Trend Micro Worry Free Business Security Service Pack 2 & Critical Update available!

Trend Micro SecurityMany of the businesses that Homeland Secure IT serves are using Trend Micro Worry-Free Business Security as their weapon of choice against malware and even spam. Once the product is loaded on their server and installed on their desktops, it will generally automatically download the security updates required to keep it current.

However, every once in a while, Trend Micro will release an update to the entire system, which requires manual installation.  This is keeps updates which might interfere with critical systems from being installed, and it also insures that new settings that require configuration are not put into the wrong state, crippling your network.

Currently, those who are running Worry-Free Business Security 9.0 Standard or Advanced, may be in need of two updates.

Service Pack 2, released in August, offers support for Windows 10 machines and enhanced ransomware protection.

Enhanced scan features can identify and block ransomware programs that target documents that run on endpoints by identifying common behaviors and blocking processes commonly associated with ransomware programs

In addition to the Service Pack 2 release, a Critical Patch was released on 8/31, which should also be applied to your Trend Micro Worry-Free Business Security servers.

Should you require assistance with this, Homeland Secure IT is happy to help!  We can work with you in and around the Greenville SC area, or remotely if need be just about anywhere in the world!

If you are not using Trend Micro’s security products and would like more information about what it can do for your company, use our contact form or give us a call at 864-990-4748!

Watch out for fake Microsoft Windows 10 update email – Malware Warning!

Windows 10 Malware Email WarningWith all the excitement about Microsoft Windows 10 being a FREE update, some people signed up for the “Get Windows 10” promotion as prompted in their taskbar, to be put on a waiting list. So it’s not surprising that when an email comes in that looks legit, that someone might follow the link and attempt to install it.

 

Unfortunately for them, a form of malware called “RansomWare” is being deployed via the zip file included in the email – if their anti-virus doesn’t strip it out, they may actually fall for it as it is very convincing as the email appears to come from Microsoft.

From: Microsoft <update@microsoft.com>

Upgrade to Windows 10 for free

Windows 10 is familiar and easy to use. It includes an improved Start menu and is designed to startup and resume fast. it’s packed with new innovations including Microsoft Edge – an all-new browser. Your personal files and apps you’ve installed will all be waiting for you. We’ve designed the upgrade to be easy and compatible with the hardware and software you already use.

Don’t miss out as this free offer won’t last forever. Upgrade today. Follow the attached installer and get started.

Upgrading from Windows 7 or Windows 8? You will love Windows 10!

If you are an individual, you are now warned and won’t do that, but what about companies who have many computers?

KnowBe4 has crafted the following email that they suggest system administrators of businesses send to their end users:

Microsoft is in the process of releasing their new Windows 10 Operating System. This is an upgrade that you do not pay for, promises to fix problems with earlier versions, and claims to be more secure. They plan to upgrade a billion personal computers, causing inevitable confusion among PC users.

“Bad guys are trying to exploit this confusion. You might get calls from scammers that claim to be Microsoft tech support and try to charge you for the upgrade using your credit card. 

“Be very careful with any email claiming to be from Microsoft about “your Windows 10 Upgrade”. Make sure that any links in the email really go to Microsoft. Better yet, do not click on any link or open any attachment, but go to the Microsoft website for more information.” Here is the link:

http://www.microsoft.com/en-us/windows/windows-10-upgrade?

As always, should you have questions or need assistance with this or any other Microsoft or Network Security issue, or want to know if Windows 10 is right for you or your business, please do not hesitate to contact us!  You can reach us at 864-990-4748.

 

We’ve been voted Best of the Upstate for Best Computer Services! We are humbled!

Best of the Upstate - Best Computer Services

Best of the Upstate – Best Computer Services Greenville News Reader Choice Award

Pamela & I attended the Greenville News “Best of the Upstate” award ceremony last night after receiving an invitation stating we were one of two finalists in their Reader Choice Awards. We were in the Best Computer Services category and we were up against a well established and respected business machines & computer sales & service provider.

We sat on the edge of our seats, semi-patiently waiting and finally, they announced Homeland Secure IT was the winner!

Obviously, you like to believe your company is the best, as you pour your blood, sweat and tears into it, but it is very humbling when others feel the same way, strongly enough to invest the time to log into the voting site and cast a vote!

We’re not 100% sure who was responsible for our nomination, however, we are absolutely sure who was responsible for helping us win.

Each of you who have voted and supported Homeland Secure IT  has our gratitude, and our promise that we will strive to be even better in the coming years!

We are continually exploring ways to provide you with better service, and one is the addition of a new computer repair technician. Stay tuned for more information on that front.

Also, we have given great consideration to expanding our business and have not ruled out the purchase of another IT company – if you know anyone ready to retire or move to another career, put them in touch with us.

Thanks again!

John, Pamela, Greg & Wes

Need computer or network service in Greenville or Upstate SC?  Please use our contact form, or pick up the phone and call us at 864-990-4748 ext 0

Adobe out of band patch fixes flash vulnerability (Windows / Mac / Linux)

Adobe has released an out of band patch that corrects a flaw in Flash player which could permit an attacker to take control of an exploited system.

This is actively being exploited by hackers and we recommend that the patch be applied immediately.

More information about this security issue can be found on Adobe’s security website.

If you require any assistance with this computer security issue or any other for your Greenville based business or your home system, please do not hesitate to call us at 864.990.4748 or use our contact form.

Thank you for the Best of the Upstate nomination for BEST COMPUTER SERVICE!

The Greenville News has a yearly “Best of the Upstate” program where people nominate businesses, organizations and individuals who they feel are the best our area has to offer.

This year, someone (or multiple someones?) nominated us, Homeland Secure IT, in the category of “Best Computer Service”!  I don’t know who this kind stranger was (or kind strangers), but we thank you for putting your faith into our business and for supporting us in this way!

It’s an honor to even be nominated, but if you want to help us further, you could vote for us and who knows, maybe, just maybe, we could win it!?!

The direct link to vote is here:

Vote for Homeland Secure IT, LLC – BEST COMPUTER SERVICE – Upstate SC!

We hope that you actually feel we are the best too!

One other thing – if while you were there, you could vote for my band, Hot As A Pepper, that would be swell, as we have a lot of awesome competition there too!

Vote for Hot As A Pepper – Best Local Band – Upstate, SC

Thank you for taking time out of your busy schedule, we appreciate you!

– John & Pamela Hoyt, Greg Varner, Wes Ellison, and the members of Hot As A Pepper

EDIT: Apparently – you can vote once per day!   We have been voting for each of our supporters and friends too!

Greenville Computer Virus Cleanup and Removal Experts

Greenville Virus Experts Logo

If you see mention of “Greenville Virus Experts”, that’s us!

We have created a new website especially designed to attract the eye of someone who might be experiencing a computer security issue such as a virus, worm, trojan or other malware.  Searching for “Greenville virus cleanup” might result in a person finding the Homeland Secure IT site, but our home page was not designed for that purpose and may be confusing.

The new site is ONLY for virus cleanup and removal.  It might help someone determine if we are the right business for them.

You can find the new site here: http://www.GreenvilleVirusExperts.com

We have a facebook page too, but nothing is posted there – give us a like!

https://www.facebook.com/GreenvilleVirusExperts

As always, if we can help with your computer security issues in the Greenville and Upstate SC area, or any computer service for home or business, please call us!

Upgrade paths for Microsoft Windows 10

It was announced recently that the Microsoft Windows 10 release will feature several upgrade paths and licensing options…   Here’s a summary of what was posted on the Microsoft Australia Partner Network site a couple days ago:

The new Microsoft Windows 10 editions are Home, Pro, Enterprise, Education, Mobile, and Mobile Enterprise.

 

Microsoft will offer a free upgrade to Windows 10 for qualified Windows 7, Windows 8, and Windows Phone 8.1 devices in the first year, and after the first year, upgrades will be paid via boxed product and VL Upgrades.

Windows 8/8.1 and Windows 7 Home Basic and Home Premium devices can be upgraded to Windows 10 Home, and Windows 8/8.1 Pro and Windows 7 Professional and Ultimate devices can be updated to Windows 10 Pro.

If a device is upgraded within the first 12 months after the Windows 10 launch, it will continue to receive Windows 10 updates for free throughout its life. However, this excludes Windows Enterprise and RT devices. You’ll be able to get your free Windows 10 upgrade through Windows Update.

At Ignite 2015, Microsoft stated that it will provide a free Windows Update for Business service to Windows Pro and Windows Enterprise devices. This will provide business users with the most up-to-date security defenses in Windows.

Windows 10 is set to be released this summer, likely by the end of July. Microsoft has already announced that Windows 10 will be the last “version” of its operating system. Following its release, Microsoft will continue to make system improvements over time.

As always, Homeland Secure IT will provide complete computer service, computer repair and computer upgrades to individuals and businesses in the Greenville, SC area. Give us a call if we can assist in any IT support matter, or computer sales. 864-990-4748

PSA: The Annual International Internet Spring Cleaning Day is once again upon us!

Public Service AnnouncementSpring has sprung and with it comes Annual International Internet Spring Cleaning Day!

This year ISPs (Internet Service Providers) around the world are increasing their efforts to keep our networks in tip-top shape so that they perform as fast as possible.

Perhaps you may have missed the stories on the news and the endless emails flying around for the last week or so, I will go over the details here.

In the past, Internet Cleaning Day has taken place during a 24hr period, but due to new techniques, ISPs have managed to compress the process down to only 1 hour which they have conveniently scheduled for 12pm to 1pm in each time zone.

So with that said, on Wednesday (2015-04-01), at noon, before you leave your office for lunch, you should take some precautions to protect your electronics and fine furnishings from the chemicals that are blown through the lines. We have found that simply unplugging the network cable from the back of your computer and placing it into a trashcan with a liner is best, but you can use an empty water bottle or even a coffee cup in a pinch. If using a coffee cup, or bottle though, you may want to put a layer of newspaper or other papers under it in case of any splashes or spills.

While normal analog phone systems are not going to be affected, VoIP systems WILL be… This is often overlooked! You should follow the same procedure if your business is using Voice over IP technology. If you are unsure, it is best to disconnect the cables and place in the same container as your network cables.

If you are using wireless devices, simply turning off the radio or disconnecting from all access points should work, but to be on the safe side, we recommend that you turn it off completely.
Should you require assistance with computer, server, network or even your internet spring cleaning in the Greenville, SC or Upstate, SC area, please call us at 864.990.4748

A Plethora of Patches for Microsoft’s Patch Tuesday – March 2015

FREAK vulnerabilities fixedOn Monday 2015-03-09, Apple released a slew of updates to address security issues, and on the regularly scheduled “Patch Tuesday” 2015-03-10, Microsoft made a rather large bundle of security updates available.

Many security experts did not believe Microsoft would correct the FREAK vulnerability during this batch of patches, however it appears that they did.

It is estimated that the FREAK vulnerability affects hundreds of millions of PCs and it seems that those who apply the patches on their Apple, iOS and Microsoft machines may be secure.

If you question whether your computer or business network is up to date and secure, please seek out proper IT support. Homeland Secure IT would be more than happy to talk with you if you use our CONTACT FORM or call us at 864.990.4748 – we provide IT service, support and complete outsourcing to Greenville and the entire Upstate SC area.

What follows is the Microsoft summary of their patches.

Bulletin ID Bulletin Title and Executive Summary Maximum Severity Rating Restart Affected
& Vulnerability Impact Software
MS15-018 Cumulative Security Update for Internet Explorer (3032359) Critical  Requires restart Microsoft Windows
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Remote Code Execution Internet Explorer
MS15-019 Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3040297) Critical  May require restart Microsoft Windows
This security update resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Remote Code Execution
MS15-020 Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution (3041836) Critical  May require restart Microsoft Windows
This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker successfully convinces a user to browse to a specially crafted website, open a specially crafted file, or browse to a working directory that contains a specially crafted DLL file. Remote Code Execution
MS15-021 Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution (3032323) Critical  Requires restart Microsoft Windows
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Remote Code Execution
MS15-022 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3038999) Critical  May require restart Microsoft Office,
This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Remote Code Execution Microsoft Server Software
MS15-023 Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege (3034344) Important  Requires restart Microsoft Windows
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application designed to increase privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. Elevation of Privilege
MS15-024 Vulnerability in PNG Processing Could Allow Information Disclosure (3035132) Important  May require restart Microsoft Windows
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if an attacker convinces a user to visit a website that contains specially crafted PNG images. Information Disclosure
MS15-025 Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (3038680) Important  Requires restart Microsoft Windows
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited the vulnerability could run arbitrary code in the security context of the account of another user who is logged on to the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts potentially with full user rights. Elevation of Privilege
MS15-026 Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege (3040856) Important  Does not require restart Microsoft Exchange
This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow elevation of privilege if a user clicks a specially crafted URL that takes them to a targeted Outlook Web App site. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an instant messenger or email message that takes them to the attacker’s website, and then convince them to click the specially crafted URL. Elevation of Privilege
MS15-027 Vulnerability in NETLOGON Could Allow Spoofing (3002657) Important  Requires restart Microsoft Windows
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker who is logged onto a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged onto a domain-joined system and be able to observe network traffic. Spoofing
MS15-028 Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass (3030377) Important  Requires restart Microsoft Windows
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow a user with limited privileges on an affected system to leverage Task Scheduler to execute files that they do not have permissions to run. An attacker who successfully exploited this vulnerability could bypass ACL checks and run privileged executables. Security Feature Bypass
MS15-029 Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure (3035126) Important  May require restart Microsoft Windows
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. Information Disclosure
MS15-030 Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (3039976) Important  Requires restart Microsoft Windows
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker creates multiple Remote Desktop Protocol (RDP) sessions that fail to properly free objects in memory. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. Denial of Service
MS15-031 Vulnerability in Schannel Could Allow Security Feature Bypass (3046049) Important  Requires restart Microsoft Windows
This security update resolves a vulnerability in Microsoft Windows that facilitates exploitation of the publicly disclosed FREAK technique, an industry-wide issue that is not specific to Windows operating systems. The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the key length of an RSA key to EXPORT-grade length in a TLS connection. Any Windows system using Schannel to connect to a remote TLS server with an insecure cipher suite is affected. Security Feature Bypass