Skip to main content

Cyber extortion: What is it and what’s the risk to your business?

Here’s a topic that’s been making headlines and causing sleepless nights for many: Cyber extortion.

Is it something that’s on your radar? It should be, because it might affect your business one day.

What is cyber extortion?

It’s a type of cyber crime where criminals threaten to harm your business by compromising its data and digital assets unless a ransom is paid. These threats often involve ransomware, a malicious software that encrypts your data, making it inaccessible until you pay the ransom.

Sometimes, cyber criminals go a step further by stealing data and threatening to release it publicly on dark web leak sites if their demands aren’t met. This dual threat is known as double extortion.

According to a 2024 report, the number of victims of cyber extortion scams has skyrocketed by 77% over the past year. What’s more, small businesses are four times more likely to be targeted compared to their larger counterparts. This is a worrying trend, especially considering that smaller businesses often have fewer resources to defend against these attacks.

In the first quarter of this year alone, 1,046 businesses fell victim to double extortion. That may not seem huge, but bear in mind the actual number is likely much higher since many cases go unreported, hiding in the shadows of what experts call the “dark number.”

The truth is, all businesses, regardless of size or industry, are potential targets. However, certain sectors are more frequently attacked. Manufacturing, professional, scientific, and technical services, as well as wholesale trade, top the list. Alarmingly, the healthcare and social assistance sectors are also seeing a significant rise in attacks, despite the potential societal and political repercussions.

Cyber criminals are opportunistic and strategic. They target regions with strong economic growth and shared languages. For instance, cyber extortion attacks in the US have increased by 108%.

While the rise in cyber extortion is a big worry, there are steps you can take to protect your business. Here are some key strategies:

Back up your data: Make sure you have a robust backup plan. Keep your critical data in an offline or offsite location and regularly test your backup restoration process.

Keep software updated: Make sure all your devices use the latest software, especially those connected to the internet.

Implement Multi-Factor Authentication (MFA): Strengthen your access controls with MFA. This adds an extra layer of security by requiring multiple forms of verification before access is granted (such as a code on a separate device). Also, limit user access to only the systems they need for their job.

Patch and vulnerability management: Regularly update your systems to fix any security vulnerabilities. Cyber criminals often exploit known weaknesses, so staying on top of patches can prevent many attacks.

By understanding what cyber extortion is and how it works, you can better prepare your business to defend against it. Remember, the key is to be proactive.

If we can help prepare your business and keep it safe, get in touch.

Slow PCs? Manage which applications launch at startup

Staying on top of how your technology is set up is crucial for maintaining a reliable network. And one often-overlooked aspect is managing which applications start up when your business’s PCs start up.

With lots of software wanting to auto-start, it can slow down your system and potentially introduce security risks. But did you know that Windows 11 offers a useful feature that alerts you whenever new apps are added to the startup list?

Every time you hit the power button on your PC, it loads a set of apps automatically. While some of these are essential, others might not be, and can slow down your system’s performance. Over time, as you install more software, your startup list can grow, leading to longer startup times and a slow experience.

Not only that but keeping an eye on startup apps is good security practice. Unwanted or unknown apps starting automatically can be a red flag for malicious software (malware) or other security threats. By receiving alerts about new startup apps, you can quickly identify and investigate any suspicious additions, making sure that your systems stay secure.

How do you enable these alerts in Windows 11? It’s a simple process:

  • Start by opening the Windows 11 system settings. You can do this by clicking the Start menu and selecting the gear icon or by pressing ‘Windows + I’ on your keyboard.
  • In the settings window, click on ‘System’ in the left sidebar, then select ‘Notifications’ on the right.
  • Scroll down to the bottom of the notifications page. Just above Additional settings, you’ll find ‘Startup App Notification’, which is switched off by default. Move the slider to ‘On’.

From then on, you’ll receive a notification whenever a new application is added to the startup process. You can even customize what this notification looks like by clicking on the arrow next to the slider button, allowing you to adjust its appearance and sound to suit your preferences.

Turning on these alerts brings several benefits to your business. First, it helps keep your PCs running efficiently. By staying informed about new startup apps, you can quickly disable any unnecessary software that might be slowing down your system. This means faster start times and better overall performance, allowing your team to get to work without delays.

Secondly, it enhances security. Receiving alerts for new startup apps means you can immediately investigate any unknown or suspicious additions. This proactive approach helps prevent potential security threats from taking hold, safeguarding your business data and systems.

Lastly, it’s a great way to keep track of what’s installed on your machines. With various team members possibly installing different software, these alerts give you a clear overview of what’s being added to the startup list, making sure that only approved applications are running.

To further manage startup apps, you can use Task Manager. Press ‘Ctrl + Shift + Esc’ to open Task Manager, then select the ‘Startup’ tab. Here, you’ll see a list of all the apps that start with Windows, along with their impact on boot time. You can enable or disable apps by selecting them and clicking the appropriate button at the top right.

By regularly checking this list and using the new alert feature, you can keep your startup process streamlined and your system secure.

A better answer is getting someone to set all of this up and manage it for you. We specialize in making technology easy for businesses. If we can help, get in touch.

PING, WHOOSH, or BEEP? Now you can decide with Teams

If you’ve ever found yourself wincing at the sound of a Microsoft Teams notification breaking your concentration, you’re not alone.

Here’s some news that might be music to your ears then: Microsoft has just rolled out an update that promises to make these interruptions much more manageable. With the latest update, you can customize your notification sounds on Teams. We believe that will make it easier to stay focused and prioritize your work.

Instead of the generic “ping” that jolts you out of your workflow, you could opt for a more soothing chime or even a subtle whoosh. This might seem like a small change, but it can make a big impact on how you manage your day. Being able to differentiate between urgent alerts and less critical messages through sound can help you prioritize effectively and reduce unnecessary distractions.

For business owners like you, this update is more than just a new feature – it’s a tool to enhance productivity and team efficiency. By allowing your team to customize their notification sounds, you make it easy for them to tailor their work environment to their personal needs. For instance, urgent messages from key contacts can be assigned a distinct sound that grabs attention immediately, while routine notifications can have a softer, less intrusive tone.

This kind of prioritization is essential in a busy work environment where managing time and focus is vital. It can help prevent important messages from getting lost in the noise of everyday communications and ensure that team members can respond promptly to those pressing issues without being constantly disrupted.

The business benefits of this update are clear. First, it helps create a more focused and efficient work environment. When employees aren’t constantly interrupted by generic notification sounds, they can maintain their concentration for longer periods, leading to higher productivity levels.

And by enabling the muting of notifications during meetings or focused work sessions, the update makes sure that important discussions and deep work sessions go uninterrupted. This feature is particularly handy in today’s hybrid work environment, where distractions can come from multiple channels.

While the customizable notification sounds are a standout feature, Microsoft Teams offers a huge range of other benefits that make it an invaluable tool for business. It integrates smoothly with other 365 applications, providing a unified platform for all your business needs.

Whether it’s collaborating on documents, scheduling meetings, or managing projects, Teams brings everything together in one place. Teams has a robust set of tools that make teamwork easier and more efficient.

If you’re not already using Teams, where have you been? Give it a try and see how it can help you streamline your workflows and communication.

We can help you customize Microsoft Teams to be perfect for your business. Get in touch.

How to Customize Your Facebook Memories: Avoid Seeing Certain People or Dates

Hey there, fellow Facebook users!

We’ve all had those moments when a Facebook Memory pops up, and we’re instantly transported back to a time we’d rather not revisit. Whether it’s an old friendship, a past relationship, or a specific date that brings back tough memories, Facebook Memories isn’t always a walk down a rosy memory lane. But don’t worry, Facebook has got you covered! You can actually customize what shows up in your Memories.

Here’s a step-by-step guide to help you filter out specific people or dates in your Facebook Memories:

Step 1: Open Facebook and Head to the Memories Section

  1. Log in to Facebook: Open your Facebook app on your phone or go to the Facebook website on your computer.
  2. Access Memories: On the left-hand side of your News Feed, you’ll see a menu. Click on the “Memories” option. If you’re on mobile, tap the three horizontal lines (Menu), scroll down, and tap on “Memories.”

Step 2: Customize Your Memories Settings

  1. Go to Settings: In the Memories section, look for the “Preferences” or “Settings” option. It’s usually a small gear icon.
  2. Edit Preferences: Click on “Edit Preferences.” This will open up customization options for your Memories.

Step 3: Filter Out Specific People

  1. People: Click on the “People” option. Here, you can add the names of individuals whose appearances in your Memories you’d like to block.
  2. Add Names: Start typing the names of the people you’d rather not see in your Memories. Select their profiles from the list that appears. Once added, Facebook will ensure that those individuals don’t show up in your future Memories.

Step 4: Exclude Specific Dates

  1. Dates: Next, click on the “Dates” option. This allows you to block out specific days or even entire date ranges.
  2. Add Date Range: Click on “Add New Date Range.” You can input the start and end dates that you’d prefer to avoid. This is super handy for those anniversaries or time frames you don’t want to be reminded of.
  3. Save Changes: After entering the dates, make sure to save your changes.

Step 5: Review and Adjust (Optional)

  1. Review Your Preferences: You can always go back and review your settings. If there are new people or dates you’d like to add, or if you want to remove some from the exclusion list, you can do so anytime.
  2. Stay Updated: Facebook often updates its interface and features, so keep an eye out for any new options that might make your experience even more personalized.

And there you have it! With these simple steps, you can take control of your Facebook Memories and ensure they bring you joy instead of unwelcome reminders. So go ahead, tweak those settings, and enjoy a more positive trip down memory lane.

Is that Chrome extension filled with malware?

If you use Google Chrome in your business, you’re probably familiar with extensions. These useful tools can enhance your browsing experience in countless ways, from blocking annoying ads to reducing distractions.

Extensions are incredibly popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

It’s short for malicious software – that’s any software intentionally designed to cause damage to a computer, server, or network. Cyber criminals use malware to steal data, hijack systems, and even empty your bank accounts.

Google Chrome holds about 65% of the browser market share worldwide, making it the most popular browser by far. This popularity makes Chrome a prime target for cyber criminals. While cyber attacks sometimes exploit vulnerabilities in the browser itself, there’s an easier way to target Chrome users: Through malicious extensions containing malware.

Although Google keeps a tight watch on its Chrome Web Store, the risk is still there. A recent report claims 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

Surprisingly, many malicious extensions remained available for download on the Chrome Web Store for a long time. On average, malware-filled extensions stayed up for 380 days, while those with vulnerable code were available for about 1,248 days. One particularly notorious extension was downloadable for 8 and a half years before being removed.

So, how can you protect yourself and your business from these malicious extensions? Here are five steps we recommend.

1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.

2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.

3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defense if you accidentally install a malicious extension.

4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.

5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

Chrome is the most popular browser, which means it will always be a target for cyber criminals. Google’s security team works hard to review every Chrome extension to ensure they are safe, but it’s still crucial to be vigilant.

If you’re unsure whether your extensions are safe or not, or you’d like more advice around keeping your business secure, our team can help. Get in touch.

Save time by accessing your Android phone’s files with File Explorer

Microsoft is working on an update that will allow Windows 11 File Explorer to directly access files on your Android phone, making file transfers smoother and faster than ever before.

Why’s this is such a big deal and how it can boost productivity for you and your team?

Imagine you’re in a meeting and need to quickly pull up a document or photo from your phone. Normally, you’d have to email it to yourself or transfer it using a cloud service. This can be time-consuming and cumbersome.

With the upcoming Windows 11 update, you’ll be able to access your Android phone’s files directly through File Explorer. No more fumbling with multiple steps, just quick, easy access to what you need.

This feature isn’t just about increased convenience; it’s a big productivity booster. By streamlining the process of transferring files between your phone and computer, you can save time. When you’re busy, every minute counts, and fewer interruptions make a smoother workflow.

Your team will also benefit from this update. This can lead to better collaboration and faster decision-making.

From a technical standpoint, this feature is designed to be user-friendly. There’s no need for complicated setups or third-party apps. It will be built right into the Windows 11 operating system, so once the update is rolled out, you’ll have everything you need at your fingertips. It lets everyone on your team take advantage of the new functionality without needing training or support.

Of course, we must mention another important aspect to consider: Security.

Microsoft is known for its robust security measures, and this new feature is no exception. Your data will be protected throughout the transfer process, giving you peace of mind that sensitive information remains secure.

Sounds good, doesn’t it?

We don’t have a release date yet. But if you want more help with productivity tools to make your business more profitable, we can help. Get in touch.

Protect your business from a data leak with Microsoft Edge

Microsoft Edge for Business has just rolled out new data leak control capabilities. And that could be a good thing for keeping your sensitive info safe.

What are data leak control capabilities?

In plain English, they help prevent your sensitive information from getting out to the wrong people. Think of it as having an extra lock on your digital doors, making sure only the right people can access your important data.

Every business handles sensitive information, whether it’s financial records, client details, or proprietary data. If this information leaks, it could mean big trouble: Financial loss, legal headaches, and a hit to your reputation.

This new feature in Microsoft Edge helps keep your data secure by making sure only authorized people can access it. It also stops accidental sharing.

Depending on your industry, you may have strict rules about data protection. These new controls can help you stay on the right side of regulations.

And let’s not forget your customers. They’re more aware than ever about data privacy. Using a browser with strong data leak controls shows you’re serious about protecting their information, which can boost their trust in your business.

Microsoft Edge for Business has added this new feature into an easy-to-use package. You can set policies on how data can be shared – like stopping certain types of data from being copied or emailed to unauthorized recipients. This way, you’re less likely to have accidental leaks.

It uses artificial intelligence to spot potential threats and unusual data movements. Edge can alert you to a potential leak before it happens, giving you a chance to act proactively.

If you’re already using other Microsoft products like 365 or Microsoft Teams, good news: Edge for Business integrates smoothly with them, letting you apply consistent data protection across all your tools.

Ready to give it a spin? Here’s what to do:

1. Update your browser: Make sure all your business’s devices are using the latest version of Microsoft Edge for Business. This makes sure you have all the newest features and security updates.

2. Set your policies: Work with your IT support partner to set up data sharing policies that make sense for your business. Microsoft provides guidelines and templates to help you get started.

3. Train your team: Make sure your employees know about the importance of data security and how to use the new features. A quick training session can do the trick.

4. Monitor and adjust: Keep an eye on how things are working and tweak your policies as needed. You want to find a balance that keeps your data secure without disrupting your workflow.

Better still, why not get our team to just do this for you. Get in touch.

Ransomware threats are surging – here’s how to protect your business

Imagine waking up one morning, turning on your computer, and finding that all your important files – everything from customer data to financial records – are locked. Tight.

And then a scary message pops up demanding a ransom fee to unlock them.

That’s ransomware in a nutshell. It’s a type of malicious software that hijacks your data and holds it for ransom.

It usually starts with an innocent-looking email or link. You might get an email that seems legitimate, asking you to click on a link or open an attachment.

This is known as a phishing email, where the sender appears to be genuine but isn’t. Once you click, malicious software is silently installed on your system. From there, the cyber criminals quickly go to work.

They’ll be encrypting your files so you can’t access them. Then, you get that dreaded ransom note, demanding payment in exchange for a decryption key to unlock your files. Paying the ransom is a risky move because there’s no guarantee you’ll get your data back, and it just encourages the attackers to target more victims.

2023 was a particularly bad year for ransomware, with attacks surging after a two-year decline. According to a report, there was a huge increase in ransomware incidents, breaking a six-year record.

One reason for this spike is the rise of something called Ransomware-as-a-Service (RaaS). This model lets cyber criminals “rent” ransomware tools, making it easier than ever for them to launch attacks.

As a result, more businesses are finding themselves posted on data leak sites, with a 75% increase in the number of victims between 2022 and 2023.

Ouch.

And it gets worse. Attackers are getting smarter. They’re developing new variants of old ransomware, sharing resources, and using legitimate tools for malicious purposes.

They’re also working faster, often deploying ransomware within 48 hours of gaining access to a network. And they tend to strike outside of work hours, such as when you’re tucked up in your bed, so they’re less likely to be noticed.

If your business falls victim to a ransomware attack, the consequences can be devastating. You might face significant financial losses, not just from the ransom itself but also from the cost of downtime and recovery.

There’s also the risk of losing critical data if you can’t decrypt your files.

Your reputation could take a hit if customers find out their information was compromised. Oh, and your business operations could be severely disrupted, affecting your ability to serve your clients.

The most important question then: How can you protect your business from this growing threat?

  • Start by educating your team. Make sure everyone knows how to spot phishing emails and avoid suspicious links and attachments
  • Regularly back up your critical data and securely store those backups offline
  • Keep your software and systems up to date with the latest security patches, and invest in strong security tools
  • It’s also important to limit access to your data. Only give employees access to the information they need for their jobs
  • Monitor your network for unusual activity and have a plan in place to respond to incidents quickly

If you do get hit by a ransomware attack, don’t panic. Work with cyber security experts (like us) to resolve the issue.

Remember, it’s best not to pay the ransom, as it only fuels the cyber criminals’ activities.

My team and I help businesses take proactive action to protect their data. If we can help you, get in touch.