Friday, December 11, 2015

Microsoft withdraws update causing Outlook to start in Safe Mode

Microsoft withdraws update causing Outlook to start in Safe Mode


Microsoft has withdrawn the  released Windows Update KB3114409 because it causes Outlook to start in Safe Mode. This loads the email client without customizations and plugins. Fortunately it can be easily fixed

Microsoft's Patch Tuesday update KB 3114409, intended to help admins keep Outlook 2010 from starting in safe mode, has in fact done the opposite. Many Outlook 2010 customers report that installing KB 3114409 forces Outlook to start in safe mode.


As of early Wednesday morning, the patch has been pulled, but if you're experiencing odd problems with Outlook 2010 -- it opens in safe mode only (always opens maximized and has no sounds, no reading pane, or other view settings that stick), has broken templates, and much more -- you should look at the KB 3114409 article for instructions on how to remove the patch.
The patch was actually released to stop Outlook from starting in Safe Mode, but it appears something didn’t go the right way. Microsoft has decided to withdraw the update for now.

Users affected by the update can easily stop Outlook from starting in safe mode by uninstalling the KB3114409 update.

This can be done this way: Go to your Control Panel. Go to ‘Programs and Features’ and left click ‘View installed updates’. Find KB3114409 (tip: copy/paste KB3114409 and enter it in the search field at the top right) . Once you’ve found the appropriate update, click ‘Uninstall’.



For those of you on Windows 10's forced upgrade treadmill, note that Microsoft has pulled the patch, so you won't be forced to install it again.


We understand the specific needs of small and mid-sized businesses and our computer support engineers thrive in those environments. We know how to find and implement creative solutions that get enterprise-class results without an enterprise-class price tag. In fact, our entire business is designed to achieve one thing: to provide you with expert, fast and friendly service at a cost you can afford
So whether you need computer or network server support, data security and backups, or IT project planning and business network consulting, Spider Networks Inc is the best choice for professional, end-to-end local IT outsourcing. Give us a call today! 
Spider Networks inc
15751 Sheridan Street, #104
Fort Lauderdale, Florida 33331

Phone: (954)-647-9938  (305)-420-6643

Tuesday, December 8, 2015

Cyber attack vectors are growing 2016


It is not if you are going to be hacked but when


You can be phished,  spied on or attacked by a worm – the list of deadly attacks goes on. The types of malware and new attack vectors are growing at a frightening pace and trying to fight them off has become a daily concern

There is no escaping it – data breaches are on the increase and fines are only going to get bigger under sweeping changes in legislation. But all it takes is some common sense and a robust security strategy to ensure you aren’t in the firing line 


Although most cyber attacks are simple and predicable, it’s not always an outside threat that businesses need to be aware of. If employees are handling corporate information regularly, they may not always treat it with the care and attention required and this is where preventable data breaches can occur. All it takes is an employee to accidentally email the wrong person and the ramifications can be severe. 

Don’t leave the doors open
When it comes to securing devices, the obvious option is encrypting and password protecting data. IT needs to install tamper-proof encryption software at the endpoint so that all data on the devices is encrypted by default. Solid security policies, when paired with advanced device management features such as remote lock and remote wipe, go a long way in protecting sensitive business data from falling into the wrong hands.

The clear message is that businesses need to get their houses in order when it comes to security.

It is not if you are going to be hacked but when and this is something you can actively work to avoid.


Spider Networks is a leading network security consulting firm that has been utilizing a variety of tools and Best Practice methodologies that can protect your business internally and externally without hindering your business processes. The greatest threat to a business today is internal hacking from the company’s own employees. 

Security-consulting



Monday, November 30, 2015

Recovering from a Trojan Horse or Virus

 Recovering from a Trojan Horse or Virus


It can happen to anyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, but that does little to help you out of your current predicament. Once you know that your machine is infected with a Trojan Horse or virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), what can you do?

Best practice before it happens 

  1. A backup  will save Data, Time and money. In some cases fighting the virus and Trojan can cost more that replacing a machine. Acroniss and symantic are good choices from making full backup
  2. Most machines do not come with a recovery CD and needs to be created right after you purchase the machine 
  3. Keep all software that will be needed to recover the machine in a safe location.


 1. Call IT support
If you have an IT support department at your disposal, notify them immediately and follow their instructions. ( If not call Spider Networks Inc)
2. Disconnect your computer from the Internet
Depending on what type of Trojan horse or virus you have, intruders may have access to your personal information and may even be using your computer to attack other computers. You can stop this activity by turning off your Internet connection. The best way to accomplish this is to physically disconnect your cable or phone line, but you can also simply “disable” your network connection.
3. Back up your important files
At this point it is a good idea to take the time to back up your files. If possible, compile all of your photos, documents, Internet favorites, etc., and burn them onto a CD or DVD or save them to some other external storage device. It is vital to note that these files cannot be trusted since they are still potentially infected. (Actually, it’s good practice to back up your files on a regular basis so that if they do get infected, you might have an uninfected set you can restore.)
4. Scan your machine
Since your computer (including its operating system) may be infected with a malicious program, it is safest to scan the machine from a live CD (or “rescue” CD) rather than a previously installed antivirus program. Many antivirus products provide this functionality. Another alternative is to use a web-based virus removal service, which some antivirus software vendors offer (try searching on “online virus scan”).
The next best action is to install an antivirus program from an uncontaminated source such as a CD-ROM. If you don’t have one, there are many to choose from, but all of them should provide the tools you need.



Friday, November 27, 2015

Dell Slammed For Shipping Computers With superFish Security Flaw


Dell Shipping pre-installed on some Dell laptops.


 Here’s what you need to know about this Superfish-like vulnerability, and how you can check to see if your Dell laptop is affected.



The certificate, called eDellRoot, causes any affected computers to trust any SSL certificate it signs. Because the key is stored locally, an attacker could forge a signed key and expose users on the machine to man-in-the-middle SSL attacks. According to the US Comptuer Emergency Readiness Team (US-CERT), that means you could be vulnerable to an attacker impersonating web sites (even ones that look like they’re HTTPS.) A falsely signed certificate can also let an attacker send email or sign and install software that slides past Windows’ built-in security or your anti-malware tools. Additionally, any encrypted network traffic and other data could be accessed and captured by the third party, HTTPS traffic to legitimate sites can be captured and decrypted.

The Dell Inspiron 5000, XPS 15, and XPS 13 have the certificate pre-installed, but Dell is still unsure how many computers out there are actually affected

Fortunately, Dell has already provided a fix for finding the certificate and revoking its permissions. It can be a complicated task for those who don’t normally go digging in their operating system, but Dell has issued step-by-step instructions for removing the certificate. If your machine is affected, it’s important to remove the certificate and the DFS component that re-installs the certificate.




Click here for removal instructions from Dell

You can read the statement Dell issued at the link below. We’ll update this post as we learn more.

Update: Dell has included an automatic removal tool in its certificate removal instructions to make the process much easier (link is on page 3). Dell will also push a software update starting sometime today that will check for the certificate, and if detected remove it. Lastly, we mistakenly recommended a check tool from security researcher slipstream/RoL, but this tool actually checks for another issue related to the same software.

Update Two: Security researchers have found a second certificate (DSDTestProvider) that allows attackers to create trusted certificates and perform impersonation, man-in-the-middle, and passive decryption attacks. CERT recommends you revoke the certificate using Windows certificate manager (certmgr.msc)

Response to Concerns Regarding eDellroot Certificate

Thursday, November 19, 2015

Computer IT management solutions

Reliable and proactive IT management solutions


A comprehensive business technology management solution that delivers proactive monitoring, maintenance and IT support all for one monthly flat fee for businesses that requires full control, increased productivity and peace of mind

Reduce your Risk,reliability and cost of ownership by automating the infrastructure


#computerconsultant #cybersecurity #browardcomputer #Managedservices
 
 
Network Management
 
 
With around the clock network monitoring, we are able to proactively respond to alerts and avoid downtime and identify bottlenecks.
 
 Managed Security
 
Dedicated team of Engineers, your end user receive rapid response and support (onsite, remote) from engineers they know.  
 
 

Protecting your business from today’s malware and cyber-attacks by deploying the required security measures to protect your business.
 
Servers Management 
 
Scheduled maintenance tasks such patching, firmware updates and optimization insures servers are running with optimum stability.  
 
 
Disaster Recovery
 
Design, implement and manage your business backup and disaster recovery plan, allows us to bring you back in business faster.  


Reporting
 
Scheduled systems performance and asset reports as well as  quarterly review with your IT manager to discuss goals and current issues. 

Monday, September 21, 2015

Recover from Ransomware

Stand Up to Ransomware with a Backup
Imagine you are an IT administrator at a small company of 30 people or so. You juggle hardware, software, the network – and even phone systems and the occasional electrical failure or power outage on any given day. So, when your CEO calls you and says, “I cannot open my sales forecast file,” you rush into action. You check your CEO’s PC and find that the file is somehow corrupted. Then you notice a small red icon at the bottom corner of the desktop with a prompt reading: “Your files have been encrypted. Pay $500 for a decryption key within 10 days or your data will be deleted — click here for payment instructions.”
After the initial shock, you realize that you have been infected by Ransomware – a type of malware that blocks access to files or your systems until the ransom is paid. There are many types of ransomware, including Reveton, Cryptolocker, Winlocker, and Cryptowall, and for many the antidote may not be available yet. According to McAfee Labs Threats Report (February 2015), each quarter the number of ransomware types grows on average of 155%.
What Would You Do?
Think about what you would do if ransomware hits your company. Would you pay? Unless you can find an antidote out there – you may have no way to restore your data. Remember, even if you did pay, there is no guarantee that the attacker would decrypt your data and not just disappear.

However, what may come as a surprise to you is that the universal solution against ransomware has existed for years. In fact, it has existed even longer than ransomware itself:

It's called Backup!
Don't just backup the data back up the entire machine!
Test you backup on a regular basis
Finding out that it is not working when you most need it is not the time to find out it has not been working
Redundancy is also key in having a good disaster recovery in place

Acronis is a great inexpensive way to backup a machine 

Need help call Spider Networks today 954-647-9938

Click here to view our website


Monday, August 24, 2015

Not Backing Up Your Computer. Do It Now

Not Backing Up Your Computer. Do It Now

All machines fail at some point in their life for one reason or the other.
It never fails that I get a call from somebody that gets a virus, accidentally deletes a file or the hard drive fails.
Family pictures or corporate files that were saved to a local machine without a backup can be a disaster.
Most of us are friends with Gandalf the wizard but have yet been able to get that pesky magic spell out of him

Until one of us gets the magic spell the best practice is to back everything up

By backing machines operating system along with all of the files  it can save money and the machine

The risks are high even if you are doing everything correctly, have a firewall and desktop antivirus things are going to fail or get past.

Windows updates can stop third party software from working, a email attachment can install a virus or a Trojan and without a backup you can lose everything

Reduce the cost and protect you Data by having a full backup

It’s easy and everyone can do this for themselves. The product that Spider Networks recommends is Acronis. It not only backs up the machines files but does a complete system backup.

Store your backup locally and  to the cloud


Read more about it here 





Saturday, August 22, 2015

Don't Trust Links Sent in Email Messages

Don't Trust Links Sent in Email Messages

A common method cyber criminals use to hack into people’s computers is to send them emails with malicious links. People are tricked into opening these links because they appear to come from someone or something they know and trust. If you click on a link, you may be taken to a site that attempts to harvest your information or tries to hack into your computer. Only click on links that you were expecting. Not sure about an email? Call the person to confirm they sent it