CryptoLocker and CryptoWall 2.0 Resurgence

JENLOR recently has seen a resurgence within our customer base of a very crippling virus that is a variant of the CryptoLocker virus.  Please be on the lookout for any emails with FAX in the subject and attachments.  Please note the.zip extension on these files and please DO NOT open any attachments.  Deleting and reporting these types of emails will be critical in stopping the spread of this infection.This widespread virus is embedded in emails and is currently not being consistently flagged as spam or a virus.  Like many other virus attacks, the publisher of the virus is hours (or even up to days) ahead of the companies providing anti-spam and antivirus definitions.  This unfortunately is common with the biggest vendors (Symantec, McAfee, Trend Micro, etc.) throughout the industry.  They are working hard to provide the protection needed to stop this type of virus and should have virus definitions updated in the near future.Please do not hesitate to call our service team at 412.220.9330 x 2 if you have any questions or concerns.  Or, you can forward the suspect email directly to service@jenlor.com for our team to review.

Continue reading “CryptoLocker and CryptoWall 2.0 Resurgence”

New Face at JENLOR

We have added another new staff member at JENLOR. We want to introduce him to you and take this opportunity to summarize his job role.

Lucas Rider

Managed Services Administrator

Lucas oversees JENLOR’s monitoring systems for our managed services customers. We use a broad set of monitoring tools that require constant focused attention, which Lucas provides. Our monitoring services cover server environments, security appliances, and local/offsite backup strategies. Lucas brings a balance of organizational skills, technical abilities, and intuitiveness to our team.  We rely on him to continually improve our managed services deliverables.  Lucas, who grew up in Raccoon Twp., is a veteran of the U.S. Air Force and has an associate’s degree in Computer Network Systems from ITT Tech. Unsurprisingly, Lucas is a “gamer” and previously competed professionally.  He also participates in conservation and preservation of natural habitats in PA.

Microsoft Audits

Recently, we have assisted a few of our customers with the Microsoft auditing process. Microsoft conducts these audits to ensure that every copy of installed Microsoft software is actually licensed. In conversations with our vendors, and from our own experiences, we have seen an increase with their audits on small/mid-sized businesses.

What are Microsoft Licensing Audits?

There are 2 types of audits from Microsoft. The first is known as the Software Asset Management (SAM) audit. This audit relies on your voluntary participation. During a SAM engagement, a Microsoft consulting partner examines your Microsoft software resources for any type of misuse.

The second is the Legal Contract and Compliance (LLC)audit. An LCC audit, which is involuntary, is only administered when Microsoft believes that a serious licensing infraction has taken place or a company has consistently refused to undergo a SAM engagement. This type of audit is costly and time consuming.

Continue reading “Microsoft Audits”

Changes At JENLOR

We have another new staff member here at JENLOR and are re-positioning Chris Luikart into a new role.

Caroline Gillespie- Senior Account Manager

Caroline handles daily account management responsibilities for our clients with a focus on their short and long-term strategic development. Her primary role is to keep our customers engaged and on-track.   This industry requires constant attention to IT development, which means regularly meeting with clients to analyze their needs. As such, Caroline and Don work closely together unraveling the various options that best fit our client’s needs.  She has served in various Account Management roles over the years, most recently with Apple working with local business accounts. Caroline is a native of Scott Twp., but now calls Mt. Lebanon home.  She attended St. Mary’s College at Notre Dame.  She loves being outdoors, enjoys spending time with her family and reading whenever she finds time.

Chris Luikart-Director of Operations

We have promoted Chris to Director of Operations. The Operations role is a new position for JENLOR and one that adds another layer of support to our customers.  The primary role of this position is to develop and support operations that result in better service. Chris will be formulating new policies, supporting existing policies, managing daily activities, and supervising human resource initiatives.  Chris will still play an integral role in supporting our customers on a daily basis — he will be visible, accessible, and relied upon even more.  This new position will be instrumental for JENLOR as we further our effort to be a customer-centered organization.  Chris has a B.A. from Marshall University and an MBA from Seton Hall University. He and his wife live in Westmoreland Country with their daughter.  He is active within his community politics and volunteers for a variety of organizations.

New Faces At JENLOR

We have added some new staff in the past few months and wanted to introduce them to you and let you know what their roles are at JENLOR.

Matt Lang-Network Engineer 

Matt works closely with Josh and Chris Schoen on the Helpdesk team.  Matt spends most of his time on the phone with JENLOR’s clients and vendors supporting a broad range of technical issues. Matt is always pushing for problem resolution that may involve vendor coordination or reassignment to a field engineer. He has acquired a wide range of skills that enable him to be the first and last responder, and he patiently handles calls using outstanding customer service skills. Matt is a lifelong resident of Beaver County and a graduate of ITT Tech.   He is recently married and likes to spend time with his family, or sneaking out to go fishing.

Continue reading “New Faces At JENLOR”

Microsoft Internet Explorer Vulnerability Patch

As promised, I are reaching out to you again as Microsoft has released their patch for the Internet Explorer vulnerability.  The good news is that Microsoft has decided to push the patch to Windows XP systems also.

What is it?

Microsoft has released their latest patch to fix the vulnerability in Internet Explorer.

What do I have to do?

Microsoft automatically pushed out the patch via Windows update.  You should have received the patch overnight and if you have updates turned on to automatically install, the patch would have installed and possibly restarted your computer.  If you do not have automatic updates turned on, you will need to run the updates on your computer manually.
Use this link below for help if you need to run updates manually:

http://windows.microsoft.com/en-us/windows/is-computer-up-to-date#1TC=windows-7

For additional information on the specific path, please see the link below:

http://support.microsoft.com/kb/2964358

As always, we are here to help, so if you need any assistance please give us a call for Service and Support.  If you have any specific concerns, please don’t hesitate to call me directly.

Microsoft Internet Explorer Vulnerability

Microsoft Internet Explorer Vulnerability
To our Valued Customers,

Here we go again. Another major security concern that was brought to light on Monday by mainstream media. This is important so please read.

What is it?

It’s a vulnerability within the Internet Explorer web browser. This issue allows remote code execution if users visit a malicious website with an affected browser. Also, if you click on a link in an email or instant message that is sent by a hacker, you are vulnerable to having your system taken over by the hacker. This vulnerability is associated with Adobe Flash player which is used as a plugin for many websites as well as the browser itself.

Continue reading “Microsoft Internet Explorer Vulnerability”

Heartbleed Bug OpenSSL Vulnerability

What is it?

Heartbleed is a recently uncovered security bug that is scaring internet users. Internet and security experts are warning people that their personal information, such as passwords, credit card information and emails are at risk.

The Heartbleed bug affects any sites and services running OpenSSL, an open-source encryption technology that is used in most web servers, VPN connections and email servers.

What do I have to do?

Continue reading “Heartbleed Bug OpenSSL Vulnerability”