Tags
- Cloud 91
- Public Sector 37
- Security 34
- Data centres 32
- Managed Services 24
- business continuity 19
- G-Cloud 17
- outage 14
- Data Protection 12
- VoIP 12
- Data Security 12
- BYOD 12
- Remote Working 11
- Unified Communications 11
- disaster recovery 10
- Data Storage 10
- Cloud Services 10
- Government 10
- Mobile 9
- resilience 8
- Hybrid Cloud 8
- Legal 8
- Healthcare 8
- IP Telephony 7
- ADSL 7
- downtime 6
- Wi-FI 6
- Internet 6
- Telephony 6
- NHS 6
- N3 6
- Data Backup 5
- Cloud Computing 5
- IaaS 5
- Public Cloud 5
- internet of things 5
- DBaaS 5
- efficiency 5
- MDM 5
- Service Provider 4
- Oracle 4
- Infrastructure 4
- Data Centres 4
- MPLS 4
- Malware 4
- Cloud Telephony 4
- BlackBerry 4
- 4G 4
- Data Protection Act 3
- SLA 3
- Private Cloud 3
- SaaS 3
- Google 3
- Public Sector Network 3
- Symposium 3
- Network 3
- HSCN 3
- technology 3
- Regulations 3
- Apple 3
- SIP trunking 3
- Online Backup 2
- SQL Server 2
- databases 2
- BT 2
- PAYG 2
- VDI 2
- Amazon 2
- Mainframe 2
- Desk Top Sharing 2
- Migration 2
- IT Management 2
- Database as a Service 2
- Cloud Strategy 2
- data sovereignty 2
- ICT 2
- Insurance 2
- Software 2
- Applications 2
- Data 2
- PSN 2
- Wireless 2
- Retail 2
- Data Centre Provider 2
- Connectivity 2
- GDPR 2
- Ofcom 2
- EFM 2
- QoS 2
- ISDN 2
- CYOD 2
- MVNO 2
- Enterprise 2
- Mobile Strategy 2
- mobile data 2
- Firewall 2
- network 2
- Outage 1
- Online Storage 1
- Support 1
- Unreliability 1
- Availability 1
- DDoS Attacks 1
- IT Provisioning 1
- business agility 1
- Contingency 1
- Federated Clouds 1
- Cloud to Cloud 1
- Salesforce.com 1
- Gartner 1
- virtualisation 1
- US Patriot Act 1
- cloud 1
- Platforms 1
- Blogging 1
- Data Sharing 1
- OCS 1
- Productivity 1
- Video Conferencing 1
- fog computing 1
- Services 1
- Virtual Desktop 1
- Hosted Desktop 1
- SIAM 1
- CCS 1
- Crown Commercial Services 1
- Cloud Provider 1
- Government as a Platform 1
- shadow IT 1
- Ransomware 1
- Digital Economy Centres 1
- IT 1
- HETT 1
- CGBT 1
- Journey to the Cloud 1
- Journey To The Cloud 1
- IT Services 1
- Microsoft Office 1
- Azure 1
- Digital Strategy 1
- Digital Marketplace 1
- AWS 1
- VMWare 1
- OpenStack 1
- Public Wi-Fi 1
- Legal Sector 1
- data security 1
- hybrid cloud 1
- SMEs 1
- Brexit 1
- Privacy 1
- security 1
- innovation 1
- insurance 1
- DevOps 1
- retail 1
- IT infrastructure 1
- HSCN Connectivity 1
- Cloud Transformation Process 1
- Prism 1
- PUE 1
- Cold aisle containment 1
- Cooling 1
- Power 1
- hosting 1
- power 1
- JANET 1
- data controllers 1
- General Data Protection Regulation 1
- Microsoft 1
- SAP 1
- Hosting 1
- BIL 1
- Freedom of Information Act 1
- Personal Data 1
- Bandwidth 1
- Social Media 1
- Streaming 1
- Email 1
- Messaging 1
- Contention Rates 1
- SDSL 1
- 512k bug 1
- password 1
- Moore’s Law 1
- wearables 1
- microchip 1
- Intel 1
- security threats 1
- WannaCry ransomware attack 1
- Collaboration 1
- Home Working 1
- playback service 1
- call recording platform 1
- call recording service 1
- MYOD 1
- BES10 1
- Consumer 1
- Blackphone 1
- iPhone 6 1
- iCloud 1
- iOS 8 1
- Samsung 1
- Networks 1
- Network Operators 1
- Coverage 1
- call rates 1
- HSCIC 1
- VPLS 1
- Two-Factor Authentification 1
- FTTP 1
- Cambridge 1
- Metro Network 1
- IPv6 1
- Network design 1
- Network Planning 1
- ISDN30 1
- N3 Aggregator 1
- Network Security 1
- Unified Threat Management 1
- Convergance 1
- Shadow IT 1
- Software Defined Networks 1
- SDN 1
- Virtualisation 1
- Wi-Fi 1
- #GenMobile 1
- LAN 1
- SD-WAN 1
- Compliance 1
- ITIL 1
- Customer Service 1
Latest Posts
- Orchestrating Cloud transformation 17 Apr 2018, 09:38 AM
- Why SD-WAN is good business 9 Apr 2018, 14:02 PM
- A robust security-first culture will tackle any security threat 6 Mar 2018, 17:24 PM
- HSCN – Driving additional value over your connection 29 Nov 2017, 17:20 PM
- GDPR: What we have done 8 Nov 2017, 10:50 AM
Latest Comments
Authors
- Stefan Haase
- Tim Wilkinson
- Paul Hone
- Ian Rhodes
- Louis Ozougwu – MCITP - OCP - Oracle RAC
- Jonathan Birch
- Sean Paxton
- Glenn Temple
- Mark Hall
- Simon Michie
- James Odom
- Peter Nailer
- Fraser Fisher
- John Roberts
- Phil Dyson
- Graham Francis
- Andy Mills
- Mark Halpin
- Chris Bull
- Vaughan Andrews
- Martin Fisher
- Francis White
- Stuart Brown
- Phil Moore
- Anton Murphy
- Damon Crawford
- Wesley Hornsey
- Louis Ozougwu
- Chris Mcmahon
- John Taylor
- Paul Storey
- Richard Allgate
- Richard Allgate, Mobile Specialist
- Mark Hall, Public Sector Director
- Clive Atkins
- Stephen Rees
- Andrew Nicholl
Protect yourself against the UK cyber attack

Posted by Stuart Brown | 12 June 2014, 17:41 PM
Unless you’ve had your head in the ground, you can’t have failed to have heard that the UK could be the target of the biggest cyber attack ever in the forthcoming week or so.
British investigators have been working with the FBI to trace the hackers behind the infamous GOZeus and CryptoLocker botnets. While the enforcement team has managed to temporarily disrupt the botnets, they estimate that between 500,000 and one million machines have already been infected worldwide. It’s thought that the criminals behind the scam, which enables them to gain access to personal bank details, have defrauded people out of more than £60m worldwide.
But bringing down the botnets isn’t the end of it. According to the UK’s National Crime Agency, people have just two weeks before the botnets could be functioning again. The agency is urging people to protect their computers from an expected and “powerful computer attack.”
GOZeus and CryptoLocker are among the most sophisticated examples of advanced malware around. Both have been created to defraud and steal money from their victims, using two different mechanisms:
GOZeus is financial malware: once the victim is compromised the malware is resident on the user’s computer. It observes and records information such as bank account and credit card details. The stolen data is used by the attacker to illegitimately withdraw money from the victim’s account.
CryptoLocker is ransomware: Once the endpoint is compromised, the malware encrypts the hard disk of the infected computer, making it inaccessible to the legitimate owner. In order to decrypt the hard disk and retrieve the data, the victim must pay a ransom.
The issue for businesses is that while GOZeus is typically aimed at end-users, CryptoLocker could have huge ramifications for organisations. Imagine the impact of fraudsters obtaining access to a corporate server or storage disk and holding that data to ransom? That’s not to say that organisations can ignore the threat of GOZeus, the opposite is true – any company whose users access the network with a personal device is at risk.
So what can you do to ensure that you’re not a target or a victim of the UK’s largest cyber attack? There are some simple remedial actions that you can take now.
- Beware of emails similar to the one below, claiming an unpaid invoice. Opening the link will download the malware
- Ensure your operating system is up to date with latest patches applied
- Ensure your anti-virus product is functioning properly and signatures are up to date
- Ensure other windows applications such as Adobe, Java and your browser are up to date
- Backup any critical data on your laptop to protect against CryptoLocker ransom malware
- Consider scanning your entire network for advanced malware. Redcentric customers can rest assured that we can undertake this for them
- Be wary of email from untrusted or unrecognised senders and do not run attachments or click on URL’s
- Additional advice can be accessed from www.getsafeonline.org a government approved website. You can download free scanners from major vendors to scan PCs to detect the presence of malware
- Check bank statements regularly and notify your bank immediately of any unrecognised payments
- Ensure any online banking activity uses two-factor authentication
Whether you’re a company or individual, two weeks warning is ample time to ensure that you and your technology is protected. Let’s stay ahead of the scammers and ensure you’re not a target. Until the next time at least...
Post a comment
Comment submitted! Comments needs approval before being displayed.
Comments