Our Vision

To give customers the most compelling IT Support experience possible.

Our Mission

Our mission is simple: make technology an asset for your business not a problem.

Our Values

We strive to make technology integrate seamlessly with your business so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand with you to support your growth.

Our Values

We develop relationship that makes a positive difference in our customers Business.

Our Values

We exibit a strong will to win in the marketplace and in every aspect of our Business

Monday, July 12, 2021

Insider Threat

 
An Insider can be ANYONE Employee, Contractor, Business Partner, etc. with the right motive and means, and can have a Tactics at their disposal, that will put an organization’s assets at risk. An organization must Think Outside The Box to successfully detect and mitigate the risks posed by Insiders.
 

 
 
Malicious Insiders don’t care about compliance regulations. They just look for security gaps and vulnerabilities within an organization, to achieve their objectives. The impacts from Insider Threat incidents can be very severe, costly and damaging. 
 
Not all incidents by Insiders are malicious. Non-Malicious Insider incidents can be just as damaging as malicious incidents. Given this threat landscape, it is imperative that critical infrastructure entities prioritize and dedicate resources to preempt and/or mitigate insider threat.
 
To help The National Counterintelligence and Security Center (NCSC) issued “Insider Threat Mitigation for U.S. Critical Infrastructure Entities: Guidelines from an Intelligence Perspective. Read on attached document if you interested .  insider threat 
 
Related to this is another whitepaper by Simone (Cy) Genna publish by SANS Title: Information Security Starts with the Employees which you can download from here 
 
 
 
#cybersecurity #informationsecurity #databreach #datasecurity #intelligence #infrastructure #risk

Sunday, July 4, 2021

Kaseya VSA Supply-Chain Ransomware Attack

After #printnightmare Another High Alert for Security Community and administrators. No weekend or holidays for #cybersecurity .

#Kaseya VSA Supply-Chain #Ransomware Attack by ransomware group REvil is exploiting vulnerable instances of Kaseya VSA globally. 

Kaseya VSA is a platform that provides endpoint management and network monitoring. Anyone who is currently using or has a MSP that is running #Kaseya software has potentially been compromised! 

Once inside the supplier’s system, attackers use it as a jumping off point to access its customers’ networks too. Then they install ransomware, which locks up victims’ data, only releasing it once a ransom payment has been made.


It is recommend organisations follow the advice provided by Kaseya, to immediately #shutdown your Kaseya server until further notice. 

So far 200 US company affected and one of Sweden's biggest grocery chains, closed all of its 800 stores today after this attack as they were unable to operate its cash registers.

Technical Details: Kaseya supply chain attack Indicators of Compromise (IOCs)

HASHES (SHA256) d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e e

2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2 8

dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd 

More info available here: https://lnkd.in/gJ5hfD2 S

someone rightly said Cybercriminals are awful for a whole bunch of reasons, but especially for ruining long weekends and holidays for IT professionals over and over again. Be nice to your IT team. They're the ones working through the nights and weekends to protect you from these scum. 

 #ThreatHunting #IOC #REvil #KaseyaVSA #KaseyaHacked #KaseyaVSA #MSP

Saturday, July 3, 2021

Print Spooler vulnerability PrintNightmare

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. 

An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. Attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

 Due to the possibility for exposure, domain controllers and Active Directory admin systems need to have the #Print #spooler service disabled. Do It now and save yourself from Print spooler vulnerability CVE-2021-34527 #printnightmare

see the flowchart to determine if you required to disable print spooler now


If disabling the Print Spooler service is appropriate for your organisation you can do the following way.

1. The recommended way to do this is using a Group Policy Object via

Computer Configuration > Administrative Templates > Printers >>

Disable the “Allow Print Spooler to accept client connections:” policy to block remote attacks 

 2. You can also use the following PowerShell commands:

 Stop-Service -Name Spooler -Force 

 Set-Service -Name Spooler -StartupType Disabled

 Good Luck. 

 #windows #printer #printnightmare


Saturday, June 26, 2021

Commmon Cyber Security Terms

Real life example of Cyber risk response.  This might help you to understand some key concept in cyber world. After all, Cyber Security don't have to be boring, right. Then read on, this might help you smile. 


 

Threat Actors = someone who wants to punch you in the face. 

Threat = the punch being thrown.

Severity = whether you fall down after the punch, and how long it might take for you to stand up again.

Vulnerability = your inability to defend against the punch 

Risk = the likelihood of getting punched in the face  

Acceptable Risk = your willingness to be punched in the face  

Attack Surface = the size and shape of your face 

Impact = broken nose, medical bills, lost time at work
Single loss event = one tooth,
Risk appetite = number of teeth willing to part with,
Compensating control = dentures / Mate who was in the special forces'
Vulnerability Assessment = checking the size and shape of your face
Compliance = how you think this all works until you've been punched in the face
Risk posture = whether you know that talking shit in a pub is likely to get you punched in the face or not.
RTO = how long it takes you to regain consciousness
RPO = how much you forget when you blacked out 

Cyber Risk Insurance = your mates at the pub betting on if you can "talk that kinda shit" and not get punched in the face 

 


Penetration testing / PEN TEST = saying "boo" very loudly to see if you'll protect your face 

Red Team = boxing 

Exploit = the fist 

0day = kick in the groin  

Side channel = your wallet being nicked whilst you are being punched in the face.

APT = a mate who also wants to punch you in the face 

Unhackable = Pissing off professional boxers while bragging about your knowledge of Karate.

Bounty Hunter = someone who promises to wear gloves when they punch you if you promise to pay them based on where they punch you 

Bug Crowd = cage fight organizer.



Security stack /  Blue Team = your mates at the pub with you 

Patch Tuesday = your weekly gym visit

Alert = friend who calls an ambulance.
Investigation
➡️ triage: the EMTs who arrive.
Incident response: the doctors who remediate your punched face.
Digital forensic: documenting your injuries to reconstruct the type of punch in detail.
Threat Intelligence = pointing at a person that has a history of punching people in the face.i e, “Bob’s going to come at you with a right cross” 

Air gap = avoiding the pub by staying at home
DEFCON presentation = all of your friends getting drunk in Las Vegas watching video of you being punched in the face.



Enjoy your day.

credit: it all started from caseyjohnellis @cje twitter account

Thanks  Faysal Hasan  Connect with me in Linked In

Windows 11 is here . all new features and exciting things to come ..

  Windows11 is here. From the official release that details new features for windows11


 
Windows11 is also secure by design, with new built-in security technologies that will add protection from the chip to the cloud, while enabling productivity and new experiences. Windows 11 provides a Zero Trust-ready operating system to protect data and access across devices.

The team have worked closely with OEM and silicon partners to raise security baselines to meet the needs of the evolving threat landscape and the new hybrid work world.

 


Windows 11 unlocks the full potential of your system’s hardware, putting some of the latest #gaming technology to work for you. Like: DirectX 12 Ultimate, which can enable breathtaking, immersive graphics at high frame rates; DirectStorage for faster load times and more detailed game worlds; and Auto HDR for a wider, more vivid range of colors for a truly captivating visual experience.



Also Windows 11 will be bringing #Android apps to Windows for the first time. Starting later this year, people will be able to discover Android apps in the Microsoft Store and download them through the #Amazon Appstore – imagine recording and posting a video or using Khan Academy Kids for virtual learning right from your PC.



Windows 11 will be available through a free upgrade for eligible Windows 10 PCs. To check if your current Windows 10 PC is eligible for the free upgrade to Windows 11, visit Windows.com to download the PC Health Check app


Here is the official release details  Link https://blogs.windows.com/windowsexperience/2021/06/24/introducing-windows-11/


Sunday, November 29, 2020

Best Free Open Source Software of 2021 for your Home or Small Business

The term OPEN SOURCE refers to software whose source code is freely available to download, edit, use and share, with no copyright restrictions and that's why we love it.

You will find open source versions of almost every software imaginable - from Operating systems, office suites, media to accounting, and productivity. With that in mind, here's our pick of the very best open-source software.

Operating System: Linux

Let's start with the main thing you need first is an Operating System for your PC or Laptop. In the past 10 years, the gap between the features in all the major operating systems has become smaller and smaller. Linux operating systems aren't just for geeks and nerds. Anyone can install Linux and use it for their everyday computing needs including browsing the web, watching Netflix, typing letters, sorting home finances, video editing, photo editing, and managing music collections. There is a lot of option to choose from for everyone from Novice to System Administrator to  Hackers and Security professionals everyone loves Linux as their OS.

Ubuntu: One of the most popular distros for good reason, Ubuntu is an open-source software operating system that runs from the desktop, to the cloud, to all your internet connected things.

Ubuntu is officially released in three editions: Desktop, Server, and Core (for the internet of things devices and robots). Ubuntu is a popular operating system for cloud computing. Ubuntu is released every six months, with long-term support (LTS) releases every two years.  Download form here

 

Linux Mint is a great ‘default’ distro for new Linux users, as it comes with a lot of the software you’ll need when switching from Mac or Windows, such as LibreOffice, the favored productivity suite of Linux users. It also has better support for proprietary media formats, allowing you to play videos, DVDs, and MP3 music files out of the box. Why not give it a go today.  


Office software: LibreOffice

The next is you required your productivity tool and here comes to the rescue. LibreOffice is a powerful office suite – its clean interface and feature-rich tools help you unleash your creativity and enhance your productivity.  LibreOffice is a full suite of workplace software package, together with wonderful apps for text documents, spreadsheets, presentations, and databases. These are all absolutely compatible with the most recent Microsoft file formats, thus you’ll haven't any hassle sharing files that employ with users of Word, Excel, PowerPoint, and Access.

LibreOffice includes several applications that make it the most powerful Free and Open Source office suite on the market. You can download it form clicking on their official link here .

 

Email client: Mozilla Thunderbird

Email is a key part of our everyday life Thunderbird is a free and open-source email, news feed, chat, and calendaring client, that’s easy to set up and customize. One of the core principles of Thunderbird is the use and promotion of open standards - this focus is a rejection of our world of closed platforms and services that can’t communicate with each other. We want our users to have freedom and choice in how they communicate. You can download it form clicking on their official link here .


Web browser: Mozilla Firefox

Download Mozilla Firefox, a free Web browser. Firefox is created by a global non-profit dedicated to putting individuals in control online. Firefox is available for Microsoft Windows, macOS, Linux, BSD, illumos, and Solaris operating systems. Its sibling, Firefox for Android, is also available.You can download it form clicking to their official link here even you can download in your onw language .

 

Accounting / Small Business Accounting: GnuCash

GnuCash is personal and small-business financial-accounting software, freely licensed under the GNU GPL and available for GNU/Linux, BSD, Solaris, Mac OS X, and Microsoft Windows. Designed to be easy to use, yet powerful and flexible, GnuCash allows you to track bank accounts, stocks, income, and expenses. As quick and intuitive to use as a checkbook register, it is based on professional accounting principles to ensure balanced books and accurate reports. Download here

Clean Your System and Free Disk Space: BleachBit

When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari, and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source. Download link


Password manager: KeePass Password Safe

Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, website, etc. Unimaginable.

KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). Download link



Safeguard Your Data/ Disk Encryption: 

DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition. DiskCryptor is file and drives encryption software with all the whistles and bells you will ever need. Just like in TrueCrypt, DiskCrypror can encrypt any of your files, system drives, and other external devices like CD’s and thumb drives. Moreover, DiskCryptor can encrypt your data with different encryption algorithms like AES (Advanced Encryption Standard), Twofish, Serpent, and also uses a combination of cascaded algorithms for increased security. If you are previously using TrueCrypt for your encryption purposes, then DiskCryptor is the closest free option available with active development and support.

Media player: VLC Media Player

VLC media player (commonly known as VLC) is a free and open-source, portable, cross-platform media player and streaming media server.VLC offers everything you could need from a media player - comprehensive format support, streaming, downloading, and much more download here

 

Photo editor: GIMP

GIMP is a cross-platform image editor available for GNU/Linux, OS X, Windows, and more operating systems. It is free software, you can change its source code and distribute your changes. Whether you are a graphic designer, photographer, illustrator, or scientist, GIMP provides you with sophisticated tools to get your job done. You can further enhance your productivity with GIMP thanks to many customization options and 3rd party plugins.Download Link

Video editor: Shotcut

Shotcut is a free, open-source, cross-platform video editor. Shotcut is a free, open-source, cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats; no import required meaning native timeline editing; Blackmagic Design support for input and preview monitoring; and resolution support to 4k. More features and download link here

Audio editor: Audacity

Free, open-source, cross-platform audio software. Audacity is an easy-to-use, multi-track audio editor and recorder for Windows, Mac OS X, GNU/Linux  Download Here


What did we miss?

Is there an n-source application that we missed? These are just a few of the best open-source/ free software I use for my personal use. They offer terrific value and since most of them are open source they are more secure for your privacy and protection in this digital age. 

We think of this as a work in progress, so if you believe there is software that should be added to this list, please let us know in the comments section below.

If you like this post feel free to re and if you want to connect with me just add me up on LinkedIn  Faysal Hasan https://au.linkedin.com/in/faysalhasan

Saturday, August 22, 2020

ATO Scam Alert

 πŸš¨ SCAM ALERT 🚨 Be on the lookout for a new phone #scam claiming your #tax file number (TFN) has been suspended!


Recorded phone calls claiming to be from the #ATO and other government agencies are trying to trick people into providing personal information. These scammers will tell you there’s a legal case against you, and if you don’t follow instructions and provide the information requested, you’ll be arrested.

⚠️ Don’t follow the prompts, and don’t provide the information requested. We will never send unsolicited pre-recorded messages to your phone, or threaten you with immediate arrest. If you’re ever unsure whether an #ATO interaction is genuine, hang up and phone our scam hotline on 1800 008 540. Warn your family and friends to stay alert and visit scam alerts page to learn more:



Phishing and spear-phishing method of stealing confidential information

 In the recent Stay Smart Online, Alert email advise that there is a significant increase in the past few months of COVID themed phishing scams, using all sorts of lures to try and trick people into handing over personal details.


#Phishing and spear-phishing is a method of stealing confidential information by sending fraudulent messages to a victim, through email or message platforms. They remain among the MOST common method used by malicious #cyber actors to target Australians.

Since the #pandemic's outbreak, the Government’s #Scamwatch has received over 3,060 coronaviruses themed scam reports with over $1,371,000 in reported losses.

#Phishing campaigns can be sent via email, SMS, social media, instant messenger or a phone call. They can look extremely convincing, often imitating legitimate messages from trusted senders in government or business.

See attached are an example of #scam #email that I usually get in my (test) mailbox. Look at the subjects all trying to attract you in a way to click a link or provide details. Especially now Corona and Tax return season they are more active than before.

Hope this helps to Stay safe and on alert don't lose your money or info to the scammers.

Twitter Facebook Favorites More