logotype
  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ

Call or Text!

(203) 693-1912

logotype
  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ
logotype
  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ

Call or Text!

(203)693-1912

  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ
logotype
logotype
  • Home
  • About Us
  • Blog
  • Contact
  • Services
  • FAQ

Tag: Security

EmailInternet Safety
Ryan DaileyJune 15, 2024 0 Comments
Share article:Facebook
170 Views
40 Likes

Protecting From Malicious Emails

Protecting From Malicious Emails

In the modern digital world, email remains a fundamental communication tool, both personally and professionally. However, it also serves as a common vector for cyberattacks. This not only affects your work email. Your personal accounts will be part of these malicious campaigns as well. No one system is perfect and we must understand how to protect ourselves from these threats. Here we will go over the ways to recognize malicious campaigns and how to protect yourself.

Different Types of Malicious Emails

Malicious email campaigns are not just run from individual threat actors but actually can be purchased as a service. These campaigns attempt to deceive you to providing information or have you perform a task. Here are some of the most common types of malicious emails:

  • Phishing: Just like fishing in the sea and pronounced the same way, attackers cast a wide net sending emails to lots of people. These emails look to have you provide them with sensitive information, but not limited to logins for banking or email accounts.
  • Spear Phishing: Just like phishing, this is a more focused attack. Threat actors research you specifically to maximize deception.
  • Malware: Emails containing attachments or links that can install harmful software or have forms that require you to login.
  • Business Email Compromise: Emails that impersonate individuals within an organization to deceive you into performing a task or providing information.

How to recognize malicious emails

Now that you know the types of campaigns, here are some ways to recognize the red flags in emails:

  • Suspicious Email Address: Check the senders email address. This is sometimes confused with the “Display Name” or the name typically listed for the email address. Typically, on a mobile phone, you need to click on the name in the email to expose the actual email address. Email addresses might be close to the legitimate one but pay close attention.
  • Urgent Language: Threat actors will use verbiage requiring immediate action or require you to only respond to them via email.
  • Poor Grammar and Spelling: Reading the email typically will have poorly written English. Now with AI, threat actors will use AI to generate malicious content in near perfect English so this may not be as effective as time goes on. This will also include not typical greetings such as “Dear Customer”.
  • Unexpected Attachments or Links: Be cautious with any attachments or links. Even from known senders.

Best Practices for Protecting Yourself

In a previous blog post, Keeping You and Your Accounts Safe, we discuss ways to protect your accounts. In addition to those methods, here are some things you can do to further protect you and your devices:

  • Don’t Engage: While it may seem tempting to want to engage in the emails, do not respond or interact with attachments or links if any red flags are raised.
  • Report the Email: Most email providers will have a report button to flag the email. This helps protect you and potentially other email accounts from the same malicious campaign.
  • Delete the email: Delete the email from your inbox and forget about it.

Please be sure to check out the previous blog which 2FA, Anti-virus, password managers and much more is discussed.

 

These malicious email campaigns account for 74% of cyber breaches and attacks and are only going to rise. You are the first line of defense against threat actors. Be sure to backup your data and stay alert. Here is a video on how easy it is to fall victim:

READ MORE
Wireless
Ryan DaileyFebruary 24, 2024 0 Comments
Share article:Facebook
164 Views
27 Likes

Upgrade Your Wireless

Upgrading Your Wireless

In today’s hyper-connected world, where the demand for robust and reliable wireless connectivity continues to surge, businesses and individuals alike seek innovative solutions to meet their networking needs. Amidst this landscape, Ubiquiti stands out as a beacon of excellence in providing cutting-edge wireless solutions that redefine connectivity standards. From small-scale setups to enterprise-grade networks, Ubiquiti offers a diverse range of products tailored to deliver seamless connectivity experiences. Let’s delve into the world of Ubiquiti wireless solutions and explore how they are revolutionizing the way we connect.

At the core of Ubiquiti’s wireless solutions lies a commitment to technological innovation and performance excellence. Leveraging state-of-the-art hardware and software engineering, Ubiquiti products are engineered to deliver unparalleled reliability and performance. Whether it’s indoor access points, outdoor wireless bridges, or enterprise-grade switches, Ubiquiti’s product lineup is designed to cater to diverse networking requirements with precision and finesse. This dedication to quality ensures that users can enjoy fast, stable, and secure wireless connectivity across various environments, empowering businesses to thrive in today’s digital landscape.

One of the key distinguishing features of Ubiquiti wireless solutions is their scalability and flexibility. Whether deploying a network for a small office or a sprawling campus, Ubiquiti’s modular approach allows for seamless expansion and customization. The UniFi ecosystem, for instance, offers a unified management platform that simplifies network administration and monitoring, making it effortless to scale up or down as needed. This flexibility not only streamlines deployment processes but also future-proofs network infrastructure, ensuring that it can adapt to evolving technological requirements with ease.

Security is paramount in today’s interconnected world, and Ubiquiti wireless solutions are engineered with robust security features to safeguard sensitive data and protect against cyber threats. With advanced encryption protocols, secure authentication mechanisms, and built-in threat management tools, Ubiquiti products provide a fortified defense against unauthorized access and malicious activities. Whether it’s securing Wi-Fi networks in a corporate environment or safeguarding public hotspots, Ubiquiti’s comprehensive security features offer peace of mind to users and administrators alike.

In addition to performance and security, Ubiquiti wireless solutions are also renowned for their affordability and cost-effectiveness. By eliminating unnecessary overheads and focusing on delivering value where it matters most, Ubiquiti has democratized access to high-quality networking infrastructure, making enterprise-grade technology accessible to businesses of all sizes. This affordability extends beyond the initial investment, with low maintenance requirements and energy-efficient designs helping organizations save on operational costs in the long run. As a result, businesses can achieve optimal connectivity without breaking the bank, empowering them to allocate resources more efficiently towards their core objectives.

In conclusion, Ubiquiti wireless solutions represent a paradigm shift in the realm of connectivity, offering a potent blend of performance, scalability, security, and affordability. Whether it’s empowering businesses to unlock new opportunities, enabling seamless collaboration in educational institutions, or enhancing connectivity experiences for individuals, Ubiquiti’s innovative products are driving positive transformations across diverse sectors. As we continue to embrace the digital age, Ubiquiti stands as a beacon of reliability and innovation, shaping the future of wireless connectivity one breakthrough at a time.

READ MORE
Internet Safety
Ryan DaileyJanuary 29, 2024 0 Comments
Share article:Facebook
298 Views
42 Likes

Keeping You and Your Accounts Safe

Keeping You and Your Accounts Safe

It’s now 2024 and no account is safe. Passwords are becoming less and less secure even though you meet the requirements of the site. Uppercase, lowercase, number, special character and a minimum of 8 characters being the standard still isn’t enough. This is due to all the data breaches from many companies. Compound this with many users using the same password across many services and sites. We will discuss how you can keep your accounts and services safe from most forms of breaches.

Passwords Are The Way of The Past

Passwords are becoming less and less secure. You may be increasing the character count from 8 to 12 or adding in a couple special characters but that still doesn’t make much of a difference. Hackers are aggregating all this data and using it in attacks. ‘RockYou’ is one of the most famous password lists put together comprising of over 14 million passwords aggregated from data breaches. Now with A.I., it’s become even easier for passwords to be cracked.

Brute Force Passwords 2023
This chart shows you just how quickly a password can be cracked based on length and complexity.

So, What Can I Do?

Utilizing 2FA (Two Factor Authentication) or MFA (Multi-Factor Authentication) is the most popular and effective way to help prevent a breached password from being used against you. Rotating passwords or updating them every so often will help thwart hackers. Make sure the wireless networks you connect to are secure. When on unsecured networks, use a VPN, and always have a good antivirus package or EDR (Endpoint Detection & Response) to protect your accounts and devices. Subscribe to services to know your current exposure out on the internet and the dark web. Also limit what information you post on social media.

2FA/MFA

Utilizing some form or 2FA or MFA is paramount to keeping modern accounts and services secure. Hackers are counting on you to not use these methods. Just by enabling 2FA/MFA, you can block 100% of the automated bots, 96% of phishing attacks, and 76% of targeted attacks for most services. While this is an additional step to your login process, taking the additional 3-5 seconds to secure your account at login will ensure your accounts and privacy are safe. MFA is referred to as (i) something you know (e.g., password/personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric).

Something you know:

Remembering all your passwords is extremely difficult especially if you have different ones for each service as recommended. Luckily there are password managers that help combat having to remember all those passwords. Applications such as Bitwarden provide a free service for securely storing and inputting your credentials on websites, services and apps. Bitwarden allows you to add their plugin on all major browsers as well as apps for mobile devices and is a must for anyone needing to access just about anything. These passwords will then sync between all devices. Bitwarden will also allow you generate random passwords based on your password requirements. Now there are other options for this out there but this will provide you with a great free option with very affordable paid options to expand on their free offerings. They also support a self-hosted “vault” for those who don’t trust the cloud offerings. Bitwarden has paid options which greatly expand upon their free tier especially for families or businesses needing to share credentials. Should you want to use more memorable passwords instead of randomly generated strings, I highly recommend using phrases or string of words. Examples of this can be I-Like-My-Passwords-Secure or MyPasswordisSuperSecure!. Avoid using words such as pets names, birthdays, or kids names which can easily be looked up via social engineering.

Something You Have:

Securing your account additionally from a secure password includes using a 2FA/MFA software or hardware token and SMS tokens. Popular software tokens include Google Authenticator, Authy and Microsoft Authenticator. Most services will allow these applications to generate a time based six-digit token that typically changes every 30-60 seconds. Most importantly these services will generate backup/recovery codes that should be stored in a physically secure location and not electronically. Should you loose access to your 2FA/MFA token, these recovery codes will allow you temporary access to your account and setup your authenticator of choice again.

Hardware tokens can also be utilized while being less common in the wild for regular users. Hardware tokens can be a battery powered device that generates a six-digit token every 30-60 seconds that you have on your person. These can easily attach on your keys. Another form of Hardware Token is a device such as a Yubi Key. Yubi keys are a hardware token you plugin to your devices and can have an additional authentication method such as biometrics.

Something You Are:

Physical devices such as Yubi Keys or hardware tokens with biometric scanners and other USB biometric scanners are a way to identify yourself physically satisfying the third method of MFA.

Monitoring Breaches:

Monitoring breaches has never been easier. One method for identifying if your account or password has been a part of breach is by visiting https://haveibeenpwned.com/. This site is run by a Microsoft security researcher who aggregates as many breaches as he can with almost 13B accounts currently listed. You can enter in your email address(s), passwords and phone number to see if you have been breached. You can also have the site notify you if your account comes up in any breaches.

Other services like Google will monitor your presence on the dark web as well as publicly available information on websites. Depending on the site, you can have Google request your removal of data from these sites. Google will not request your data be removed from public records or government sites. Google will notify you if your data shows up on the dark web so you can make changes to your accounts should your information be out there.

Anti-Virus and EDR software:

Anti-Virus or EDR software won’t keep your accounts from being breached per se but will help keep malware or credential stealing software off your computer. While there are free options out there, I do not recommend them by any means as they usually are behind with definition updates leading to potential attacks slipping through. Popular services include ESET, Bitdefender, CrowdStrike and SentinalOne to name a few. These will help protect you from common threats, potentially compromised websites, phishing emails and more.

VPN’s and Unsecure Networks:

Going to your favorite coffee shop and using their free WiFi isn’t all it may be cracked up to be. There is potential for someone to be there “sniffing” the wireless traffic waiting for some data to be transmitted that can easily be read or decoded. To combat this, only connect to secure networks minimally containing a password. Turn off your WiFi, Bluetooth and NFC connections when not in use. Hackers can fairly easily exploit these connections with fairly simple and inexpensive devices. When using the WiFi on a public network, use a VPN service such as Private Internet Access or NordVPN. These services will allow you to encrypt your traffic over the public network. This will assist you in preventing your data being transmitted and received on the wireless from being decrypted and used against you. Phones have hot spot options as well for a laptop to connect wirelessly via your phone using it’s cellular connection.

Social Media and You:

Social Media is the most used applications to date. We willing post so much information out on the internet and most times not even realizing what information we are posting. Did one of your friends post one of those questionaries about what’s your favorite color, your best friends name, year your graduated high school? Do these questions sound familiar? They should because you probably used them for password reset questions. Hacker’s love collecting social media posts and generating a profile on you. With enough information, hackers can pretend to be you and change your account information via a support call to major carriers and services. Be careful what you post out there. Even seemingly innocent posts such as pictures of your favorite things is enough for hackers to build their own profile on you. Be sure to review the information you post and who has access to seeing that information. Check your friends lists and make sure you know everyone. Even then, your friends and family accounts can be compromised. Best rule of thumb is that if you have even the slightest inkling that the message or post is sketchy or off from normal posts, it more than likely is an should not be interacted with.

Bonus Tip:

If you need to send someone a password, credit card number or any other sensitive information, please do not send it via email. Should your account get breached, hackers can search through and look for that information. Free services such as Password Pusher allow you to securely send credentials or any other text for free securely. You can limit the number of views and number of days the link is active for. You can even add an additional custom password that needs to be entered when opening the link.

Conclusion:

Hopefully you were able to learn some new ways to secure your accounts and keep yourself safe out on the internet. Should you wish for a security audit, recommendations on what you can be doing different or implementing these methods don’t hesitate to contact us. Either email us at daileycomputing@gmail.com or reach out via call or text to 203-693-1912. Also be sure to review our previous and future blog posts to keep you and your devices secure.

READ MORE
Network Security
Ryan DaileyJanuary 26, 2024 0 Comments
Share article:Facebook
172 Views
29 Likes

Protecting Your Home Network

Protecting Your Home Network

Securing your home network doesn’t need to be complicated. One effective way to enhance security is by implementing a DNS (Domain Name System) filtering system. This not only guards against common threats but also reduces unwanted ads during your internet browsing. In this guide, we’ll delve into the significance of DNS, how it contributes to protection and network monitoring, and explore diverse options to fortify your home network and privacy. While we won’t provide step-by-step installation instructions in this article, we aim to inform you about some of the available choices to empower you in safeguarding your home network.

What is DNS?

DNS, or Domain Name System, acts as a translator for computers. It converts human-readable domain names (like Google.com) into IP addresses that computers comprehend. This translation is akin to providing the internet’s equivalent of a mailing address. DNS servers, which can be provided by your ISP or major players like Google, Cloudflare, or Quad9, handle this translation process.

How does DNS filtering protect me?

DNS filtering involves checking domain names against known blacklists. If a domain is found on one of these blacklists, the request is blocked—a process referred to as “sinkholing.” This provides protection against clicking on links leading to phishing websites in emails or mistyped domain names, while also blocking ads.

How can I protect my network and/or devices?

There are various methods to protect your devices and network. These include, but not limited to, locally hosted software, cloud based or browser based protection. 

Dedicated locally hosted network device:

Examples: PiHole and AdGuard Home on a Raspberry Pi or other computer devices.

Pros: Offers high protection, automatic and invisible to devices. Logs queries for review via web interface. Can manually import lists based on need.

Cons: Requires initial manual setup and tuning. Some websites may detect and request to disable the ad blocker temporarily or permanently. Doesn’t protect outside your home network natively.

Cloud Based DNS Solutions:

Examples: Cloudflare, OpenDNS, AdGuard Home for Mobile.

Pros: Easy setup, automatic protection, can be configured for specific content filtering.

Cons: Limited control over blocked sites, reliance on the DNS provider’s lists.

Browser Based Protection:

Examples: AdGuard, AdBlocker, uBlock Origin.

Pros: Limited to the browser and devices it’s installed on. Easy setup.

Cons: Limited visibility into logs, potential conflicts with certain websites.

Router Based Protections:

Examples: Some routers like Netgear with parental controls.

Pros: Filters ads, malware, and adult content network-wide. Logs device activity.

Cons: Limited log retention, specific to the router.

What's next?

Choosing the right solution depends on your preferences and needs. For further discussion or assistance, feel free to contact Ryan at Dailey Computing via email at daileycomputing@gmail.com or call 203.693.1912. We are here to help protect your family or small business at an affordable rate.

READ MORE
Updates
Ryan DaileyJanuary 12, 2024 0 Comments
Share article:Facebook
192 Views
26 Likes

January 2024 Windows Update

January 2024 Windows 10 Update Failure

Microsoft released it’s January Patch Tuesday updates on 1-9-2024. Many Windows 10 users found that the 2024-01 Security Update KB5034441 failed with error 0x80070643. This appears to affect all versions of Windows 10 and 11. Windows 11 seems to be able to automate the fix due to the recovery partition being sufficiently sized but there are still reports of manual patching being needed.

Windows Update 0x80070643 Error for KB5034441

The reason for this error is due to the recovery partition being at the beginning of the drive, contains a non valid image or the partition doesn’t exist.

This seems to be isolated to Windows 10 and Server 2022 and verified by System Administrators at various social media outlets.

Before we discuss the fix, let’s understand what actually happened here. CVE-2024-20666 resolves an exploit that bypasses BitLocker Encryption and allows users to access encrypted data. The update attempts to install a new version of the Windows Update Recovery Environment (WinRE). Many Windows 10 recovery partitions (if they had them) were 522 MB, which isn’t large enough to support the new Windows RE image (winre.wim) file causing the error listed above.

Example Recovery Partition on Windows 10

Microsoft has released a script to automate the fix. There are two different scripts depending on the feature update of Windows 10 and Windows 11 which will need to be run in PowerShell as Administrator. There is also a manual process for resizing the recovery partition. This is the only solution that Microsoft has provided. You will also need to download the specified Safe OS Dynamic Update (Compatibility Update) package from the Windows Update Catalog based on your feature version. When running the script on your system, it mounts the WinRE image, applies an architecture-specific Safe OS Dynamic Update you have to download from the Windows Update Catalog before running the script, unmounts the image, and then reconfigures WinRE for BitLocker service if the BitLocker TPM protector is present.

From what I have seen personally, the recovery partition needs to be a minimum of 772MB but the script can patch the recovery image without resizing the partition in most cases.

Please note that before attempting to perform any of the fixes listed above, you have current backups of your current system should something go wrong.

Script showing the output of the script running successfully

For assistance deploying or applying this update in your environment, please contact us to get your computers fully patched and protected from the latest vulnerabilities. 

READ MORE

Recent Posts

  • Protecting From Malicious Emails
  • Upgrade Your Wireless
  • Keeping You and Your Accounts Safe
  • Protecting Your Home Network
  • January 2024 Windows Update

Recent Comments

No comments to show.

Archives

  • June 2024
  • February 2024
  • January 2024

Categories

  • Email
  • Internet Safety
  • Network Security
  • Updates
  • Welcome
  • Wireless
Recent Posts
  • Protecting From Malicious Emails
    Protecting From Malicious Emails
    June 15, 2024
  • Upgrade Your Wireless
    Upgrade Your Wireless
    February 24, 2024
  • Keeping You and Your Accounts Safe
    Keeping You and Your Accounts Safe
    January 29, 2024
Categories
  • Email1
  • Internet Safety2
  • Network Security1
  • Updates1
  • Welcome1
  • Wireless1
Tags
2FA Antivirus Email Filter Hack Malicious Malware Network Password Security Social Media Spear Phishing VPN Vulnerability Welcome WiFi Windows Update
logotype
  • (203) 693-1912
  • daileycomputing@gmail.com

Our Services

Services

Support

SupportFAQS

© Copyright 2023 Dailey Computing. All rights reserved.

Facebook Youtube