1

Guess what we found on an old hard drive? Thousands of medical and personal records… #datasecurity #security

Brent Amyette over at ShredDisk wanted to perform an experiment to determine just how well data was being protected by those selling used equipment, so he purchased a used server off of the online site, Craigslist.

He then brought the server to us and we examined it. The three hard drives had previously been in a RAID array, but had been formatted and broken apart into three separate drives. Then an operating system (Windows XP) had been loaded onto one of the three drives.

Using a file recovery application, we then ran it on the three individual drives and managed to recover approximately 100,000 files from the previous installation.

This particular server was from a medical system in Texas, so were under the assumption that either the data would be totally unrecoverable due to some sort of “secure wipe” or “DoD” erase taking place before disposal, however, that was not the case at all. The data was easily retrieved and what we found was simply frightening!

We opened a few log files, attempting to determine versions of software applications, and it turns out those log files were transaction logs, possibly from their patient management system, and though it was easy to see the names of patients, social security numbers, dates of birth, street addresses and phone numbers. These logs contained the typical information one would be asked during the intake procedure at a hospital. Nature of the visit, what led up to the issue, medical history, etc.

Without giving details, there were people who had visited for physical and sexual abuse, sexual infections, digestive problems, etc. Extremely personal information about these people’s lives….

Brent had contacted WYFF and they did a segment on the news about this… You can find it HERE.

The moral of this story is – if you are charged with disposing of an old computer, server, hard drive, or backup media, consider having it professionally destroyed… And by destroyed, I mean, physically destroyed! ShredDisk can provide those services at very reasonable rates and can do it at your facility!

For the record, the hard drives contained in the medical system’s server have been shredded now. So fortunately, that information did not fall into the wrong hands.

Maybe you should ask your medical and legal providers how THEY dispose of their old drives and equipment. It could be your records at risk!

How to avoid or remove Mac Defender malware #mac #malware #apple

It seems that Apple has finally acknowledged that there is a need to protect their users from malicious software, in particular the “Mac Defender” (also known as MacProtector, MacSecurity as well as MacDefender).

In an article titled “How to avoid or remove Mac Defender malware“, Ā posted yesterday on the http://support.apple.com site, you can find out how to avoid this inconvenience and remove it.

The following quote gives hope that Apple has had a change of heart and will indeed address the issue:

“In the coming days, Apple will deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants.Ā  The update will also help protect users by providing an explicit warning if they download this malware.”

If you are ever prompted for your administrator password, give great consideration to WHY you would need to provide those privileges. Doing so gives whatever requested it full ownership of your Mac.

Should you feel more may be going on with your Apple Mac OSX system than meets the eye, see a computer service professional immediately. Symptoms of an infected machine include, but are not limited to: Computer seems slow, your sent email is being rejected, windows appear or programs open (or close) that you did not initiate, unexpected shutdowns, etc.

If you have fallen for the Mac Defender scam and input your credit card, call your credit card company immediately and inform them.

Homeland Secure IT has a VoIP phone system! #Cisco #VoIP

Cisco SMB Select Partner LogoMost businesses have a love-hate relationship with their phone systems, often settling for less than everything they need because it is inexpensive, low-maintenance or not too complicated.

We have always wanted the most features that we could get, so a VoIP (Voice over IP) solution was the only way to go! We initially used enterprise class Cisco 7960 VoIP phone sets with an Asterisk based system and a couple phone lines provided by Charter, and a couple provided by Vonage.

We had everything we wanted and needed with that system…

  • Automated Attendant
  • Voice Mail
  • Voice Mail sent to our Email
  • Full featured SIP phones with multi-line, displays, etc
  • Call tracking, with full logs showing incoming/outgoing call detail
  • Music On Hold
  • Ability to forward calls to cell phones
  • Good audio quality, speaker phone capability

We never really wanted for additional features, but along comes the Cisco UC 320 series which is an ideal fit for many of our own clients. Obviously, we want to provide support to those who may be using this type of system, so we purchased one for ourselves and at the same time purchased a few of the latest SPA 525G2 phones from Cisco and some SPA504s and even the SPA301.

Seeing as how change was coming, we also switched to a SIP trunk with 8 channels (simultaneous lines in use) in addition to the two lines from Charter, so we should not be hurting for available phone lines and nobody should get a busy signal…

The Cisco VoIP solution is very nice for small to medium offices like our own! Out of the box, it supports everything we had before, but here are a few of the details:

  • Support for four copper (standard) phone lines from MaBell (or Charter, or a Vonage ATA, etc)
  • Support for sending out to analog devices (you can give your FAX Ā its own extension number for instance or use analog phones)
  • Support for using SIP trunks (cheaper than analog lines)
  • 24 phone extensions (more on this further down)
  • Built-in gigabit switch
  • Built-in router
  • Built-in 802.11 n/b/g wireless for phones and data
  • Music On Hold
  • Automated Attendant
  • Call logs for external calls
  • Supports the full line of Cisco SPA series phones

If you need MORE incoming copper lines, you can add them 4 at a time (up to 12 total) with another device, but you lose an extension for each line you add.

The old 7960G phones rocked for their quality, phone books, and their ability to use external XML scripts to get the weather, etc, but the new phones do not make me miss them at all!

The SPA 525G2 desk sets have too many cool features to list without you getting bored and your eyes glazing over! Here’s a few:

  • Color display
    Cisco SPA 525G2 with Sidecar

    Cisco SPA525G2 with 32 button sidecar

  • Built-in MP3 player lets you listen to your favorite music directly on your speaker phone (pauses when an incoming call comes in)
  • Bluetooth headset support
  • Bluetooth linking to your cell/smartphone – Lets you use your smartphone as an additional extension. Answer your cell via your desk phone, place calls on it, even load the cell phone’s directory directly onto your desk phone. Also view the battery charge and signal strength on the SPA 525G2.
  • Ability to link up to two 32 button consoles
  • Outstanding audio quality on handset and speaker phone
  • View Cisco Small Business security cameras on the color display of the SPA 525G2 phone (you can place a camera and a one line phone in your lobby for instance, view who is there, and speak with them)
  • Built-in web applications, let you get the current news and weather on your phone’s display

If you are considering a new phone system for your business and you never need more than 12 lines or 24 extensions, then this may be the system for you! In fact, if you did happen to expand past its capabilities, Cisco has a trade-up program to move you to a larger system and you can continue to use the existing phones with it.

We are offering the Cisco UCW320 and the complete line of Cisco Unified Communications systems for Small and Medium Businesses for sale, but also offer consultation, planning, installation and support of these amazing VoIP solutions. In Greenville / Upstate, SC, please call us at 864.990.4748 or email info@homelandsecureit.com for more information.

Financing your business IT needs using a “Master Lease” program

One of the more frequently asked questions by those who are purchasing or planning to purchase new computers, servers or network equipment is, “Can we get the computers now, then upgrade our server later?”, meaning that they are considering performing an update in steps, maybe over a couple years.

Up until recently, if the business were planning on leasing their equipment that they would apply for one lease, then when it came time to purchase the other products, they would apply for yet another lease.

Our leasing company has what is known as a “Master Lease” program, which allows you to sign a master agreement for the initial purchase, then supplement the future purchase when the time comes.

Benefits:

  • The Master Lease easily accommodates add-on equipment with a one-page document.
  • Projects that are broken into phases continue smoothly under the Master Lease agreement.
  • Pricing of monthly payments may be lower due to the total exposure outstanding.

All we have to do is to finalize our proposal outlining potential phases to the project, determine the amount of services (which may be included in the agreement or paid separately) and then do some paperwork with our leasing company…

For instance, we could upgrade your server today, your computers in 6 months and your VoIP phone system next year, all with the same Master Lease…

If you would like more information about how we can help with your IT needs and how leasing may work for you, please call us at 864-990-4748 or email info@homelandsecureit.com

Apple Customer Service: Don’t Help Our Customers with Malware (from Gizmodo)

I’m going to just post this link….. Ā  I leave it up to you to read it, or not. Believe it, or not.

http://gizmodo.com/5803498/apple-to-customer-service-dont-help-our-customers-with-malware

There is a further link from that page:Ā http://www.zdnet.com/blog/bott/apple-to-support-reps-do-not-attempt-to-remove-malware/3362

If you happen to feel your Mac is infected – seek a professional computer service provider’s input.

 

Will your next browser be missing the URL bar? Google Chrome will have an option for that

Found an interesting article titled “Google Is Serious: You Can Kill Chrome’s URL Bar” which gives a glimpse of what may be around the corner; The ability to hide the URL bar by default.

What is the purpose? Smaller desktops, such as those found on netbooks could benefit from gaining a few pixels of real estate on the screen. However, as we browse more visually these days, it is not difficult to imagine that different ways to navigate the web may also be coming. I still enter a large percentage of all sites that I visit in manually, but I can foresee the day when that may not be the case.

Those who use tablets to browse find every way they can to avoid manually putting in the URL already.

The new Lenovo ThinkPad Edge e420 is an affordable business notebook

Lenovo’s new ThinkPad Edge E420 (1141-55U) notebook has all the features that make for an enjoyable business user experience, in addition to claims of it including “Advanced VoIP features”.

With businesses going global, video conferencing has become the new standard for communication. ThinkPad Edge E420, featuring a low light-sensitive 720P HD camera and multimedia function keys, delivers a high-quality video conferencing experience. These features coupled with noise reduction technology and the new 2nd generation IntelĀ® Coreā„¢ i3 processors make it a perfect choice for SMB customers.

  • 2nd generation Intel Core i3-2310M processor
  • Genuine Windows 7 Professional 64 bit
  • 320GB/7200rpm hard disk drive
  • 4GB memory
  • Spill-resistant keyboard
  • Digital microphone
  • HDMI 1.4 for projecting HD
  • 4.6lbs
  • 4.2 hr

All that for $579.oo!

Homeland Secure IT is proud to be your Greenville / Upstate Lenovo partner. We offer the full line of Lenovo products, including the new E420! Call us today at 864.990.4748 or email info@homelandsecureit.com.

The Dockside Band – Saturday May 21st at Break Time in Anderson, SC – Don’t miss it!

Please be sure to catch our band, The Dockside Band at Break Time in Anderson, SC on Saturday, May 21st!

I think we get started about 8:30, and it should be a blast!

Break Time is a “pool hall”, if you will, allowing 18 year olds to go in, but not to drink. Ā They have a full bar, and I believe Saturday Nights are their “Bikes & Babes” nights or something of that nature.

For more information about The Dockside Band, you can find us on Facebook at http://www.facebook.com/DocksideBand or http://www.TheDocksideBand.com Ā – You can also follow us on Twitter @DocksideBand.

Thanks for your support, we look forward to seeing you!

Cisco SPA525G2 VoIP desk phone pairs to your smartphone… Answer & call from either phone!

Simple people are easily amused I guess, but I am LOVING the Bluetooth features in the Cisco SPA525G2 SIP VoIP phone.

If you have one of these phones, you can associate it with your smartphone via Bluetooth and then do the following:

  • Make a call from your smartphone’s number, using your Cisco phone
  • Answer your incoming smartphone’s incoming calls from the Cisco phone
  • Download the contacts from your smartphone to the Cisco phone
  • See the signal strength and battery charge of your smartphone on the Cisco display
  • Charge your smartphone using the USB port

Want more information about the Cisco SPA series of business VoIP phones? Email info@homelandsecureit.com or call 864.990.4748. We are your Cisco Small Business Select Partners in Greenville & Upstate, SC!

 

SECURE IT ALERT: Usama Bin Laden Death Email Scam Warning Issued by the FBI

 

Secure IT Alert Header
Homeland Secure IT Alert

Homeland Secure IT Alert for Friday, May 13 2011

 

On May 04, the FBI issued a warning about links related to the death of Usama bin Laden.

The text from the FBI site follows:

 

Malicious Software Features UsamaĀ binĀ LadenĀ Links to Ensnare Unsuspecting Computer Users 

The Internet Crime Complaint Center (IC3) urges computer users to not open unsolicited (spam) e-mails, including clicking links contained within those messages. Even if the sender is familiar, the public should exercise due diligence. Computer owners must ensure they have up-to-date firewall and anti-virus software running on their machines to detect and deflect malicious software.

The IC3 recommends the public do the following:

  • Adjust the privacy settings on social networking sites you frequent to make it more difficult for people you know and do not know to post content to your page. Even a ā€œfriendā€ can unknowingly pass on multimedia thatā€™s actually malicious software.
  • Do not agree to download software to view videos. These applications can infect your computer.
  • Read e-mails you receive carefully. Fraudulent messages often feature misspellings, poor grammar, and nonstandard English.
  • Report e-mails you receive that purport to be from theĀ FBI. Criminals often use theĀ FBIā€™s name and seal to add legitimacy to their fraudulent schemes. In fact, theĀ FBIĀ does not send unsolicited e-mails to the public. Should you receive unsolicited messages that feature theĀ FBIā€™s name, seal, or that reference a division or unit within theĀ FBIĀ or an individual employee, report it to the Internet Crime Complaint Center at www.ic3.gov.

 

For more information, head on over to the www.fbi.gov/scams-safety/e-scams page…

Homeland Secure IT Alert Footer

Homeland Secure IT Alert