SME, Inc.

  • Home
  • About Us
  • Services
    • Cloud Solutions
    • Compliance Solutions
      • ALTA Best Practices
      • CMMC
      • DFARS
      • HIPAA
      • PCI DSS
      • Security Awareness Training
    • Data Center Services
      • Hosting
      • Monitoring
      • Hands & Eyes
    • Managed Security Services
      • Asset Management
      • Nextwall™ Managed Firewall
      • IDS/IPS
      • Managed Anti-Virus
      • VPN/Remote Access
      • Vulnerability Assessment Services
        • External Vulnerability Assessment
        • Internal Vulnerability Assessment
        • Web Application Testing
    • Technical Support
      • The SME Tech
      • Backups
      • Remote Support
  • Blog
  • Contact Us

December 1, 2020 By SME, Inc.

How To Tell If I Have Been Hacked?: Part 2

Last week, we left off with some basic indicators to use in order to discover whether or not you’ve been hacked. So after the Thanksgiving Holiday, and Black Friday shopping frenzy, we would like to provide you with a few more helpful indicators that you can use when attempting to determine if you have been hacked or not.

Has My Information Been Part of a Data Breach?

The number of data breaches that take place has been rising exponentially over the last few years, Yahoo, Marriott, First American Financial, Facebook just to name a few have a combined total of over 2 billion user data that includes data such as name, address, and DoB, to bank account info, and social security numbers. This type of user data being out in the open could have potentially devastating effects on someone’s life. To make matters worse, unless the story hits the news cycle, most companies or 3rd parties do not immediately notify their users when they discover the breach. This leaves users holding the bag per se in finding out if their personal information has been compromised. Luckily, there is an easy way to find out if any of your information has been leaked in a public data dump.

How to Remediate?

The simplest way for any one of us to identify if any of our online data has been leaked is to use the website (Have I Been Pwned). This website will not only allow you to search their huge list of emails that have been leaked in data breaches/dumps, but they will also show you the passwords they have discovered in data dumps as well, so we all can use this list to identify if the passwords we commonly use have been leaked (always use different ones! Never one password for all, this isn’t Lord of The RIngs). They also provide recent information on companies that have been the victims of data breaches, which can further assist in identifying potential sources for data leakage.

Another helpful tip in order to protect oneself from the fallout of a data breach and potential data dump is to actively use MFA/2FA (MultiFactor Authentication/2 Factor Authentication) on as many sites/apps that will allow for it. 

Your Bank Account is Missing Money

Typically, if you have lost money as the result of being hacked, the amount will be quite significant, not just a few dollars (or fractions of a penny), online criminals don’t usually just steal a little money. They will transfer close to everything, if not all of it, often to a foreign exchange or bank that they own. This usually happens because your computer/phone has been compromised or from responding to a phishing email from your “bank or stock trading company”. The hacker then logs on to your account, changes your contact information, and transfers the money to themselves.

How to Remediate?

As luck would have it, most financial institutions will replace stolen funds, even better if they can stop the transaction before the money is actually stolen. In order to be more proactive against hackers, turn on transaction alerts that send text alerts to you when something unusual is happening in your bank account. Most financial institutions allow you to set limits on transaction amounts, and if the limit is exceeded or it goes to a foreign country, you’ll be alerted. However, oftentimes hackers will reset the alerts or your contact information before they steal the money. To counteract this, make sure your financial or trading institution sends you alerts anytime your information or alerting choices are changed.

Friends Receive Social Media Messages From You, But You Didn’t Send Them?

This very issue is more common than one might think, and essentially, all it takes is for you to open a phishing invite, or message from one of your friends accounts that has already been compromised. The typical “Hey, I found this video of you! Have you seen it?” message is a popular one to try and trick unsuspecting users into opening the message, In doing so, it asks the user(s) to log in and their credentials are stolen, and can then be used by the hacker to spread more and more of their phishing messages. 

How to Remediate?

The first thing to do is to warn other friends not to accept the unexpected friend request, or message. Something along the lines of, “Don’t click on that message from me. I think I’ve been hacked!”. Share the news in your common social media circles, and also try and contact customer service for the application to report the hack and see what sort of resolution they can provide.

Filed Under: Uncategorized

November 20, 2020 By SME, Inc.

How To Tell If I Have Been Hacked?: Part 1

Today’s threat landscape is constantly changing and evolving as are the tactics, techniques, and procedures (TTP’s) or our adversaries. The number of cyber attackers and data breaches is growing every day, and has increased significantly in the last few years, both in magnitude, and scope. As more and more people are putting their personal lives online, it is becoming easier, and cheaper for cyber criminals to hack into online accounts, computers, networks, and mobile devices; which in turn can grant these hackers access to your personal data.

The ultimate goal of Cybersecurity is to protect and Confidentiality, Integrity, and Availability (CIA) of computer systems and data. Whenever a system or network is hacked, data in one form or another is leaked, an account is hijacked, credentials stolen, it is almost guaranteed that one of these fundamental principles has been violated. Many times, cyberattacks remain undetected, sometimes taking weeks, months, or in some cases years before you realize what has happened. However, there are some tell tale signs to look out for that might indicate that you or your systems/networks may have been compromised, and it can save you some time and money if spotted early enough.

We’re going to provide you with a few clear signs that you can use in order to identify whether you have been hacked, and how to possibly remediate these issues.

Unwanted Browser Toolbars & Extensions

One of the most common signs of compromise is a new, mysterious browser toolbar or extension with a name that indicates it is meant to assist you. If you do not remember downloading that toolbar/extension, or do not recognize the name of the vendor it is supposedly from, it’s time to uninstall it.

How to remediate?

Fortunately, most browsers allow us to easily review and remove or activate toolbars or extensions. If the toolbar or extension is not listed there, then check to see if the browser has the option to reset itself back to its default state.

In the future, be sure to double check that when installing some applications or programs that there are no unwanted toolbars being installed as “shareware”, also be sure to read the licensing agreement, as these will typically contain whether a toolbar will be installed or not.

Random or Constant Pop-Ups

Browsing one of your favorite websites and getting hit with pop-ups that you typically would not see on that site? That’s an obvious sign that you have been compromised. These pop-ups can also come in the form of fake antivirus messages, and fake protection alerts. Many websites, both legitimate and malicious can bypass a browsers ad or pop-up blocker, so this is not a viable source of determining whether you were actually compromised or not.

How to remediate?

As with the solution above, many times pop-ups are caused by a malicious browser toolbar that was unwittingly installed, or browser add-on/extension. Simply looking in the browsers settings, you can identify whether there is an unwanted toolbar, add-on or extension installed.

Internet Searches Being Redirected

Typing in a website to search for and noticing it’s being redirected? A common way to verify this is to look at the address bar for the URL, if it does not exactly match the website for which you’re searching, then it’s more than likely being redirected by a hacker. The hacker gets paid every time someone clicks to visit a website. 

How to remediate?

Once again, this is primarily due to the installation of malicious and unwanted toolbars and browser extensions/add ons. Again, simply searching for these can be a way to fix this issue, or resetting the browser to its default settings.

Ransomware Message

By far one of the worst messages you can get on their computer is one telling them that all of their data has been encrypted, and in order to get it back they have to pay a ransom to decrypt it. Ransomware is a huge market for cyber criminals, in the last 3 years ransomware has caused over $20 billion worth of damage to corporations with ransom demands reaching upwards of $100,000, mostly in the form of Bitcoin.

Unfortunately, paying the ransom often does not result in the data being fully decrypted, or an actual working system. These programs as with any software, contain bugs and unlocking the encrypted data is not as easy as inputting the decryption key. The best way to prevent ransomware is to only download software from trusted sources, and always, always keep full backups.

Strange Mouse Movements and Clicks

If your mouse pointer is moving across the screen and you didn’t do it, it’s a guarantee of one thing, and ghosts is not the answer, you’ve been hacked! Though sometimes this can be from hardware technical issues. If the pointer is jumping all over the screen and not doing anything on the screen, then it’s more than likely a technical glitch. However, if the pointer is making clear movements and taking actions to click on certain links or parts of the browser, then it is more than likely because of a hacker.

How to remediate?

This is where you will most likely need to call in digital forensics professionals to assist in figuring out how the attackers got in to begin with. But you can also do something to learn what the attackers are after. Take a few minutes and observe what it is they are doing and what they may be after. If they start getting too close to something you don’t want them getting access to, turn off the computer, and/or disconnect it from the network.

Be sure to check us out next week in order to read Part 2 of the How To Tell If I Have Been Hacked blog post.

Filed Under: Uncategorized

November 16, 2020 By SME, Inc.

New CMMC Interim Rule

It should come as no surprise that things have changed again. Many of you have already heard about the roll out of the Cybersecurity Maturity Model Certification (CMMC) over the next 5 years and hopefully have started working towards the required level of certification for your organization. But have you heard about the CMMC Interim Rule? 

The CMMC Interim Rule includes a new DoD methodology for NIST 800-171 starting November 30, 2020. The Interim Rule adds DFARS 252.204-7019 and 252.204-7020 and allows for a scoring methodology (Basic, Medium, High). This new methodology requires all DoD contractors and sub-contractors to complete a NIST 800-171 self-assessment and receive a score through the Supplier Performance Risk System (SPRS). 

A Basis Assessment is a self-assessment completed by the contractor, while the Medium and High Assessments are to be completed by the Government. The Government will select contractors for Medium or High review based on the nature of the program.

Please note all self-assessments completed by contractors are given a Basic score, in order to achieve a Medium or High score the assessment must be reviewed by the government. 

Contracting Officers are required to verify the offeror has a current NIST  800-171 DoD Assessment on record prior to contract aware or the exercise of an option.

Certain aspects of the interim rule may change with the issuance of a final rule and additional guidance. Until then, DoD contractors should make plans to implement the new Assessment requirement quickly, and should carefully review all DoD solicitations and contract modifications to understand whether or not the new rule impacts them.

What does this mean for you? It is time for you dust off your POAM and SSP, create an account with SPRS, and go through the self-assessment process.

To find out more about our CMMC auditing services, or any other IT/security related questions, please give us a call at 703-378-4110 or email info@smeinc.net.

Filed Under: Uncategorized

November 4, 2020 By SME, Inc.

Vulnerability Assessment

What is a Vulnerability Assessment?

A vulnerability assessment is a systematic process intended to assist in the identification, classification, and prioritization of risks, potential threats, and vulnerabilities in computer systems, networks, hardware, applications, and other parts of your I.T. infrastructure. Vulnerability assessments are essential in order to locate the systems that may be susceptible to any known vulnerabilities, assign severity levels to those vulnerabilities, and then recommends possible remediation or mitigation techniques.

Types of vulnerability Assessments

There are several different types of vulnerability assessments that can be performed in order to strengthen your IT systems and infrastructure:

  • Host based Assessment – used in order to identify vulnerabilities in servers, workstations and other networked hosts. This type of scan offers greater visibility into the configuration settings and patch history of the canned systems.
  • Network and Wireless Assessment – identifies polices and practices to prevent unauthorized access to private or public networks, and networked resources.
  • Database Assessment – database and big data systems are evaluated for weak points, misconfigurations, identifying insecure dev or test environments, and classifying sensitive data across an organizations IT systems and infrastructure in order to prevent malicious attacks.
  • Application Assessment – used to identify security vulnerabilities and misconfigurations in software, and web application front-ends source code.

Threats that can be prevented by vulnerability assessment

Some examples of the types of threats that can be mitigated by a vulnerability assessment:

  • Code Injection Attacks (SQL Injection, XSS attacks)
  • Insecure, faulty authentication mechanisms
  • Possible privilege escalation
  • Factory defaults, most software and hardware ships with insecure default settings, such as admin passwords that are easily discoverable online.

2019 saw the highest number of Ransomware attacks ever, according to the Emsisoft report. The ransomware attacks at least 966 government agencies, educational establishments and healthcare providers. To be more specific:
– 113 state and municipal governments and agencies
– 764 healthcare providers
– 89 universities, colleges and school districts.
This means that up to 1,233 individual schools were affected.

Source: https://www.cpomagazine.com/cyber-security/ransomware-costs-in-2019/

Do I need a vulnerability assessment?

Ransomware, data breaches, phishing, covid-19 scams, as technology changes, so do the tactics, techniques, and procedures of the hackers. The threat landscape is constantly changing along with the pace of technology itself. The threats and risks of 2019 may not be the same ones we’ve seen thus far in 2020, or the ones we will see in the upcoming year.

With more than 5 billion records compromised in 2019, breaches cost US organizations more than $1.2 trillion

Source: https://www.techrepublic.com/article/data-breaches-cost-us-companies-more-than-1-2-trillion-lastyear/#:~:text=With%20more%20than%205%20billion,organizations%20more%20than%20%241.2%20trillion. 20more%20than%205%20billion,organizations%20more%20than%20%241.2%20trillion
  • Average ransomware fees paid out in 2019 was $111,605; with 205,280 organization being affected by ransomware in 2019.
  • Increased risks, threats, vulnerabilities, and exploits and being discovered and targeted by hackers every day.
  • Without an assessment, IT Management, and stakeholders are left guessing as to how to best spend budgeted resources. IT budgets are limited, knowing which assets to protect ensures that focus can be put on protecting the most business-critical systems.
  • Many government contractors are required to have a vulnerability assessment done in order to stay within compliance of government regulation.

How often do I need a vulnerability assessment?

Many are under the impression that a vulnerability assessment should be done annually, however a vulnerability assessment is only a snapshot of that specific time period and leaves the next 365 days until the next vulnerability assessment without any knowledge of new vulnerabilities that may exist internally or externally.

The threat landscape is continuously changing, with new treats appearing almost daily. Continuous vulnerability assessments are crucial in order to fully keep systems as secure as possible.

Here at SME, we provide all types of comprehensive vulnerability assessments, and vulnerability management depending on your needs. These assessments range from annual, quarterly, monthly, and continuous vulnerability management. Our services can be tailored to your needs, or budget!

To find out more about our vulnerability assessment and vulnerability management services, or any other IT/security related questions, please give us a call at 703-378-4110 or email info@smeinc.net.

Filed Under: Uncategorized

October 28, 2020 By SME, Inc.

Working Securely from Home

As we have all been faced with challenges during the COVID-19 pandemic, the way we do business has changed dramatically, with many of us working from home. This has presented hackers with new tactics, and opportunities to cast a wider net on their attacks. IT security has always been important, and during these times that importance is even greater. 

In an ideal world, most companies would have some form of plan or policy on how to securely make the transition from employees working on-site to working from home. Unfortunately, many of us made the transition with little to no time to plan. Now that the dust has settled a bit, although the future is still uncertain when and if we will go back to doing business the way we used to, it is a good time to confirm that employees working remotely are doing so as securely as possible.

Tips on working securely from home


Acceptable Use

Employees should follow the same policies and procedures as if they were working in the office.

Only use company set up email, messaging, storage, etc when doing work for the company.

Home Office

If possible, have a private area set up to work. This space should send a clear signal to you that it’s time to focus. To avoid burnout, try to stay away from your workspace when you’re not working, unless absolutely necessary.

Secure Remote Connection

Connection to the office should only be made using a secure VPN (Virtual Private Network).

Password Security

Passwords used should be unique and no less than 12 characters on all devices being used, the longer the better.

End-Point Protection and Patching

Employees using a personal computer/laptop should make sure there is up to date anti-virus software installed and the operating system is up to date with updates/patches, including 3rd party software, downloaded and installed on regular basis.

Wi-Fi Security

If using a wireless connection, make sure the connection is encrypted and the wireless password is strong.

Confirm that the login and password for the router (usually provided by the ISP, Internet Service Provider) has been changed. Most personal routers still have the default login and password which is not only weak, but also known across the Internet and easily searchable online.

User Awareness

Lock your computer/laptop screen when you walk away or are finished working.

Stay vigilant when it comes to phishing emails.  Phishing emails are up 667% and according to Google 81 million phishing emails containing malware are being sent each day. Verify, Verify, verify before providing personal information or doing a financial transaction.

Notify your IT company IMMEDIATELY if you possibly clicked on or downloaded something suspicious.  The quicker they can run mitigation the better.

As many of you are aware hacking is big business costing many businesses a ton of money. 

Many hackers are employed just like we are. They are given quotas to meet, deadlines, and are expected to perform in order to keep their job.

Let’s make it hard for them to stay employed! 

SME is here to assist in any way that we can.  If you have any questions about working securely from home or any other IT/security related questions, please give us a call at 703-378-4110 or email info@smeinc.net.

Stay Safe, Healthy, and Sane!

Filed Under: Uncategorized

October 21, 2020 By SME, Inc.

Simple Steps to Securing Yourself Online

Use a Security Application

This can be in the form of an antivirus, anti-malware, or firewall application. These applications come in both free and paid versions. This can be a confusing process but by looking at reviews and comparing these tools to find the right one for your specific needs. Some companies will even include all of these tools in one standalone application.

Don’t Click on Just Anything

Be cognizant of what it is that you are trying to access online. Many of the attacks we see and hear about in the news started off with someone clicking on a link they thought was legit but was in reality a malicious link or email attachment that unknowingly installed software.

Learning what the tell-tale signs of phishing sites and malicious URL’s is a very valuable skill for every online user to have. Instead of immediately clicking on the link, ask yourself, “Am I expecting this email from so-and-so? Did I sign up for this?”. Another trick we call can do is to hover over the link (not clicking it) and see if the URL is taking you to a legit website, or if the URL is a confusingly long and obfuscated, seemingly random string of characters; if so then you can probably guess that it is not something you want to click on.

Also, to cover our previous point of using security applications, there are some anti-malware and applications that offer real-time scanning and browser protection that warns or advises users that the link or website they are attempting to visit may contain malicious content. These tools can further protect you from downloading ransomware, adware, or trojan horses from infecting your device.

The Password is Strong with This One

123456, password, iloveyou

Recognize any of those? If so then they may just be one of your passwords, and if they are then you may want to check and see if you’ve been pwnded. Not all hackers are like the ones you see in the movies, they don’t’ all wear black hoodies, slam back energy drinks, or listen to techno music while they take down the Gibson. However, all hackers LOVE easy to guess passwords! One of the most common entry points for cyber-attacks is a weak password that you are using to try and secure your online account.

Here is a short list of the 30 most commonly used passwords of 2020

Using one password decently strong for every account is a dangerous game to play with your online security, using one weak password for your accounts, you may as well just leave the door wide open. Point of this? Use strong passwords! Strong passwords can be difficult to remember, sure. However, there are smart people who have thought of this already and offer solutions for us. Password managers like LastPass and BitWarden both offer free and premium solutions for not only generating extremely strong passwords, but storing them for you as well, better yet, they even offer plugins that will auto-inject these passwords into your online accounts so you don’t have to copy and paste them yourself. Another, easier to remember solution is to use passphrases instead of passwords. Using multiple words strung together to create a phrase adds variation to the password, this way you can still remember multiple passwords easily and are still getting strong passwords that protects your accounts.

Filed Under: Uncategorized

October 15, 2020 By SME, Inc.

Happy Cybersecurity Awareness Month! … So what is it?

History

Since its inception in 2004 Cybersecurity Awareness Month has had one main goal: making Americans safer and more secure online. Launched as a collaborative effort by the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) C.A.M strives to increase the importance of cybersecurity across our Nation, attempting to ensure that as many Americans have the resources needed in order to practice their own cyber hygiene at home, or in a corporate environment.

Now, 16 years later Cybersecurity Awareness Month has grown into somewhat of a grassroots campaign, with massive efforts being led by the participation of many large companies in the industry, as well as government agencies all in an attempt to engage their customers, employees, college campuses, and the general public with the idea that every digital user should have some idea of how to be safe and secure while using the Internet.

169 million personal records from financial, business, education, healthcare, and public sectors were exposed in 2015

If You Connect It, Protect It

In order to keep yourself safe online, any device that you are using in order to access content from the Internet needs to be protected. This can be as simple as keeping the device up to date with the current software updates available, knowing exactly what it is that you are trying to access online, or ensuring that you are using strong password for every online account.

In order to understand how important Cybersecurity Awareness is, you must first understand that you are a target, you have something that online criminals want, whether it be personal/private information in the form of your date of birth, your mother’s maiden name, or even your healthcare records and credit/debit card information. Threat actors will attempt to use this data in order to try and steal something from you or break into your accounts.

Filed Under: Uncategorized

June 22, 2017 By SME, Inc.

Phishing

Phishing scams continue to plague businesses.  We receive many calls and emails from customers who continue to receive these malicious emails.

Attackers are targeting employees and getting more sophisticated in their tactics.  Attackers are counting on businesses not having layers of security in place.  Attackers are counting on businesses not having policies and procedures and if they do employees are not following them. Attackers are counting on employees not being properly trained on how to spot a phishing email.  Your best line of defense is to have layers of security in place, implement specific policies and procedures, train your employees, have an ongoing security awareness training program, and communicate your expectations.  Educate and empower your employees, everyone is part of the security team.

SME is here!  We can assist you with implementing layers of security, writing your policies and procedures, training your employees, and building an ongoing security awareness training program combined with phishing simulations that assists in driving behavior change to further protect your business.

SME has multiple solutions that can increase the security posture of your business.  If you have any questions or for more information give us a call for a free consultation.

Filed Under: Uncategorized

August 15, 2016 By SME, Inc.

Defcon 24

Defcon 24 was amazing once again this year.  SME shared and gained knowledge with the global infosec community.  We are even more prepared to help defend your business.

One of the most amazing things we witnessed was the DARPA Cyber Grand Challenge, no telling what the future holds.

Check it Out!

https://www.cybergrandchallenge.com/

 

Filed Under: Uncategorized

July 29, 2016 By SME, Inc.

SME helps meet your compliance needs with Amazon Web Services

AWS is the first cloud service provider to successfully complete the assessment against the newly released PCI Data Security Standard (PCI DSS) version 3.2, 18 months in advance of the mandatory February 1, 2018, deadline.

http://blogs.aws.amazon.com/security/post/Tx20SIO4LU1XDFA/AWS-Becomes-First-Cloud-Service-Provider-to-Adopt-New-PCI-DSS-3-2

 

Filed Under: Uncategorized

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next Page »

Contact Us

    Your Name

    Your Email

    Subject

    Your Message

    Recent Post

    Government contractors play a critical role in supporting various agencies and handling sensitive information. To … More »

    What Our Clients Say

    "SME handles all of our internet hosting needs, providing a reliable, high-performance, secure and cost-effective platform for us to host web-based systems for biotech companies. We have been consistently impressed with the responsive, knowledgeable and professional service we receive."

    Simply Making IT Easier!TM
    Local: 703-378-4110
    Toll Free: 855-2-SMEINC
    Email: info [at] smeinc.net

    Copyright © 2023 · Systems Management Enterprises, Inc. · Privacy Policy · Terms of Service