50,000 MS-SQL and PHPMyAdmin Servers Infected with Cryptocurrency Mining Malware, Researchers Found

50,000 MS-SQL and PHPMyAdmin Servers Infected with Cryptocurrency Mining Malware, Researchers Found

Information Security, News, Servers
50,000 MS-SQL and PHPMyAdmin Servers Infected with Cryptocurrency Mining Malware, Researchers Found Researchers at Guardicore revealed that 50,000 Microsoft SQL and PHPMyAdmin servers from different parts of the world and belonging to companies in the healthcare, telecommunications, media and IT sectors had been compromised and infected with a cryptocurrency mining malware – malicious software that secretly uses someone else’s computer for cryptocurrency mining. Cryptocurrency mining performs a dual function: first, for approving transactions, and second, for releasing new cryptocurrency into circulation. In many countries, cryptocurrency mining isn’t illegal. In countries where cryptocurrency mining is allowed, cryptocurrency mining is only illegal when this is done without the explicit permission from the computer owner – an act known as cryptojacking. In 2017, during the unprecedented rise of cryptocurrency prices, especially the top…
Read More
How SMBv1 Leaves Your Organization’s Server Open to Cyberattacks

How SMBv1 Leaves Your Organization’s Server Open to Cyberattacks

Information Security, Servers
How SMBv1 Leaves Your Organization’s Server Open to Cyberattacks Servers are the core of every organization’s I.T. operations. Many organizations, however, leave this core component open to cyberattacks through SMBv1. What Is SMBv1? SMBv1, which stands for Server Message Block version 1, was created by Barry Feigenbaum in the early 80s as a file sharing protocol for DOS. In the 90s, Microsoft started using SMBv1 in its operating systems as a protocol for sharing access to files, printers and other resources on a network. SMBv2, which stands for Server Message Block version 2, was introduced in Windows Vista and Windows Server 2008. SMBv3 was introduced in Windows 8 and Windows Server 2012. In 2014, Microsoft publicly regarded SMBv1 as obsolete and best avoided. SMBv1 isn’t installed by default in the…
Read More
Importance of Protecting Your Organization’s Server from Malware

Importance of Protecting Your Organization’s Server from Malware

Data Backup, Information Security, Servers
Importance of Protecting Your Organization’s Server from Malware The recently disclosed data breach at Algonquin College highlights the importance of protecting your organization’s server from malware. Algonquin College, in a statement released last July 16, said that on May 16 cyberattacks illegally accessed one of the College’s servers by infecting it with a malicious software (malware). The educational institution didn’t indicate what specific type of malware that the attackers installed on the infected server nor indicate how the attackers were able to get inside the server. The infected server, according to Algonquin College, hosted access to databases which contained personal information. Sensitive information, including date of birth and home address, of 4,568 individuals (students and alumni) may have been exposed, while non-sensitive information of an additional 106,931 individuals (students, alumni…
Read More
How to Protect Your Company’s Server from Ransomware Attacks

How to Protect Your Company’s Server from Ransomware Attacks

Security, Servers
How to Protect Your Company’s Server from Ransomware Attacks Your company’s server is the center of your organization’s IT operations. The server is where your company’s critical data are archived. All of your organization’s computer workstations are also linked to it. Your company’s physical server is where server software works and provides services such as file transfers to other connected computers. Because of the server’s core functions, this has become the target by ransomware cyberattackers – a point of entry where they believe they can make the most out of the attacks. What is a Ransomware? A ransomware is a malicious software, also known as malware, that encrypts computer files preventing users to access their files and asks for ransom payment, typically in the form of Bitcoin, to decrypt or…
Read More
5 New Year’s Resolutions to Protect Your Organization’s IT Infrastructure

5 New Year’s Resolutions to Protect Your Organization’s IT Infrastructure

Security, Servers
5 New Year's Resolutions to Protect Your Organization’s IT Infrastructure The biggest and sneakiest cyberattacks that shook the digital world in 2017 highlight the need to protect your organization’s IT infrastructure. Below are some New Year’s resolution ideas to protect your organization’s IT infrastructure based on lessons learned from the most destructive cyberattacks in 2017. 1. Update Server OS The cyberattack called “WannaCry” highlights the need to protect your organization’s IT infrastructure through server operating system (OS) update. In May 2017, hundreds of thousands of computers around the world were locked out by WannaCry with a notice on the screen to pay a certain amount to unlock the compromised computers. WannaCry is referred to as a ransomware – malicious software (malware) that locks computers and asks victims to pay ransom…
Read More
How Server OS Update Can Prevent Cyber Attacks

How Server OS Update Can Prevent Cyber Attacks

Security, Servers
Preventing Cyber Attacks with OS Updates Why should you be concerned with the server OS update? A server operating system, also known as server OS, helps in simplifying and expediting the typical functions of a server. This very system though has become a target of cyberattackers as attacks on servers give them more payoffs for their efforts. IT operations rely heavily on the server. It’s where your organization’s digital data is archived and it’s where all the computers or staff workstations are linked. Security Vulnerabilities Security vulnerabilities in a software, including the server OS, isn’t uncommon. It’s an accepted reality in the software development community that code is never released free of error. The industry average number of security vulnerabilities for every 1,000 lines of code range from 15 to…
Read More
Cloud Computing: What’s in the Cloud

Cloud Computing: What’s in the Cloud

Cloud Computing, Servers
Cloud Computing: What’s in the Cloud Cloud computing, often referred to simply as “the cloud”, is the delivery of computing services – from storage to software applications – over the internet. Without you realizing it, you most likely use cloud computing at some point in time. For instance, when you listen to online music, watch online movies or play online games, it is likely that cloud computing is making it all feasible behind the scenes. Cloud providers – referring to companies that offer these cloud computing services – typically charge cloud users based on usage, similar to how your electric utility company charge you for your electric energy consumption. “As a segment of IT services, cloud computing generates billions of dollars in revenue annually and is showing very few signs…
Read More
Server OS Update: Preventive Measure Against Cyber Attacks

Server OS Update: Preventive Measure Against Cyber Attacks

Information Security, Security, Servers
Using Server OS Updates to Prevent Cyber Attacks Is your company still using an outdated server OS? Your obsolete server OS may not be broken, but this can put your company in danger of losing resources as a result of cyber attacks. In House Server Your in house server shapes your business operations. All office computers, printers, scanners, internet access and other office equipment are linked to it. All software tools shared by employees, such as accounting program and customer relationship management software, are linked to it. All digital files of your company are stored in it. With an in house server, new software or changes across the network can easily be rolled out. For instance, a server can update every computer on the network at the same time. There…
Read More