trigger an action or notification. Unfortunately, hackers are also finding that there are opportunities within machine learning and artificial intelligence worlds, creating adversarial machine learning (ML) that will counter the work that these smart programs are meant to accomplish. Today’s hackers are starting to see how information technology professionals are utilizing ML as a defense, and creating countermeasures that will actually allow the cybercriminals egress into sensitive systems.
Carefully Watch Emails
In 2017, experts at Symantec found that the most significant attack vector for business was one that people use hundreds of times a day: emails. Phishing emails are becoming more targeted, as cybercriminals look for specific information about particular individuals on social media or in the news and then leverage that knowledge to create a customized attack. These so-called spear phishing emails often go after individuals at an organization who have access to sensitive data or financial power, such as an individual in the accounting or bookkeeping department. With today’s distributed workforce, it’s not unusual for traveling employees to need an advance on funds or find themselves in some sort of financial bind. Hackers are using this proclivity to create felonious requests — which can become untraceable once the transaction has been completed. Organizations combat these problems by creating an ongoing education program for staff members, especially those in sensitive positions.
How is an organization to survive when you consider all of these various threats, and the massive scale of the risk that is experienced on a daily basis? According to a recent report by Cisco, one of the key problems with an organization’s cybersecurity is having a variety of vendors providing support to the business. When you consolidate your operations with a single technology managed services provider, you’re more likely to incorporate a comprehensive approach to cybersecurity — a crucial step for the longevity of your business.