Protect yourself from Emotet

Security researchers initially discovered the Emotet banking Trojan in 2014. Emotet was created as a financial virus that aimed to infiltrate your computer and collect sensitive and personal data. Spamming and virus distribution services, as well as other banking Trojans, were added to later versions of the program.

Emotet is a banking trojan malware software that collects financial information by injecting computer code onto a computer infected with Microsoft Windows, allowing sensitive data to be taken via communication. Emotet virus can potentially collect address book data in order to expand its infection further. Aside from that, the malware acts as a “on-ramp” for other infections, allowing more malicious code to infiltrate vulnerable systems. Malicious documents or URL links inside the body of an email, sometimes disguised as an invoice or PDF attachment, or a malicious JavaScript attachment, have been the most common method of dissemination.

This is a devastating outbreak. quite expensive. An ounce of prevention, on the other hand, is worth a pound of cure.

Prevention Steps

  • Don’t open that attachment or click on that link! DO NOT OPEN AN E-MAIL WITH AN EXPECTED ATTACHMENT unless it is provided to you by a recognized and trustworthy source. This suggestion applies even more to URLs/links.
  • Keep your computers up to date. It is critical that you let this procedure finish whether your PC is notifying you that updates are required or that a reboot is required to apply updates, etc.
  • Create a strong password for yourself and your users. Start utilizing two-factor authentication while you’re at it.
  • If you’re unsure, ask! We’re here to assist you. If you have any questions regarding an e-mail, attachment, or link, please contact us. Our team is available to assist you.

How can I remove Emotet?

If you suspect you’ve already been infected by Emotet, don’t freak out. Contact JENLOR today, our goal is to keep your network running as smoothly and securely as possible and we want to help our clients stay in front of this infection.  If you have any questions about Emotet or other concerns in your environment, feel free to contact us today!

How to Stop a Data Breach

Almost every organization today collects and stores personal data about customers, workers, and others.

Data breaches — the theft, loss, or unauthorized publication of personal information — are becoming more common. It’s not simply a large business issue. Small and medium-sized firms, which have less data security capabilities, are more vulnerable.

As a result, it’s critical for businesses of all sizes to take precautions to avoid a data breach.

Here’s how to do it:

Limit who has access to your most sensitive information – Every employee used to have full access to all of the files on their computer. Companies are learning the hard way these days to prevent access to their more sensitive data. There’s no need for a mailroom staff person to see a customer’s financial information. When you limit who may see particular files, you reduce the number of employees who might click on a potentially hazardous link. Expect to see all records partitioned off in the future, so that only people who have a specific need for access will have it. This is a common-sense idea that businesses should have implemented years ago.

Create and update procedures – You may develop processes for data security standards and keep them up to date on a regular basis. This will make it very apparent what your company’s data requirements are. This will also demonstrate to your staff that you value data and remind them that they should do the same. Additionally, it is wise to consider using roles and permissions when it comes to accessing certain types of data.

Data backup and recovery – Malicious data breaches might sometimes wipe out all of your information. It’s critical to back up your data so that it can be retrieved quickly in the event of data loss, a server crash, or even a natural disaster. To safeguard you from losing vital data, your IT staff should have automatic offsite backup solutions in place on a regular basis.

Are you ready to protect yourself from Data Breach? Contact JENLOR today!

The Hybrid Cloud

The hybrid cloud is here to stay, and it’s gaining traction quickly. To satisfy infrastructure demands, an estimated 90% of businesses use a combination of on-premises/dedicated private clouds, multiple public clouds, and legacy systems. According to market research company IDC, by 2023, 50% of business applications will be deployed and managed in a containerized hybrid cloud environment, which will enable agility as well as a frictionless deployment and administration experience.

What is Hybrid Cloud?

Hybrid cloud combines public cloud, private cloud, and on-premises infrastructure, allowing for orchestration, administration, and application mobility across all three. As a consequence, a company may execute and grow conventional or cloud-native workloads on the most appropriate computing architecture in a single, unified, and flexible distributed computing environment.

How does Hybrid Cloud work?

Hybrid cloud architecture works in the same manner as either a public cloud or a private cloud would. A virtual private network (VPN), wide-area network (WAN), local area network (LAN), and application programming interface link numerous computers in the system (API). Services like virtualization and software-defined storage abstract resources from there, allowing you to pool data into data lakes. After that, management software divides these resources into environments in which programs can execute. These resources will now be provisioned on-demand by authentication services.

In Conclusion

The capabilities of both on-premises private cloud and off-premises public cloud are combined in hybrid cloud. This service enables you to get the most out of your current IT expenditures while also providing access to new resources as needed. You’ll be able to maximize the way your business’s cost, security, performance, and availability needs are fulfilled if you can easily transfer your apps and data between these two environments. Contact JENLOR to get your Hybrid Cloud up and running today.

 

2021 Announcements for Microsoft Licensing

On January 1, 2022, Microsoft’s “Open License Program” will come to an end, affecting not just commercial clients but also the government, education, and charity organizations. The deadline to purchase or renew an Open License is December 31, 2021.

As part of its plan to phase down the Open License program in 2022, Microsoft is transferring perpetual license sales to its Cloud Solutions Provider (CSP) partners. These CSP partners can offer perpetual licenses to businesses through a separate scheme dubbed “Open Value,” which includes a Software Assurance (SA) purchasing option. Microsoft also allows CSPs to sell licenses through the “Open Value Subscription” program, which is a separate sales channel that doesn’t offer perpetual licenses but does cover SA.

Cloud Solution Provider Partner Role

After the Open License program ends, Microsoft Cloud Solution Provider (CSP) partners will be the ones to offer perpetual licenses. Perpetual licenses are non-subscription licenses that do not expire after purchase. The term “perpetual license” refers to a license that is purchased only once and does not expire. It differs from subscription-based licensing, which is purchased on a monthly or annual basis and whose usage rights expire if the license is not renewed.

If businesses use Software Assurance (SA) with those perpetual licenses, which allows them to upgrade to the newest software release, SA will only be available through a separate program in 2022 than the Open License scheme.

Switching to the Open Value program, which offers a SA option for perpetual licenses, was advised in the statement.

The Open Value membership is similarly promoted as having a SA option, however, it does not include a perpetual software license.

If you have more questions about Microsoft Licensing, contact JENLOR today!

Reducing Capital Expenses with Cloud Computing Services

Reducing Capital Expenses

The field of IT infrastructure design and management continues to expand. Cloud computing has changed the way organizations see data storage and management as a fundamental and important element of IT infrastructure development. For companies with established IT departments and equipment, switching to a cloud setup may sound unnecessary and inconvenient. Here are a few great ways cloud computing may help you save money.

Expenses for staffing should be reduced.

A conventional IT department needs not just a significant quantity of gear and software, but also a big and expensive personnel. When it comes to operating a business, good IT personnel are a requirement, but they come at a hefty cost, and staffing budgets are generally the single largest expenditure for IT at firms. While shifting from an in-house process to the cloud does not remove staffing costs, it does result in a significant decrease. In the cloud computing world, this is just another example of economies of scale at work.

An organization that is better and faster

One of the most important aspects of operating a successful business is being organized, and cloud technology is highly helpful in this regard. The cloud can expand capacity for new projects without incurring the high capital expenses associated with establishing new divisions and computer systems within a corporation. Instead, cloud technology allows these new services to be introduced by simply altering orders.

Remove Redundancy Effortlessly

From additional employees and equipment to needless data processing, cloud computing may help a company minimize duplication in many areas. Backups and making extra copies “just in case” are a major concern for many businesses. Cloud backup services successfully reduce the additional cost here by instantly replicating data and apps and storing them in various data centers without imposing hardware expenses or additional time on their clients.

Getting More for Your Money

Managing the many IT services of a business requires computing systems, hardware, and software which all come with their own capacity issues, maintenance, and security concerns. When moving to cloud network management, these costs are in large part eliminated and taken over by the cloud computing service providers. Cloud computing also works specifically on economies of scale, loading systems for maximum utility. Workloads are shared through server infrastructure with a number of organizations and the cloud-computing provider is, thus, able to optimize all hardware needs at their data centers, passing on the savings to all their business clients.

Lower Power Costs

Switching to cloud computing has the added benefit of lowering a company’s power consumption. There is a decrease in hardware as more IT services migrate to cloud technologies. Running an in-house data center always results in servers that are less efficient than they should be, squandering energy. Cloud service providers, on the other hand, consume less energy since each server is fully utilized to manage the data of numerous firms, each of which claims a share of the savings.

Getting Cloud Computing Services 

It’s no surprise that cloud computing services are the way of the future, given the numerous benefits they provide to organizations. With JENLOR’s Cloud Network Implementation Services, you can ensure that your company stays ahead of the curve. Our Pittsburgh IT professionals make cloud migration easier than ever before, providing tailored network consulting services to prevent downtime and keep your company ahead of the curve on all the latest IT trends. Call JENLOR now to book a True Network Evaluation and let us help you find possibilities to improve your company’s bottom line.

Protect Yourself From Ransomware Attacks

Is your computer protected against ransomware attacks? Ransomware is a type of malware (malicious software) which criminals use to extort money. It holds data to ransom using encryption or by locking users out of their device.

FedEx, UK hospitals, and other businesses were hit by a massive ransomware in May of 2017.  Nearly 75,000 computers in 100 countries were affected by malware called WannaCry, which encrypts and locks a computer and demands a $300 ransom to unlock the computer.

Many of the computers attacked are breached because the latest Windows updates have not been implemented.

How do you protect yourself from Ransomware?

  • Never click on unverified linksAvoid clicking links in spam emails or on unfamiliar websites. Downloads that start when you click on malicious links is one way that your computer could get infected.
  • Do not open untrusted email attachments – Do not open email attachments from senders you do not trust. Look at who the email is from and confirm that the email address is correct. Be sure to assess whether an attachment looks genuine before opening it.
  • Only download from sites you trust – To reduce the risk of downloading ransomware, do not download software or media files from unknown websites.

Take Your Protection Against Ransomware to the Next Level!

Hire a successful IT security company will help you find the solutions that match your budget and requirements – ensuring you pay for the correct amount of security you need.

Are you ready to protect yourself from Ransomware Attacks? Contact JENLOR today!

 

Benefits of Working Virtually

As a result of COVID-19, the workplace will be forever changed. Employers in Pittsburgh are facing this challenge as they decide to go hybrid or have employees come back to work in 2021.  Here are 5 Reasons why your company should embrace hybrid working.

  1. Supporting Your Employees  

Your company might be going through a great deal of stress. There is a lot to consider while going hybrid with your employees. You need to figure out how to implement techniques for new and refined work cultures. However, your employees are facing a great deal of stress too and they need your support. Many employees are parents who are managing their children’s online schooling, while others are providing care to their young children or old parents as they are reluctant to leave them with third-party caretakers.

To effectively manage a hybrid workplace, you as an employer can hold meetings with virtual sessions. You can use calendar apps to manage your meeting schedule with employees, and always stay up to date on employee tasks. When you support your employees, they will stay loyal to you and stay for the long term.

  1. Productive Employees  

When you let your employees work from home they become more efficient. Working from home can eliminate the headaches and hassles involved with traveling to work, and employees can

invest more time in performing work-related activities without having to waste time on travel.

You’ll also end up with employees taking less sick time or calling off. Employees who are a little under the weather can still get work done most of the time if it means not having to go into the office. Another bonus? No sharing illnesses.

  1. You’ll Save Money!  

Working from home means either no office or at the very least, a lot less office space. If you don’t want to make the switch to a completely remote environment, try staggering your employees’ work-from-home days to save on office space. With no office or smaller office space, you will save on office supplies, snacks, or coffee. Having a smaller office or no office will definitely help your company save money.

  1. You, Will, Have a Wider Pool of Applicants  

Going hybrid means you can hire the best employees all around the world! Offering this type of benefit can help employers attract young, highly skilled employees that might not otherwise be interested in a role. This can be particularly beneficial in locations or professions with skills shortages, as small businesses can widen their nets and work with the most talented individuals, regardless of where they are located.

Yes, this does mean way more applications to look through. However, wouldn’t it be nice to have an employee that can do the job perfectly without training?

  1. Less Time on Commuting to Work!  

In 2019, an average US worker spent almost 9 days commuting. That’s the time the employee should have spent working were they not stuck in the traffic. Don’t you think your business would have been better off had the employee spent this time on work?

Thinking of working virtually with your company for the long-term? Contact JENLOR today!

How an Outsourced IT Partner Can Boost Productivity For Your Business

Did you know the average office worker wastes 21 days per year due to IT issues? Outsourcing IT to JENLOR will stop those wasted days and boost your company’s productivity!

The perks of outsourcing 

No distractions to your or your employees – when an IT disaster strikes, your company’s  productivity can take a huge hit. When an IT disaster hits, it becomes a distraction for not only  you, but for your entire staff. If your network goes down, if a computer or hard drive breaks, or if  there’s a hiccup with your email or server, your entire office and its productivity come screeching  to a halt. Having an experienced IT partner that can come in and fix the issue quickly will keep  your business going!

Reduce the risks of an IT problem – When you hire an IT partner, it is their job to keep your  systems up-to-date. Having all your systems running and up-to-date lowers the risk of having an  IT problem.

You’ll save money and time – When you outsource to an IT partner, you will don’t have to pay  employee benefits, holidays, paid time off and overtime! This will also save you time hiring  someone and training them.

In a nutshell, by outsourcing an IT partner it will free up time, add value to your company, and  most importantly boost your company’s productivity!

Thinking about outsourcing your IT department? Contact JENLOR today!

JENLOR Welcomes Newest Help Desk Team Members!

JENLOR has added additional resources to our growing Help Desk team.  Kyle Wilkinson, Patrick Reitz and Jason Capela have joined the JENLOR team and will be responsible for fielding inbound requests such as Help Desk support, troubleshooting, pre-staging customer equipment and add more coverage overall.  We are excited to have Kyle, Patrick, and Jason with us!

 

 

Jason comes to us with a corporate background as an IT Support Specialist with over 10-years of experience.  His focus recently has been end user support.  Jason brings a good knowledge set and will be able to help immediately with inbound support calls.

 

 

 

Patrick has 4-years of hands on IT experience in the Air Force. He is currently working on his Bachelors Degree for  Information Technology at Western Governors University. Patrick will bring additional troubleshooting and Help Desk support to our team and customers.

 

 

 

Kyle joins the JENLOR Help Desk team adding 5-years of IT experience managing multiple back-end systems and providing front-end user support.  Kyle graduated from Pittsburgh Technical College with a degree in Information Systems Security and Forensics. Kyle will make an immediate impact on support calls with our customers.

What is Emotet? How Can You Protect Yourself? – In the Loop

A trojan virus known as Emotet has become a very serious problem in recent months.  As your IT partner, we feel it’s important to provide insight to help you and your organization avoid being compromised by this incredibly troublesome outbreak.  

Emotet is a banking trojan malware program which obtains financial information by injecting computer code into an infected Microsoft Windows computer, allowing sensitive data to be stolen via transmission.  Emotet malware is also able to steal address book data to further the spread of its infection.  Beyond this, the software functions as a sort of “on-ramp” for other infections, allowing additional malicious code to enter compromised systems.  The most prominent form of distribution has been malicious documents or URL links inside the body of an email, sometimes disguised as an invoice or PDF attachment, or a malicious JavaScript attachment.

This is a very serious outbreak.  The remediation process for this type of infection is extremely labor intensive and can be quite costly.  That said, an ounce of prevention is worth a pound of cure.

Prevention Steps

·         Don’t click on that link and don’t open that attachment!  Unless an expected e-mail with an expected attachment is being sent to you from a known and trusted contact, do NOT open it.  This advice is even more applicable to URL’s/links.

·         Keep PC’s up-to-date.  If your PC is alerting you that updates need to be installed or a reboot is pending to apply updates, etc. it is important that you let this process complete.

·         When in doubt, ask!  We’re here to help.  If you’re unsure about an e-mail, attachment or link, don’t hesitate to reach out.  Our team is here to help.

Our goal at JENLOR is to keep your network running as smoothly and securely as possible and we want to help our clients stay in front of this infection.  If you have any questions about Emotet or other concerns in your environment, feel free to reach out.