New Missed-Call Scam Is Hitting Australia Right Now

After sweeping Ireland and New Zealand in recent years, this phone scam is permeating Australia. It’s simple, effective and could be very costly to you.

The scammers phone your mobile number from Slovenia, Liberia, Mauritania, Tonga, Vanuatu or Morocco (or somewhere else exotic) and hang up without giving you time to answer. Like most of us, you are curious to see who called you and you can’t resist the urge to call back. If you have a pre-paid number it is likely your monthly call credit will be drained. Got a post-paid? Be prepared for a very large bill.

The scammers have set up a premium toll number, which charges you at an exorbitant rate, reportedly up to and sometimes exceeding $8 per minute! This scam has been nicknamed ‘Wangiri’ which is a Japanese term meaning ‘wan’ for ‘one’ and ‘giri’ for ‘cut’. So, something like ‘one ring and cut’.

What can you do if you receive such a call? The steps are simple.

  • Do not answer
  • Block this caller
  • Be wary of multiple calls being received from the same number
  • Do not call back any number that leaves you a blank voicemail message
  • Do not provide any personal information, for example banking details, Medicare number, credit card details, name, address, passport number, etc.
  • If you are expecting an overseas call, Google the number to identify the country before calling back.

Aussies pay over $50K in Bitcoin to fake ATO tax debt scammers

The Australian Taxation Office (ATO) has warned taxpayers to be on the lookout for scammers impersonating the agency and demanding Bitcoin or other cryptocurrency as a form of payment for fake tax debts.

According to Assistant Commissioner, Kath Anderson, the ATO became aware of scammers attempting to obtain payment in Bitcoin last year. To date, the ATO has seen over $50,000 paid in Bitcoin to scammers claiming fake ATO tax debts.

“Cryptocurrency operates in a virtual world, and once the scammers receive payment, it’s virtually impossible to get it back,” Anderson said.

Scammers are constantly adapting their methods to maximise their chances of picking your pocket. Unfortunately it was inevitable that scammers would target cryptocurrency given its current popularity and anonymity.
The ATO also reiterated warnings of scams demanding direct deposits into third-party bank accounts, demanding payment via iTunes cards or with a pre-paid Visa gift card, scam methods which are the most frequently reported to the ATO.
The ATO scam alert page warned that the fake ATO emails asking recipients to complete a ‘tax refund form’ to receive a refund. The form asks for online banking credentials, credit card numbers and limits, and personal address information, the ATO wrote.

Protect Yourself

  • Know who you are talking to
  • Protect your personal information
  • Do not give any sensitive information through emails.
  • Do not click on any suspicious links or emails.
  • If you think you’ve been scammed, report it immediately.

Is Office 365 right for your business?

Office 365 is the brand name Microsoft uses for a group of subscriptions that provide productivity software and related services to businesses and consumers. The Office 365 service consists of a number of products and services which include Microsoft Office applications (Word, Excel, Powerpoint, Outlook, OneNote), collaboration tools (OneDrive, Sharepoint Online, Skype for Business, Yammer, Microsoft Teams) and cloud email hosting (Exchange).

The above products and services are used by all businesses – small and big – for their day to day work and productivity. As a business, if you are wondering if moving to Office 365 is really a solution for your business, the answer is yes. Although we can talk about “cooler features” that are available, as a business you probably say to yourself “I didn’t need any cool features up until now and my business is doing fine. Why do I need this now!”. That is why in this blog, we are going to talk about things you use right now in your business and how moving to Office 365 will help.

  • Disaster Recovery Costs – As a business, you might be running some services like emails on an in-house server. If you are doing this, then you must have to worry about disasters like system crashes or natural disasters. To allow recovery from disasters, you must implement a disaster recovery plan, maintain it, change it as things change in the business and all of this just means “added cost”. By moving to a service like Office 365, you won’t have to worry about any of these costs as your data will always be available
  • Predictable Costs – Office 365 allows you to pay for it’s services monthly and does not lock you into a contract. You can add, remove or reallocate licenses on demand. As a business owner, this means you can avoid large upfront costs for a new server or licenses
  • Enterprise Email – A lot of businesses still use email services provided by their domain hosting company or internet service providers. The email service type is “POP3”. This email service type used to work in the old days when users were collecting emails only on one device (usually their office computer). With focus on mobility and remote workforce these days, users need to collect their emails on multiple devices (office computer, laptop, smart phones, tablets) and this is where a service like POP3 comes undone. POP3 service does not keep emails on all your devices in “sync” which means if an email is “read” on one device, it still shows up as “unread” on the second device. Another example is if you send an email from one device, it does not show up in the “sent items” of the second device. Office 365 hosted email service allows businesses of all sizes to make use of features that “enterprise” businesses have traditionally used. And again, with “no upfront costs”
  • Licencing Nightmare – Traditionally businesses have bought software like Microsoft Office “as and when required”. This results in different users within a business using different versions of the software. This means situations like one user working on a file cannot collaborate with another user efficiently because “they use different versions of the software” are not uncommon. With Office 365, a business can ensure that all users are on the same version of the software and all updates are pushed to all users at the same time. As with any other product or service within Office 365, there is no upfront cost, only monthly costs
  • Mix and Match Plans – Office 365 allows flexibility in terms of what products and services are made available to each user within a business. This means as a business, as an example, you do not have to buy “professional version” of Microsoft Office for everyone if only a few users need it. This can also be done with other software like Microsoft Project and Visio as well

The above are some of the “practical” examples that highlight how Office 365 can help a business of any size keep up with technology and improve their day to day working as well as productivity.

If you wish to know more if Office 365 is right for your business, please feel free to call us on 1300 441 551 for a free consultancy session.

Meltdown and Spectre exploit critical vulnerabilities in modern processors

These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are not typically permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs.

This sensitive data might include your passwords stored in the password manager or browser, your personal photos, emails, instant messages and even business critical documents. Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider’s infrastructure, it might be possible to steal data from other customers.

Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system. This vulnerability basically melts security boundaries which are normally enforced by the hardware. Desktop, Laptop, and Cloud computers are effected by Meltdown. More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information. Luckily there are patches against the Meltdown for Linux, Windows and OS X operating systems.

Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices into leaking their secrets.In fact, the safety checks of said best practices actually increase the attack surface and may make more applications susceptible to Spectre. Almost every system is affected by Spectre: Desktops, Laptops, cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, Spectre is verified on Intel, AMD, and ARM processors. Spectre tricks other applications into accessing arbitrary locations in their memory. Spectre attacks involve including a victim to speculatively perform operations that would not occur during correct program execution and which leak the victim’s confidential information via a side channel to the adversary.

For everyone – whether you are a system administrator for a very large enterprise, or you have a single home computer – Install this patch as soon as it is available from your vendor. For consumers, enabling auto update ensures that patches install as soon as they are available to your computer.

Is SD-WAN right for you?

SD-WAN is an acronym for software-defined networking in a wide area network (WAN). Traditionally, multi-location offices have been interconnected using MPLS or VPN technology. These technologies, although more reliable, have been expensive to deploy and maintain.

With the availability of cheaper optic fibre based internet, NBN and 4G connections, SD-WAN is an inexpensive alternative to allow companies to build higher-performance WANs using lower-cost and commercially available internet access, enabling businesses to partially or wholly replace more expensive private WAN connection technologies such as MPLS. This is ideal for situations where non-real-time applications like emails and file sharing form bulk of the traffic between multiple offices within an organisation.

SD-WAN allows your company to make use of multiple lower-cost internet connections, often with different ISPs and a mix of technologies (optic fibre, NBN and 4G), to configure redundancy within the WAN. This in effect also means, that you are not tied into the same ISP for all your sites as would have been in the case of a MPLS alternative. SD-WAN allows flexibility of choosing the best ISP for each of your locations independently.

American marketing research firm Gartner predicted in 2015 that by the end of 2019 30% of enterprises will deploy SD-WAN technology in their branches.

SD-WAN products can be physical appliances or virtual appliances, and are placed in small remote and branch offices, larger offices, corporate data centres, and increasingly on cloud platforms. A centralised controller is used to set policies and prioritise traffic. The SD-WAN takes into account these policies and the availability of network bandwidth to route traffic. This helps ensure that application performance meets service level agreements (SLAs) and QoS.

Features of SD-WANs include resilience, security and quality of service (QoS), with flexible deployment options and simplified administration and troubleshooting.

  • Resilience – A resilient SD-WAN reduces network downtime. The technology features real time detection of outages and automatic switch over to working links
  • Quality of service – SD-WAN technology supports quality of service by having application level awareness, giving bandwidth priority to the most critical applications. This may include dynamic path selection, sending an application on a faster link, or even splitting an application between two paths to improve performance by delivering it faster
  • Security – SD-WAN communication is usually secured using IPsec, a staple of WAN security
  • Application optimisation – SD-WANs can improve application delivery using caching, storing recently accessed information in memory to speed future access
  • Deployment options – Most SD-WAN products are available as pre-configured appliances, placed at the network edge in data centres, branch offices and other remote locations. There are also virtual appliances that can work on existing network hardware, or the appliance can be deployed as a virtual appliance on the cloud in environments such as Amazon Web Services (AWS). This allows enterprises to benefit from SD-WAN services as they migrate application delivery from corporate servers to cloud based services
  • Administration and troubleshooting – Management simplicity is a key feature for SD-WANs. As with network equipment in general, GUIs are preferred to command line interface (CLI) methods of configuration and control. Other beneficial administrative features include automatic path selection, the ability to centrally configure each end appliance by pushing configuration changes out, and even a true software defined networking approach that allows all appliances and virtual appliances to be configured centrally based on application needs rather than the underlying hardware

Majestic Computer Technology has partnered with Cisco Meraki and uses their platform to deploy and manage SD-WANs. If you want to know more, please call us on 1300 441 551 for a free consultation session.

Bad Rabbit ransomware is sweeping across major parts of the globe

New ransomware called Bad Rabbit is taking over computers across Europe.It’s locking users out of their machines and demanding money from them, but security experts are warning people not to pay up. It’s currently unclear if infected computers can be fully restored, but there are ways to protect yourself from the cyber attack.

The criminals behind Bad Rabbit are tricking people into infecting themselves, by disguising the malware as an Adobe flash installer and planting it on legitimate websites that have been compromised. After infecting one machine in a network – one computer in an office, for example – Bad Rabbit can find any login details stored on the machine which it uses to spread to others, security researchers have claimed.

Dos and Don’ts

  • Do not install any flash updates that appear on your screen asking you to install.
  • Do keep anti-virus software up to date.
  • Do not click any links on a suspicious email.
  • Do not give any sensitive information through email

EUROFINS|MGT SERVER VIRTUALISATION PROJECT

Majestic was appointed to plan and migrate production servers at Eurofins | mgt from a physical to virtual environment.

Eurofins|mgt has emerged from the Eurofins Scientific acquisition of mgtLabMark Environmental Pty Ltd. Eurofins|mgt has 200 staff and a network of National NATA Accredited Environmental Laboratories located in Brisbane, Sydney & Melbourne that are supported by a National distribution and service network with offices located in Adelaide, Perth, Darwin & Newcastle. Eurofins also operates an Environmental Laboratory in Wellington along with Food and Agroscience Laboratories in Auckland, Hamilton & Christchurch.

Virtualisation was required to provide features that reduce administration costs, increase security, have the servers “data centre” ready and provide additional administrative functionalities.

Majestic successfully planned and implemented the migration in collaboration with Eurofins | mgt IT by:-

  1. esigning a new virtualised server infrastructure based on Clustered VmWare Environment and SAN devices.
  2. Migration of production server and minimum downtime
  3. Post migration review, testing and clean up.
  4. Optimise the virtual environment for performance.

Aussie phishing scams impersonate AFP, Telstra, ATO, Spotify, GoVia

A spate of phishing scams hijacking brands such as Telstra, Spotify, Energy Australia and GoVia and government agencies including the Australian Federal Police (AFP) and the Australian Taxation Office (ATO) have swamped Australian inboxes during the past week. During the past few days a number of small to large phishing scams have been picked up and blocked by email filtering firm, MailGuard.

Fake financial notices impersonating Telstra, the ATO and Queensland toll road payments provider, GoVia, were doing the rounds since Wednesday 13 September.The fake emails had a link to access a bill, and were written in plain text without any logos or anything that actually resembles correspondence from the well noted government agencies and telco giants.

Dos and don’ts

  • Do not respond to any message claiming to be from AFP, Telstra, ATO, Spotify and GoVia.
  • Do keep anti-virus software up to date.
  • Do not click any links on a suspicious email.
  • Do not give any sensitive information through email

ACCC warns of fake NBN Scammers – Beware of fake phonecalls and emails

Nearly $28,000 has been stolen from Australians this year by scammers pretending to be the NBN in order to steal money and personal information. Scamwatch has already received 316 complaints this year related to scams impersonating the NBN, according to the ACCC. “Scammers are increasingly using trusted government brands like NBN to trick people into falling for scams,” ACCC deputy chair Delia Rickard said. “Their goal is always to either get hold of your money or personal information.”

One of the most common scams involves scammers ringing victims to connect them to an NBN service and demanding payment with an iTunes gift card. Rickard said that Australians over 65 are particularly vulnerable to cold calls from scammers, who often demand payment via iTunes gift cards. “Legitimate businesses, especially those like NBN, will never ask you to pay for anything in this way,” Rickard said. “NBN will never phone you out of the blue to try to sign you up to a service over its network. NBN is a wholesaler, meaning they don’t sell direct to the public. If you get an unsolicited call like this, it’s a big red flag that you are dealing with a scammer,” Rickard said. “NBN will also never call you to remotely ‘fix’ a problem with your computer, or to request personal information like your Medicare number or your bank account numbers. Do not listen to the reasons they give you for needing this information.” Rickard advised Australians to hang up and contact their retail service provider if they were in doubt about a caller purporting to be from the NBN.

Protect Yourself

  • Know who you are talking to
  • Protect your personal information
  • If you think you’ve been scammed, report it immediately

Australian businesses are at stake due to the illegal use of software

In the year 2016, Australian businesses have been hit with $589,000 in damages over the use of unlicensed software. “By using unlicensed software, businesses are compromising their cybersecurity policies and putting their customers data at risk. It can also result in financial losses for the business, as information can be intercepted and repurposed for others financial gain. Not to mention the impact to the reputation of the organisation, business and its employees during any legal proceedings.” BSA director of compliance programs, Gary Gan said.

During 2016, the global software industry advocate organisation which is widely known as BSA settled 14 cases Australia wide. Each business caught using unlicensed software was forced to purchase genuine software licenses for its ongoing use, in addition to paying the copyright infringement damages.

“Our 2016 results reflect the increased public awareness of the security and business challenges that unlicensed software poses to Australian businesses. We strongly encourage all businesses, across all sectors to implement an effective Software Asset Management (SAM) practice. This, combined with regular checks of software licenses and deployments, will ensure their business is secure and avoids legal risks,” Gan added.

Other than the risk of paying copyright infringement damages, other benefits of using licensed software are –

  • Pirated software often contains malware which can lead to the theft of company’s confidential information.
  • With licensed software, regular software updates are available to mitigate any risks associated with vulnerabilities discovered since the software was first released.
  • Pirated software can cause severe damage to your computer hardware which requires hardware replacement.
  • Having genuine and licensed software speaks volumes about your company’s reputation and governance.
  • Avoid all unnecessary IT and cyber security risks.

Whatever IT compliance requirements your business has, Majestic can assist in ensuring that you are always on top of the requirements. Utilising the industry standard tools and best practices, technology experts at Majestic can help your organisation to review your compliance requirements, current setup and help you fill in the missing pieces. Any work related to IT audit and compliance completed by Majestic are documented using standard documentation processes.