Some Christmas crackers – of the IT variety

It’s the season for it, and to celebrate the (almost) last working day before the big 2-5, we’ve joined many TV channels in producing our very own top-10 countdown. Based on some of the TV offerings we’ve seen, we could have chosen to count down anything from our top-10 favourite Christmas puddings through to our top-10 yellow socks, but as we’re IT folks we thought we’d give something else a try.

So we’ve gone for……. the somewhat less-than-punchy title of our top-10 IT, tech or internet related jokes or funny quotes. In the humble opinion of the team at Complete IT Systems, it’s 10 of the best from around the internet.

Enjoy – and please make sure you reference (or at least think of us!) if you find yourself resorting to them on Christmas day when the cracker jokes have dried up!

  1. Technology is dominated by two types of people: those who understand what they do not manage, and those who manage what they do not understand. Archibald Putt
  2. If you don’t want to be replaced by a computer, don’t act like one. — Arno Penzias.
  3. Science is supposedly the method by which we stand on the shoulders of those who came before us. In computer science, we all are standing on each others’ feet. — G. Popek.
  4. Smash forehead on keyboard to continue… – unattributed
  5. Murphy’s Law of Inconvenient Malfunction: A device will fail at the least opportune possible moment.
  6. What is a mouse potato? The online, wired generation’s answer to the couch potato.
  7. I sit looking at this damn computer screen all day long, day in and day out, week after week, and think: Man, if I could just find the ‘on’ switch… — Zachary Good.
  8. On the negative side, I’ve been getting charged for a ton of stuff I didn’t order lately. On the positive side, I did win that ‘Who’s Got the Best Password’ contest on AOL last week. — Spike Donner.
  9. At some point…we must have faith in the intelligence of the end user. – Unattributed
  10. And finally, as the great Thomas Edison once said (in a light bulb moment?…), “I have not failed. I’ve just found 10,000 ways that won’t work”.

That’s all folks – all that’s left to say is to have a great Christmas and a wonderful new year.

Thanks to the following sites for making our research easier – and there’s plenty more funnies to be found on them too.

https://whatis.techtarget.com/reference/Fast-Guide-to-IT-Humor

http://www.dangerouslogic.com/office_lexicon.html

https://whatis.techtarget.com/definition/Murphys-Law

http://www.gdargaud.net/Humor/QuotesComputer.html

https://whatis.techtarget.com/definition/Our-Favorite-Technology-Quotations

It’s the Complete IT advent calendar – there’s deals under today’s window!

With advent calendar season in full swing, we’re celebrating by showcasing our services, cyber security tips, IT cost saving advice, and other useful hints and tips. But as we do that in our blog throughout the year (by the way, let us know if you’d like us to cover any other topics and we’ll be happy to accommodate any *reasonable* requests!), we decided to do something a little different as it’s Christmas.

We’ve decided to showcase a different one of our services each day in the build-up to the big event, including some services that you may not have realised we offer and that could really be an early Christmas present for your business as you build your plans for next year. Better still it won’t affect your waistline like other more traditional forms of the advent calendar, and will be way more useful than your knitted jumper from Gran – what’s not to love!

What’s under today’s window?

Canon’s special cashback offers give you the opportunity to freshen up your print environment in spectacular style ready for the new year, with great printer cashback deals on the MAXIFY, i-SENSYS and imageRUNNER products.

Your business can now claim up to £100 cashback on the selected printers with a bonus £10 printer cashback when bought with Canon Ink or Toner (only applicable with colour printers). Full information, including how we can even help you with the claiming process, is on this page. Maybe Christmas really has come early this year!

A little about Complete IT Systems…

As always with Complete IT Systems, our goal is to work with best of breed IT solutions to give your business real competitive advantages, and above all to continue our fine tradition of offering friendly, expert advice to our clients. Now is the perfect time to see how our skilled team can help your business from our Bradford, Leicester or Glasgow offices, and see how we can help relieve unnecessary stress from your day-to-day IT and help you deliver effectively on bigger projects.

Happy 11th December, and we’ll see you tomorrow for the next window!

It’s the Complete IT advent calendar – today’s window!

As you know, it’s officially advent calendar season in the countdown to Christmas 2018. To celebrate, we thought about a few things that would be useful to do including cyber security tips, IT cost saving advice, and other useful hints and tips. But as we do that in our blog throughout the year (by the way, let us know if you’d like us to cover any other topics and we’ll be happy to accommodate any *reasonable* requests!), we decided to do something a little different as it’s Christmas.

We’ve decided to showcase a different one of our services each day in the build-up to the big event, including some services that you may not have realised we offer and that could really be an early Christmas present for your business as you build your plans for next year. Better still it won’t affect your waistline like other more traditional forms of the advent calendar, and will be way more useful than your knitted jumper from Gran – what’s not to love!

What’s under today’s window?

The right audio or visual solution can make a real difference to your business, whether it’s in efficiency terms, increased productivity or simply to impress your clients. We fully understand this and that’s why we work with you to recommend the AV equipment that meets your needs.

We can supply a wide variety of AV products and services, including conference equipment, monitors, projectors, wall screens, Plasma & HD displays, speaker systems and cabling.

Click here for some more information about what we offer.

A little about Complete IT Systems…

As always with Complete IT Systems, our goal is to work with best of breed IT solutions to give your business real competitive advantages, and above all to continue our fine tradition of offering friendly, expert advice to our clients. Now is the perfect time to see how our skilled team can help your business from our Bradford, Leicester or Glasgow offices, and see how we can help relieve unnecessary stress from your day-to-day IT and help you deliver effectively on bigger projects.

We’ll also have a few special festive giveaways and deals over the coming weeks, so keep checking back to see what’s inside the window each day!

Happy 7th December, and we’ll see you on Monday for the next window! Until then have a great weekend!

 

It’s the Complete IT advent calendar – window #2!

As you know, it’s officially advent calendar season in the countdown to Christmas 2018. To celebrate, we thought about a few things that would be useful to do including cyber security tips, IT cost saving advice, and other useful hints and tips. But as we do that in our blog throughout the year (by the way, let us know if you’d like us to cover any other topics and we’ll be happy to accommodate any *reasonable* requests!), we decided to do something a little different as it’s Christmas.

We’ve decided to showcase a different one of our services each day in the build-up to the big event, including some services that you may not have realised we offer and that could really be an early Christmas present for your business as you build your plans for next year. Better still it won’t affect your waistline like other more traditional forms of the advent calendar, and will be way more useful than your knitted jumper from Gran – what’s not to love!

What’s under window #2?

It’s not the most festive topic, but our best-in-class IT security services are behind today’s window. As you’ll be acutely aware, businesses now rely more and more on IT to support their activities, and this makes them increasingly vulnerable to threats from hackers, viruses and even their own staff. Having the correct information at the right time can make the difference between success and failure for your company – strong IT security has never been so crucial.

Click here to see what security services and expertise we offer our clients, and how your business could benefit too as we enter the new year.

A little about Complete IT Systems…

As always with Complete IT Systems, our goal is to work with best of breed IT solutions to give your business real competitive advantages, and above all to continue our fine tradition of offering friendly, expert advice to our clients. Now is the perfect time to see how our skilled team can help your business from our Bradford, Leicester or Glasgow offices, and see how we can help relieve unnecessary stress from your day-to-day IT and help you deliver effectively on bigger projects.

We’ll also have a few special festive giveaways and deals over the coming weeks, so keep checking back to see what’s inside the window each day!

Happy 5th December, and we’ll see you tomorrow for the next window! Until then!

It’s the Complete IT advent calendar!

As you know, it’s officially advent calendar season in the countdown to Christmas 2018. To celebrate, we thought about a few things that would be useful to do including cyber security tips, IT cost saving advice, and other useful hints and tips. But as we do that in our blog throughout the year (by the way, let us know if you’d like us to cover any other topics and we’ll be happy to accommodate any *reasonable* requests!), we decided to do something a little different as it’s Christmas.

So, drum roll……

….we’ve decided to showcase a different one of our services each day in the build-up to the big event, including some services that you may not have realised we offer and that could really be an early Christmas present for your business as you build your plans for next year. Better still it won’t affect your waistline like other more traditional forms of the advent calendar, and will be way more useful than your knitted jumper from Gran – what’s not to love!

As always with Complete IT Systems, our goal is to work with best of breed IT solutions to give your business real competitive advantages, and above all to continue our fine tradition of offering friendly, expert advice to our clients. Now is the perfect time to see how our skilled team can help your business from our Bradford, Leicester or Glasgow offices, and see how we can help relieve unnecessary stress from your day-to-day IT and help you deliver effectively on bigger projects.

We’ll also have a few special festive giveaways and deals over the coming weeks, so keep checking back to see what’s inside the window each day!

So we know you’re waiting with bated breath! What’s under the first window?

Under today’s window are our new IT recycling and data destruction services, as we thought it would be a great place to start as you revisit your green policies for 2019. 

In the modern era, it’s not enough for a business to wash its hands of IT hardware when it reaches the end of its valuable life or as you begin your journey into the cloud. Not only is such a practice bad for the environment, but irresponsible disposal of IT assets can also carry a data security risk as well as compliance ramifications.

We have developed new this service in response to our customers’ requests to help them given the increased importance of data protection legislation and GDPR compliance. As you would expect, we use state of the art tools to ensure all your company data is erased, whilst at the same time upholding all our responsibilities under the Waste Electrical and Electronic Equipment (WEEE) directive and UK (England & Wales) waste legislation to ensure equipment is where possible re-used and/or recycled.

An outline of the service is provided below, and you can call us on 01274 396 213 at any time for an informal chat to find out more.

Happy 4th December, and we’ll see you tomorrow for the next window! Until then!

Why are mobile devices like a needle in a haystack for IT?

When your business depends on response speed and access to data and email, ‘on the go’ availability is a must. However, more access brings more mobile data security threats. That is why it is rational to assess risks and have a well-thought-out protection strategy before adopting mobile device usage across your business.

As part of our series of blogs highlighting the pitfalls of cyber security for business, this week we’re looking at why mobile devices with access to business data can prove to be a needle in a haystack for IT to keep track of.

Mobile devices – a needle in a haystack for IT

An employee’s mobile device is an interesting target to a broad array of cybercriminals. Some are looking for corporate intellectual property (and according to Kaspersky’s “IT Security Risks Survey 2018,” employees in 1 in 5 enterprises access corporate intellectual property using their personal mobile devices and tablets). Others think that your contact list is good loot — it can be used for spear-phishing attacks on your colleagues.

While those are rather exotic threats, don’t forget about more widely distributed malware that doesn’t target a specific business. Last year, our systems registered 42 million attempted attacks on mobile devices. They included a variety of Trojans that tried to hijack social media and bank accounts, ransomware, and more. They may not sound as scary as targeted attacks, but they can cause plenty of harm, especially if the accounts in question are corporate ones, and the situation is especially common in small and medium businesses.

Mobile specifics

The main problem with mobile devices is that they do not stay inside a company’s security perimeter, which makes pinpointing the threats akin to searching for the proverbial needle in a haystack for IT. They can be exposed to unsecured public Wi-Fi or just be lost or stolen. When employees use the same device for both work and personal activities, more problems pop up. An employee might accidentally download a compromised application preloaded with a spying module or ransomware, for example. They might try to root or jailbreak their device and expose it to even more threats.

Some of the problems with mobile data security — unfortunately, not all of them — can be solved with mobile device management and enterprise mobility management solutions. To resist sophisticated malware, companies need an additional level of protection.

How to prevent business mobile security breaches

Kaspersky’s ‘Security for Mobile’ solution was recently updated to include machine-learning-assisted technologies with cloud-based threat intelligence mechanisms to bring threat prevention, detection, and remediation to mobile platforms and thus keep your business information safe.

For example, Kaspersky Security for Mobile can detect if an employee’s smartphone or tablet is jailbroken or rooted (bad enough if the employee did it, but worse if done without their knowledge). Our solution also provides application control, Web traffic control, antiphishing, and antispam subsystems to corporate devices.

Kaspersky Security for Mobile integrates with Microsoft Exchange ActiveSync, iOS MDM, and Samsung KNOX platforms; and Kaspersky Security for Android (a part of this solution) is also compatible with VMware AirWatch and MobileIron. That compatibility allows your IT staff to configure and control security management for most widely used mobile devices.

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

A data breach won’t happen to our business, we’re all tech savvy…

As part of our series of blogs highlighting the pitfalls of file sharing with USBs, this week we’re looking at some common mistakes that are very easy to make in a busy office environment. And it’s also a reminder that, rightly or wrongly, having a policy in place does not mean it’s being followed.

A day in the life of a small business

To do this, we’ll step into a day in the life of the Magenta Elk advertising agency – from its beginnings as a family design studio, ME has grown into a company with almost 100 employees. Now it has a whole department of designers, a creative director able to hit the spot with even the most delusional client, a Web development department, and even its own small printing house (also a former small business, acquired three years ago). Among its clients are several major international companies that trust the agency to handle their advertising campaigns.

How about IT?

But the owners never found the resources for a halfway-decent IT department. Bill manages all equipment; he repaired computers as an on-call handyman before being hired a few years ago. He never managed to persuade the owners to take on at least one more member of staff to help out.

As a result…

Bill doesn’t like morning calls. It’s not that he’s lazy; he just thinks that work should begin once one’s emotional balance has been restored after the mayhem of the morning commute — and certainly not before the second cup of coffee. But the phone’s been ringing non-stop.

“Give me a break! Don’t people know it’s rude to hang up after three rings! No respect! What if I’m busy with something important?” grumbles Bill, trying to dig out his phone from under a pile on his desk as it rings again.

“Bill, my flash drive isn’t loading,” the layout designer whines over the phone.

“That’s because I disabled all the ports on your machine ages ago! You know all files have to be loaded through a secure computer — talk to Albert. If I had my way, I’d cut you off from the Internet!” he responds, adding silently to himself, “and I’d rip your arms off as well.”

“I know, I know! But it’s not just me — it won’t load on anyone’s computer! Please help, it’s a really important task. We have to change the layout quick or they’ll kill me. Albert won’t be back till after lunch.”

“Dwight, we agreed that all tasks go through Albert, all documents go through his computer. It’s the only one in the department with antivirus. Anyway, who suddenly gave you files on a flash drive?”

“Christine did. She asked me to make some urgent corrections to the layout of the leaflet. It needs to be printed ASAP. She’ll kill me if it’s not done pronto, she doesn’t care if Al’s not around. You know what she’s like.”

“Your flash drives will be the death of me. Fine, I’ll be right there.”

Bill hangs up and looks thoughtfully at the ceiling. Yeah, their boss is a dragon, all right — and she couldn’t care less about conventions like the procedure for transferring files from external sources. The sysadmin stands up, stretches, puts his laptop under his arm, and heads toward the design area.

“Give me your flash drive!” growls Bill, opening his laptop as he approaches. “What can’t you read here? Everything’s working on my machine. Drivers are installing…scan, you bet…open…here’s the project folder.”

At this point, the antivirus displays a red window: “Malicious object Trojan.downloader.thirdeye.n was detected.” Bill gapes at the screen.

“Dwight, what the hell is this?! Did you try to open this anywhere else?” Bill jabs a finger at the file Layout_corrections.docx.exe.

“Well, how else would I know what changes to make? I tried, but it wouldn’t open at all. I clicked and nothing happened.”

“Can’t you see it’s not even a document?! The extension is EXE!”

“I can’t see any extensions! I can see the icon and the name. Why are you shouting at me? All I did was try to open Christine’s file!”

“Makes sense, I guess. The extensions of known files aren’t shown,” muses Bill. “All right, let’s stay calm: Which machines did you try to read it on?”

“Well, on Anna Miller’s, in accounting. On the photographer’s laptop. And there was Lena from logistics. And Tom from Web dev. And Kate…what’s wrong, is it a virus? It’s not my fault! Maybe the photographer had an infection!”

“This isn’t just any virus — it’s a Trojan tailor-made for you! It doesn’t just infect random machines; someone put it on this flash drive specifically!” Bill logs in to the Web interface of the router to isolate the computers mentioned. “By the way, where did you get Christine’s password? She left yesterday for a business trip.”

“It’s on a piece of paper under her keyboard — everyone knows that…” mumbles the layout designer, still on the defensive. “I didn’t take it home or anything, I only found it yesterday!”

“What do you mean, ‘found’?” says a startled Bill.

“Well, I mean she left it for me at reception with a note saying to fix the layout ASAP.”

“Are you out of your mind? Christine was here almost all day yesterday. Why the hell would she need to leave a flash drive with instructions on a sticky note? Does she leave you notes a lot? You know she prefers to talk face-to-face. And she’d just upload the files to the server! Oh crap, the server!” Bill starts tapping the keyboard again. “Anyone can leave anything at reception. What time did it happen, exactly?”

“Well, I don’t know. It was evening and I was about to leave, then Yvonne said that someone had left me an envelope with a flash drive. She was on her way out for a bite, but she didn’t see who it was. I came back, tried it on Anna’s laptop and on Christine’s, then — well, you know the rest.”

“Dwight, you understand that someone — ” the tirade is interrupted by a mobile call. It’s the CEO. “I’ve got a bad feeling about this….”

“What’s up? Why aren’t you at your desk?” inquires the short-tempered CEO.

“Sorry, the designers have a problem. Someone left a USB flash drive — ”

“Forget the designers,” interrupts the CEO. “I just got a call from Österberg & Jones. Their website has been seeding viruses since last night. We’re the only other people who had access to the site — for updating banners. I need proof it wasn’t us. Assuming it wasn’t us.”

“Umm. Who was it who had access?” asks Bill, growing cold.

“Don’t know, exactly. A couple of Web dev guys; they did the site. Maybe Dwight. Christine for sure — it’s her client, and you know she loves having control over everything.”

“Mmmm…here’s the thing…” Viktor’s voice suddenly drops. “Actually, I think it was us.”

“Well, we’re screwed. They’re threatening lawsuits. If it’s us, then we have a lot of explaining to do. I need a detailed analysis by end of day. If you need outside experts for the investigation, let me know right now. I need a full, honest report in hand when I go crawling to Österberg & Jones. Now give me a quick rundown. What the hell happened?”

“Looks like someone deliberately hit us with an infected flash drive. Österberg & Jones was probably the real target. You know how security is. I do what I can, but we’re a little short on equipment, people, materials…. Even the antivirus isn’t — ”

“OK, OK, I get it. That’s your polite way of saying I’m an idiot. You’ll get your staff, and antivirus for everyone. If we survive this. Which I very much doubt.”

So what can be learned from Magenta Elk’s unfortunate tale?

  1. The company’s procedure for working with files from external sources is perfectly good and proper. But it is not followed, because some employees believe that a task is more important than security. In reality, security should have a higher priority than even direct orders from management.
  2. Too many people can access partner resources, a problem made worse by the fact that no one knows exactly who has access. Ideally, this information should be known by one employee, maximum two. Moreover, access credentials should be required for every login. Saving them in the browser is an extremely bad idea, as is accessing the site from an unprotected computer.
  3. Passwords written on paper and stuck under the keyboard may sound ludicrous, but it’s actually quite common at many companies. This is totally unacceptable — even if no one ever comes to your office, sometimes team members can cause just as much damage.
  4. A reliable security solution must be installed on all machines, without exception.

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Why USBs should spook your business this Halloween…

In light of the recent security breaches at Heathrow Airport involving misplaced USB drives, we’re continuing our theme of highlighting the chilling perils of USBs for business data.

Malware delivered via removable media

The top malware spread via removable media has stayed relatively consistent since at least 2016. For example, the family of Windows LNK malware, Trojans containing links for downloading malicious files or paths for launching a malicious executable, has remained among the top three threats spread by removable media. This malware is used by attackers to destroy, block, modify or copy data, or to disrupt the operation of a device or its network. The WinLNK Runner Trojan, which was the top detected USB threat in 2017, is used in worms for launching executable files.

In 2017, 22.7 million attempted WinLNK.Agent infections were detected, affecting nearly 900,000 users. The estimate for 2018 is around 23 million attacks, hitting just over 700,000 users. This represents a 2% rise in detections and a 20% drop in the number of users targeted year-on-year.

For the WinLNK Runner Trojan the numbers are expected to fall more sharply – with a 61% drop in detections from 2.75 million in 2017 to an estimated 1 million in 2018; and a decline of 51% in the number of users targeted (from around 920,000 in 2017 to just over 450,000 in 2018).

Other top malware spread through USB devices includes the Sality virus, first detected in 2003 but heavily modified since; and the Dinihou worm that automatically copies itself onto a USB drive, creating malicious shortcuts (LNKs) that launch the worm as soon as the new victim opens them.

Miners – rare but persistent

USB devices are also being used to spread cryptocurrency mining software. This is relatively uncommon, but successful enough for attackers to continue using this method of distribution. According to KSN data, a popular crypto-miner detected in drive roots is Trojan.Win32.Miner.ays/Trojan.Win64.Miner.all, known since 2014.

Malware in this family secretly uses the processor capacity of the infected computer to generate the cryptocurrency. The Trojan drops the mining application onto the PC, then installs and silently launches the mining software and downloads the parameters that enable it to send the results to an external server controlled by the attacker.

Kaspersky Lab’s data shows that some of the infections detected in 2018 date back years, indicating a lengthy infection likely to have had a significant negative impact on the processing power of the victim device.

In short, the threats are varied and sophisticated.

What can your business do to safeguard itself?

USB drives offer many advantages: they are compact and handy, and a great brand asset, but the devices themselves, the data stored on them and the computers they are plugged into are all potentially vulnerable to cyberthreats if left unprotected.

Fortunately, there are some effective steps businesses can take to secure the use of USB devices.

Advice for all USB users:

  • Be careful about the devices you connect to your computer – do you know where it came from?
  • Invest in encrypted USB devices from trusted brands – this way you know your data is safe even if you lose the device
  • Make sure all data stored on the USB is also encrypted
  • Have a security solution in place that checks all removable media for malware before they are connected to the network – even trusted brands can be compromised through their supply chain
  • Manage the use of USB devices: define which USB devices can be used, by whom and for what
  • Educate employees on safe USB practices – particularly if they are moving the device between a home computer and a work device
  • Don’t leave USBs lying around or on display

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

Poll: Company USB use

Do you know if your users are using USB sticks to share files and company information? Let us know your company experience with them and see what your counterparts are saying…

<<< Take part in our poll >>>

You can read more about some of the potential pitfalls associated with USBs in our blog.

Are your users using USBs to share company information?

USB sticks

The USB stick is one of those seemingly harmless plug-in accessories that we’ve all used for sharing files and for those last-minute meeting room nightmares when your colleague that was supposed to be presenting your team’s update can’t get online or connect to the projector!

USB sticks

Various incarnations, shapes and sizes of USB devices have been around for almost 20 years now, offering an easy and convenient way to store and transfer digital files between computers that are not directly connected to each other or to the internet.

Even though there’s cool new ways to share things online and via cloud apps, there’s no harm in your users keeping USB sticks ‘just in case’, right? Nowadays, cloud services such as Dropbox have taken on much of USB stick’s traditional workload in terms of file storage and transfer, and there is greater awareness of the security risks associated with USB devices. Because of this, USBs use as an essential business tool is declining – yet millions of USB devices are still produced and distributed annually, with many destined for use in homes, businesses and as marketing promotional items for trade show giveaways.

Is this scaremongering or is the risk of company data loss from USBs real?

99 times out of 100 probably not. But there’s always that risk as Heathrow Airport among many others have found out with its recent £120,000 fine from the ICO. While Heathrow largely ‘got away with that one’ from a hacking perspective at least, USBs have been exploited by cyberthreat actors, most famously by the Stuxnet worm in 2010, which used USB devices to inject malware into the network of an Iranian nuclear facility. And as well as the actual risk of company data loss, there’s also the reputational risk and financial damage of fines from regulations such as the GDPR.

We also understand that laptops, tablets, phones and other such portable endpoint devices with access to sensitive data will always be areas of potential data breach (we can help with those too…), but for the purposes of this article we’re singling out the poor USB!

What do the figures tell us?

In 2016, researchers from the University of Illinois left 297 unlabelled USB flash drives around the university campus to see what would happen. 98% of the dropped drives were picked up by staff and students, and at least half were plugged into a computer in order to view the content. For a hacker trying to infect a computer network, those are pretty irresistible odds.

USB devices remain a target for cyberthreats. Kaspersky Lab data for 2017 shows that every 12 months or so, around one in four users worldwide is affected by a ‘local’ cyber incident. These are attacks detected directly on a user’s computer and include infections caused by removable media like USB devices.

This short report reviews the current cyberthreat landscape for removable media, particularly USBs, and provides advice and recommendations on protecting these little devices and the data they carry.

The overview is based on detections by Kaspersky Lab’s file protection technologies in the drive root of user computers, with a specific scan filter and other measures applied. It covers malware-class attacks only and does not include detections of potentially dangerous or unwanted programs such as adware or risk tools (programs that are not inherently malicious, but are used to hide files or terminate applications, etc. that could be used with malicious intent). The detection data is shared voluntarily by users via Kaspersky Security Network (KSN).

Key findings

  • USB devices and other removable media are being used to spread cryptocurrency mining software – and have been since at least 2015. Some victims were found to have been carrying the infection for years.
  • The rate of detection for the most popular bitcoin miner, Trojan.Win64.Miner.all, is growing by around one-sixth year-on-year.
  • One in 10 of all users hit by removable media infections in 2018 was targeted with this crypto-miner (around 9.22%, up from 6.7% in 2017 and 4.2% in 2016).
  • Other malware spread through removable media/USBs includes the Windows LNK family of Trojans, which has been among the top three USB threats detected since at least 2016.
  • The 2010 Stuxnet exploit, CVE-2010-2568, remains one of the top 10 malicious exploits spread via removable media.
  • Emerging markets are the most vulnerable to malicious infection spread by removable media – with Asia, Africa and South America among the most affected – but isolated hits were also detected in countries in Europe and North America.
  • Dark Tequila, a complex banking malware reported on August 21, 2018 has been claiming consumer and corporate victims in Mexico since at least 2013, with the infection spreading mainly through USB devices.

In our next article we’ll examine how the threat carried by USBs isn’t static, and hacks are unfortunately becoming more and more sophisticated.

Want to find out more?

As Kaspersky Platinum Partners, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.