Cryptolocker Ransomware Protection

We are pleased to make available to all our customers free of charge a utility to help protect your computers from CryptoLocker Ransomware.

You can download it from here:

http://warringahit.com.au/bin/CryptoPreventSetup.exe

1) Click the link to download the software then save it to your desktop

image

2) Double click to install the software

image

3) Apply the protection

image

image

4) You will see a splash screen while the software is installing

Software Artwork 3

5) Let it restart your computer

image

6) You will see an entry in your Start Menu called Warringah IT

Underneath Warringah IT is a folder called Cryptolocker Prevention

You will see icons Apply, Test, Undo, Uninstall, Update and Whitelist

image

These icon allow you to re apply the protection if you are not sure. Test the protection. Undo the protection. Uninstall the protection. Update the protection and white list genuine applications they may get blocked by the protection.

7) The software is provided as is, with no warranty or guarantees.

One benefit is that this software will also block other types of infections running on your computer.

If you need support with this tool, please don’t call the office. Please only emailsupport@warringahit.com.au

Posted in General | Leave a comment

CryptoLocker Ransomware Protection – please read – this information is for your benefit

CryptoLocker variants are hitting Australia hard. With Christmas fast approaching we will be seeing more and more of this.

Please don’t let it be you that gets hit next. Please read and pass on to help someone else.
If you infect your computer you will lose your data. Please understand this – YOU WILL LOSE YOUR DATA.

If you are a business owner – demand your staff follow the rules below.

What you need to do3 simple rules
1) DON’T click on ANY links in ANY emails.

2) DONT open files sent to you in ANY email

3) DON’T be fooled by Bank emails, courier emails, Australia Post emails, Electricity emails, Apple verification emails and traffic fine emails. Stop and think before you click.

Again

1) DON’T click on ANY links in ANY emails.
Instead, hover your mouse over the link to see where it wants to take you. You will then see if it legitimate of not.?

2) DONT open files sent to you in ANY email
You might have received an attachment called courier.pdf.exe but it your computers isn’t displaying hidden files you will see the file as courier.pdf. This tricks you into running a malicious program.

3) DON’T be fooled by Bank emails, courier emails, Australia Post emails, Electricity emails, Apple verification emails, and traffic fine emails.
As everyone uses these services, it’s a simply social engineering technique to trick you. Don’t click on the links and don’t run the attachments. If you are not sure ask us to check it for you.

IMPORTANT – if you get this infection you will lose your data with the only way to get it back is pay a large ransom with no guarantee or rely on an offline backup that wasn’t attached to your computer at the time.

Posted in General | Leave a comment

Cryptolocker Ransomware Protection

Last year CryptoLocker Ransomware was the most dangerous security threat we have seen. As a result we got a tool built to help combat it.

The tool is still available on our BLOG – http://www.warringahit.com.au/blog/

UPDATE – we are now seeing this threat hit Australia in new variants making it hard for anti-virus to detect it. Here is a good article on it –

http://www.smh.com.au/it-pro/security-it/hackers-lock-up-thousands-of-australian-computers-demand-ransom-20140917-10hyyh.html

What you need to do
3 simple rules

1) DON’T click on ANY links in ANY emails.

Instead, hover your mouse over the link to see where it wants to take you. You will then see if it legitimate of not.

2) DONT open files sent to you in ANY email

You might have received an attachment called courier.pdf.exe but it your computers isn’t displaying hidden files you will see the file as courier.pdf. This tricks you into running a malicious program.

3) DON’T be fooled by Bank emails, courier emails, Australia Post emails, Electricity emails etc.

As everyone uses these services, its a simply social engineering technique to trick you. Don’t click on the links and don’t run the attachments. If you are not sure ask us to check it for you.

IMPORTANT – if you get this infection you will lose your data with the only way to get it back is pay a large ransom or rely on an offline backup that wasn’t attached to your computer at the time.


What is Warringah IT doing to help combat this

1) We have a prevention tool available at no cost to you – see our BLOG
2) Follow the 3 simple rules above
3) We are working on an anti-virus software improvement to help stop this malicious threat.More information coming soon.

Crytoloker Protection install instructions are below

Posted in General | Leave a comment

Cryptolocker Ransomware Protection

 

We are pleased to make available to all our customers free of charge a utility to help protect your computers from CryptoLocker Ransomware.

You can download it from here:

http://warringahit.com.au/bin/CryptoPreventSetup.exe

1) Click the link to download the software then save it to your desktop

image

2) Double click to install the software

image

3) Apply the protection

image

image

4) You will see a splash screen while the software is installing

 

Software Artwork 3

5) Let it restart your computer

image

6) You will see an entry in your Start Menu called Warringah IT

Underneath Warringah IT is a folder called Cryptolocker Prevention

You will see icons Apply, Test, Undo, Uninstall, Update and Whitelist

image

These icon allow you to re apply the protection if you are not sure. Test the protection. Undo the protection. Uninstall the protection. Update the protection and white list genuine applications they may get blocked by the protection.

7) The software is provided as is, with no warranty or guarantees.

One benefit is that this software will also block other types of infections running on your computer.

8) If you need support with this tool, please don’t call the office. Please only email support@warringahit.com.au

Posted in General | Leave a comment

Cryptolocker Ransomware: What You Need To Know

A new threat is doing the rounds on the internet called Cryptolocker Ransomware. It is spread via email attachments.

Please spend the time to read all of this email as the information contained is for your benefit.

This Ransomware is particularly nasty because infected users are in danger of losing their personal files forever. Even their backups can be destroyed.



How it works

If a user who receives the Ransonware in their email (an attachment), runs the attachment, they could harm their system.

Their personal files are encrypted with the only way to decrypt them is to pay a ransom of $300.

Let me repeat, even your backups can be destroyed.


What you need to do

Luckily we haven’t had a customer infected yet and lose their files but this threat is rapidly spreading throughout the USA and will soon be prominent here in Australia.

Please do the following:

1) Don’t open ANY email attachments received in your email no matter who they are from. Delete any that are random, unexpected or suspicious.

2) If you think the file is genuine, instead, save the attachment to your desktop. Right click the attachment in your email to access the save option.

3) Now minimise your email application, locate the file you just saved on the desktop, then right click the file and choose “Scan with Managed Antivirus”

4) Don’t install any pirated software or download illegal music and movies as the threat can be hidden inside.



What is Warringah IT doing to help stop this?

1) Firstly, we are letting you know about this particularly nasty threat.

2) For those of you on our Managed Services system, we have been busy pushing out updates to your computers.

3) We have told computers to restart to allow updates to complete correctly. IF you have noticed messages about your IT support has initiated a restart, don’t be alarmed, that it us.

4) We have increased the scope of time and frequency of quick scans and full scans on your computers.

Why are they doing this?

Simple answer. Money. There are scams everywhere in today’s life. This is just another one.

What else can you do?


1) Check your anti-virus.

For customers with our Managed Services system, in the system tray (near the clock) right click the blue (or green if its running a scan) icon called Managed Antivirus, then choose Open Managed Antivirus.

Now check the updates section to make sure it says “Current”. If it doesn’t say Current you can ask it to perform an update.

2) Patch your applications
. Open your web browser and go to www.ninite.com
Ninite is a tremendously useful utility to automatically update your applications.

Once you are at the website you will see a list of applications that you can install on your computer.

Choose the following:

Web Browsers – Chrome, Firefox
Messaging – Skype
Media – iTunes, QuickTime
Runtimes – Java, .NET, Silverlight, Air, Shockwave
Documents – Reader, Foxit Reader, CutePDF
Security – Malwarebytes
Developer Tools – FileZilla, Notepad++, WinSCP, PuTTY
Other – Google Earth
Compression – Z-Zip

Click Get Installer. Save the file to your desktop. Now close every open program on your computer. Go to your desktop, locate the file you just downloaded, double click it to start the update process.

Sit back and let it get to work.

3) Learn about the file system.

By default, your computer doesn’t display file extensions. Virus writers know this. So they quite simply name the file “attachment.PDF.EXE” but on your computer it simply displays as “attachment.PDF” (hiding the EXE)

This may give you the false confidence that the file is OK to open.

Zip files are another method they use to get people to infect their computers. Firstly, you receive an email with an attachment with a name like attachment.ZIP. A users double clicks this file which opens the program used to extract files from inside the ZIP file.
I
nside the ZIP file is another file like “attachment.PDF.EXE” but on your computer it simply displays as “attachment.PDF” (hiding the EXE)

This may give you the false confidence that the file is OK to open.

EXE files are dangerous. EXE means executable, meaning when you click on it, it executes commands on your computer.

4) Unhide file extensions.


This is an important step. By just doing this step below it will go a long way to stopping you from running something you shouldn’t.

When we setup computer we like to show file extensions. This helps educate users to understand more about their computer and file extensions.

To show file name extensions in Windows Explorer, follow these steps:


For Windows Vista, Windows 7

Start Windows Explorer, you can do this by opening up any folder.
Click Organize.
Click Folder and search options.
Click the View tab.
Scroll down until you notice Hide extensions for known file types, un-check this line by clicking the check box.
Click OK

For Windows XP

Start Windows Explorer, you can do this by opening up any folder.
Click Tools, and then click Folder Options.
Scroll down and then click Folder and search options.
Click the View tab.
Scroll down until you notice Hide extensions for known file types, un-check this line by clicking the check box.
Click OK

What to do if you get this Ransomware?

Turn off your computer straight away.
Don’t try to solve it yourself as you will allow the threat to run and encrypt your files.
Don’t pay the ransom.
Don’t ignore it, it will not go away. It will encrypt your files, AND your backup meaning little chance of getting any of your personal files back.

Posted in General | Leave a comment

Good Password Practices

1) DO you know what your internet service provider password is?

If you have an internet connection issue this is the most important thing IT people need to solve it

There is also no need to change this password once you know what it is

2) DO you know what your email password is and is it recorded somewhere safe?

When I ask a customer what their email passwords is, the majority say “I don’t have a password for my email”

Everyone has a password for their email, otherwise anyone could get anyone else’s emails.

3) DO use random generated passwords

A unique password for each site, bank, device, service, social media is a good idea

If you use the same password across multiple accounts there is a greater chance of having your account hacked

4) DO record your passwords somewhere safe

You could use a little black book, a password software application, an excel spreadsheet that you password protect.

If you write passwords down, use your own “code” for the description of each.

If you follow these basic rules you will go a long way to not having your data compromised, your identity stolen and your business embarrassed.

20120916heneedsabetterpassword

Posted in General | Leave a comment

Why we recommend TPG for your internet connection

Who are TPG?

TPG is an Australian owned internet service provider (ISP).

They provide ADSL internet connections to home and business users.

They also provide wireless internet connections as well as mobile phone services.

Why does Warringah IT recommend TPG?

Firstly, they are easy to deal with. New internet connections are done with a minimum of fuss.

Their installations are automated and rarely do we need to actually speak to them for a new connection setup.

Their schedules are accurate – when they say something will be done by a certain time – it is.

TPG Support

We have direct access to their support team. They will answer our call in a few rings and have the required tools to diagnose internet connections.

TPG have the task of dealing with Telstra when it comes to getting phone line issues sorted.

They seem to be able to get the best out of Telstra.

TPG Value

TPG give excellent value for money. They don’t count uploads like Telstra does for example. They provide static IP addresses making remote access much simpler.

Their download limits are very generous for a low monthly rate.

Warringah IT is an authorised TPG partner. We organise TPG services making it much easier for our customers.

Posted in General | Leave a comment

Did you know that Your Fujitsu is a division of Warringah IT?

WIT is happy to report that we had our lovely Fujitsu reps come out to see us during the week. It was great being able to have the first look at the new line of products and notebook models that are about to be released later this year including ‘Ultrabooks’ and ‘Slates’.
Once they have come off the production line, you guys will be the first to know about it!

We are also very excited to report that we have been working hard on improving our current website that is dedicated to Fujitsu products, and are hoping to have it up and running with a functional shopping cart by early next year.

Fujitsu does not just supply air conditioners, they also provide ICT expertise and world-class hardware that delivers results. They are a highly trusted organisation of more than 170,000 employees across over 100 countries. Over 5,000 of those employees are in our region. Fujitsu has been providing solutions to Australia for over 30 years and is the 3rd largest ICT Company in Australia and New Zealand.

Did You Know?

· Fujitsu is the world’s third-largest IT services provider and No.1 in Japan.

· Fujitsu is among the world’s top five providers of servers.

· Fujitsu customers include nearly half the Fortune Global 500.

· Fujitsu Group holds about 102,000 patents worldwide.

· Fujitsu is included in the Dow Jones Sustainability Indexes (Asia Pacific), FTSE4Good Index Series, and Oekom research.

clip_image002

Shaping Tomorrow With You

Posted in General | Leave a comment

Windows Keyboard Shortcuts

20 Windows Keyboard Shortcuts You Might Not Know

Global Windows Shortcuts

Win+1, 2, 3, 4, etc. will launch each program in your taskbar. It is helpful then to keep your most used programs at the beginning of your task bar so you can open them one right after another. This also works in Windows Vista for the quick launch icons.

Win+Alt+1, 2, 3, etc. will open the jump list for each program in the taskbar. You can then use your arrows to select which jump list option you want to open.

Win+T will cycle through taskbar programs. This is similar to just hovering over the item with your mouse but you can launch the program with Space or Enter.

Win+Home minimizes all programs except current the window. This is similar to the Aero shake and can be disabled with the same registry key.

Win+B selects the system tray which isn’t always useful but can come in very handy if your mouse stops working.

Win+Up/Down maximizes and restores down the current window so long as that window has the option to be maximized. It is exactly the same as clicking on the middle button on your windows.

Alt+Esc is like Alt+Tab but switches windows in the order they were opened and does not have the fancy window preview overlay.

Win+Pause/Break will open your system properties window. This can be helpful if you need to see the name of a computer or simple system statistics.

Ctrl+Esc can be used to open the start menu but will not work as a Windows key replacement for other shortcuts.

Ctrl+Shift+Esc will open the task manager without needing to hit Ctrl+Alt+Del first.

Alt+Space will open the window system menu which can be used to maximize (x), minimize (n), close (c), or move (m) the window which can be especially helpful if your window is somehow off-screen. This shortcut can also be helpful with windows that don’t close with the Alt+F4 shortcut such as the command window.

Windows Explorer Shortcuts

Alt+Up will navigate up one folder level since the up arrow on the menu bar was removed in Windows Vista. Alternatively, you can also make Backspace go up one folder level with a handy AutoHotKey script.

Shift+F10 opens the contextual or “right click” menu for a file/folder. This can be very handy for speed especially if you know which option you want to select. Look for an underlined letter in each option to know which letter you can press for faster access.

Shift+Del deletes a file without sending it to the recycle bin because who wants to empty their recycle bin anyway?

Ctrl+Shift+N creates a new folder in your current directory.

Alt+Enter opens the file properties so you can view file size, sharing settings, and creation date.

F2 renames a file or folder.

F3 will open explorer and select the search bar. If you already have an explorer window open it will highlight the search bar. In some programs it will also open the search dialog to search within that program.

F6 cycles objects in the current window. In explorer this will cycle between the location bar, options bar, left pane, and right pane. It also works with varying success in other programs.

F10 toggles the file menu in explorer.

Posted in General | Leave a comment

Clean Up Your Computer With CCleaner

CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small, fast download.

CCleaner use to be called Crap Cleaner for obvious reasons.

Download it from here:

http://www.warringahit.com.au/bin/ccsetup.exe

Save it to your desktop then double click the icon to install it.

Open CCleaner by double clicking the Desktop Icon

clip_image002

clip_image004

Click the Run Cleaner button

Soon you will have a result which will show you how much it removed

clip_image006

You can run CCleaner as much as you like. A quick way is to right click the Recycle Bin and choose “Run CCleaner”

clip_image008

Posted in General | Leave a comment