KEEPING YOUR SYSTEMS SAFE IS OUR FIRST PRIORITY

There are massive ransomware attacks that are spreading globally. Majestic always have an eye open to instantly react on those attacks. Ransomware attacks have become more frequent these days. At majestic, We take no chance in order to keep our clients systems and data safe

Here are few updates on how we keep up with the frequent ransomware attacks

  • Security and critical patching – We perform security and critical patching on all the SLA systems every month to prevent from any malware attacks.
  • Event log verification – We check event logs of the system every month in order to identify any malicious logs that might have occurred and take proper action to eliminate them.
  • Immediate action on ransom attacks – We constantly monitor for any new ransomware attacks and take an immediate action to prevent, if there are any.
  • Keep the security services up to date and running – We keep security services up to date by installing latest patches.

Majestic Computer Technology’s Service Level Agreement includes all the above features, giving you a sense of security and ensure that you are in safe hands.

We also request our clients to not click on any suspicious links or emails. if you suspect that your computer is not functioning normally or if you receive any suspicious emails, do not hesitate to call us.

WILL YOU SURVIVE AN “ATTACK”?

Did you know that the recent Privacy Act Amendments (under the Notifiable Data Breach Scheme) mean that Federal agencies, companies and not-for-profits with an annual turnover of $3 million or more must notify the Office of the Australian Information Commissioner about cyber breaches, and alert affected individuals?

In this digital age, all businesses are vulnerable to a cyber-attack. This could be via a website, server, emails or third-party providers.

Even if your system is “secure” do you use contractors that can log into your system? Are their computers “secure”?

What are your procedures on opening emails with attachments? What measures do you have in place for transferring money to third parties and internally? Do you have a robust risk management system in place for all your IT systems – telephones, laptops, multi-function printers, working from home, servers (“the cloud”) etc? Do you test your systems to ensure backups are available and haven’t been corrupted?

What would you do if you couldn’t access your computer system – could you still operate? Would your customers be able to communicate with you? Could you continue to make sales or deliver services? What damage would be caused to your reputation?

The Notifiable Data Breaches Scheme

Who needs to comply with NDB?

  • Australian Government Agencies
  • All businesses and not-for-profit organisations with an annual turnover of $3M or more
  • Some small business operators including:

o   All private sector health service providers;

o   Those that trade in personal information;

o   Tax File Number (TFN) recipients;

o   Those that hold personal information in relation to certain activities, such as providing services to the Commonwealth under a contract.

Some statistics…

Australia’s NDB scheme has already forced the disclosure of around 950 data breaches in its first year of operation. In fact, quarterly reporting by the Office of the Australian Information Commissioner (OAIC) reported 812 breaches to the end of 2018 – an average rate of around 2.66 breaches per day!

These numbers are rather alarming given that as the NDB is a new scheme, and thus many smaller organisations are likely to be yet unaware of reporting responsibilities. Experts warn that many companies still lack the internal capabilities to comply with breach-reporting requirements or even evaluating the extent of any incident.

A survey released by McAfee found 45% of Small to Medium organisations had been the target of an electronic attack in the prior year and 46% had suffered a data or security breach perpetrated by disgruntled and current employees.

The risk of fire to Australian organisations is 1 in 200, while hacking is 1 in 5 – would you operate without insurance for your property or stock?

Indeed, nowadays you can insure against almost anything, including:

  • Technology Professional Services;
  • Multimedia Liability;
  • Security and Privacy Liability;
  • Customer Support and Reputational Expenses;
  • Data Recovery and Business Interruption;
  • Privacy, Regulatory, Defence and Penalties; and
  • Cyber Extortion.

What Now?

There are clearly no guarantees that your systems can be made impenetrable. However, being able to demonstrate a responsible IT security posture and how you go about protecting the safety of the data you hold, certainly goes a long way. It may even help keep your insurance premiums at bay!

Our role is to help you with solution to ensure that even if your systems happen to become compromised, your organisation can keep functioning with as little disruption as possible, while minimising the potential for data loss. Let us show you how.

RESEARCHERS HAVE CONFIRMED A NEW FORESHADOW VULNERABILITIES AFFECTING INTEL CPUS

Researchers have identified three new vulnerabilities affecting Intel CPUs. All three are Spectre-class attacks that take advantage of a CPU design feature named speculative execution. Speculative execution is a feature that is found in all modern CPUs that has the role of improving performance by computing operations in advance and later removing the unneeded data. Foreshadow/L1TF is a highly sophisticated attack method, and today, Intel is not aware of  any reported real-world exploits.

Majestic Computer Technology is aware of this new speculative side channel vulnerability known as Foreshadow/L1 Terminal Fault. Microsoft has released security update on 14th August, 2018 in order to address this issue. Microsoft patch that has been released to address this issue provides protections against a new speculative execution side-channel vulnerability known as L1TF that affects Intel Core Processors and Intel Xeon Processors. This patch also make sure that previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings.

Majestic Computer Technology’s Service Level Agreement has installed this security update on all SLA servers, giving you a sense of security and ensure that you are in safe hands.

If you would like to know more, please feel free to contact Majestic Computer Technology at any time. We are here to help.

WHAT IS NEW IN THE TREND MICRO SECURITY SERVER VERSION 10.0

Your Trend Micro security server has been upgraded to version 10.0 under the service level agreement (SLA). As always, Majestic Computer Technology leaves no stone unturned  in order to keep your data and systems safe. Trend Micro security server version 10.0 has new features which enhance your protection levels to a great extent.

Trend Micro Worry-Free Business Security Server 10.0 includes the following new features and enhancements:

  • Predictive Machine Learning: The Predictive Machine Learning engine can protect your network from new, previously unidentified, or unknown threats through advanced file feature analysis and heuristic process monitoring. Predictive Machine Learning can ascertain the probability that a threat exists in a file or process and the probable threat type, protecting you from zero-day attacks.
  • HTTPS Web Threat Protection for Google Chrome and Microsoft Edge: Worry-Free Business Security has enhanced and extended your protection against malicious HTTPS websites. You can use the Google Chrome and Microsoft Edge browsers and be fully protected by your Web Reputation and URL Filtering policies without the need of browser add-ons.
  • Platform Support: This version of Worry-Free Business Security provides support for Microsoft™ Windows™ 10 Fall Creators Update

Your upgraded security server includes all the above features, giving you a sense of security and ensure that you are in safe hands.

If you would like to know more, please feel free to contact Majestic Computer Technology at any time. We are here to help.

WHY KEEPING ANTIVIRUS UP TO DATE IS CRITICAL – AN INSIGHT FOR OUR SLA CLIENTS

Majestic Computer Technology installs critical patches on the Trend Micro security servers for all our SLA clients. It is quite common for anyone to assume that once the antivirus solution is installed on a Server or Workstation, it will take care of any malware issues. But in todays world, hackers are always finding someway to sneak into your systems. So to keep them in check, keeping your antivirus solution up to date is critical. Antivirus solution providers provide regular patches to cover any vulnerable ways which are left open

The critical patches applied on the security servers address the following issues:

  • Update the security server global settings to deploy a special antivirus program compatibility registry key to all the security agents. Microsoft checks for this special registry key before permitting the security updates
  • Critical patch updates the security agent program to ensure that USB 3.0 devices are not disconnected unexpectedly after the scheduled restart
  • Security server prevents the “Blue Screen On Death (BSOD)” issue on the affected systems on the network after the critical patch is applied
  • This critical patch merges the code from Trend Micro Anti-Spam (TMAS) 8.0 to ensure that TMAS add-on works normally on outlook 2010

Majestic Computer Technology’s Service Level Agreement includes all the above work, giving you a sense of security and ensure that you are in safe hands.

If you would like to know more, please feel free to contact Majestic Computer Technology at any time. We are here to help.

AFTER MELTDOWN AND SPECTRE, ANOTHER NEW CHIP FLAW EMERGES

Majestic Computer Technology installs critical patches on the Trend Micro security servers for all our SLA clients. It is quite common for anyone to assume that once the antivirus solution is installed on a Server or Workstation, it will take care of any malware issues. But in todays world, hackers are always finding someway to sneak into your systems. So to keep them in check, keeping your antivirus solution up to date is critical. Antivirus solution providers provide regular patches to cover any vulnerable ways which are left open
The critical patches applied on the security servers address the following issues:

  • Update the security server global settings to deploy a special antivirus program compatibility registry key to all the security agents. Microsoft checks for this special registry key before permitting the security updates
  • Critical patch updates the security agent program to ensure that USB 3.0 devices are not disconnected unexpectedly after the scheduled restart
  • Security server prevents the “Blue Screen On Death (BSOD)” issue on the affected systems on the network after the critical patch is applied
  • This critical patch merges the code from Trend Micro Anti-Spam (TMAS) 8.0 to ensure that TMAS add-on works normally on outlook 2010

Majestic Computer Technology’s Service Level Agreement includes all the above work, giving you a sense of security and ensure that you are in safe hands.

If you would like to know more, please feel free to contact Majestic Computer Technology at any time. We are here to help.

MOVE TO MICROSOFT HOSTED EXCHANGE – MAKE A SMOOTH MOVE TO THE CLOUD

Microsoft Hosted Exchange is more than just email. It is a powerful collaboration tool. One can manage contacts, calendars, tasks and emails whether one is on his/her computer or mobile devices. This is one solution which resolves all your mailbox synchronisation issues. With plenty of mailbox storage, anti-malware protection, lower upfront costs and  flexible monthly billing, Microsoft Hosted Exchange is undoubtedly the best option to improve your business productivity.

With Microsoft Small Business Servers coming to an end and the traditional IMAP/POP (ISP provided) email reliability narrowing down day by day, Microsoft Hosted Exchange is definitely the best option to consider. Here are the key features.

  • Stay connected – If your emails are in cloud, they will always be available. You will be up and running, no matter what happens; Even in the major disaster situations.
  • Data security and control – Data security in the cloud is no longer an issue. Microsoft has built-in security and continuous compliance, so businesses focus on the right things.
  • Multiple device management – Your emails are always synchronised between different devices, which means any read/unread/sent emails always appear the same on all devices. This is one of the major assets of the Microsoft Hosted Exchange.
  • No more licensing mess – You can now purchase, assign and remove licenses for the users on demand.
  • Lower costs – You can signup for Microsoft Hosted Exchange portal with very minimal up-front costs and pay for the licenses as you go.

Being a Microsoft Gold Partner, we at Majestic Computer Technology can provide the best Microsoft Hosted Exchange plan tailored to your business requirements.

For an obligation free consultancy session, please feel free to contact Majestic Computer Technology. We are here to help.

AUSSIE BUSINESSES LOST $22.1 MILLION TO EMAIL SCAMS LAST YEAR

Email scam reports were the second highest with 31 per cent – losing only to phone scams with 40 per cent. A total of 50,635 email scams were reported totalling $17.4 million in losses.
The use of cryptocurrencies as a payment method in scams and scams capitalising on the popularity of investments in cryptocurrencies peaked in the last quarter of 2017, according to the report.

Protect Yourself

  • Protect your personal information
  • Do not give any sensitive information through emails.
  • Do not click on any suspicious links or emails.
  • If you think you’ve been scammed, report it immediately.

Majestic™ Hosted Email Security™ is a security solution that delivers continously updated protection to stop phishing, ransomware, advanced threats and malware before they reach your network.

For an obligation free consultancy session, please feel free to contact Majestic Computer Technology at any time. We are here to help.

MAJESTIC COMPUTER TECHNOLOGY IS NOW AN AWS CERTIFIED PARTNER

We are delighted to announce that Majestic Computer Technology is now a certified partner with Amazon Web Services. In 2006, Amazon Web Services (AWS) began offering IT infrastructure services to businesses in the form of web services which is now commonly known as cloud computing.

With data center locations in the U.S., Australia, Europe, Brazil, Singapore and Japan, today AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world.

Majestic Computer Technology now provides a broad set of AWS products and services, which you can use as building blocks to run sophisticated and scalable applications.

  • Backup and Disaster Recovery – AWS storage solutions achieve efficiency and scalability without the need of an on-premises infrastructure.
  • Data Archiving – Amazon Web Services offers a complete set of cloud storage services for archiving.
  • Serverless Computing – Serverless computing allows you to build and run applications and services without thinking about servers.
  • High Performace Computing – AWS enables you to increase the speed of research and reduce time-to-results by running HPC in the cloud.
  • Business Applications – Run your existing business on AWS, while building the future of your business on AWS as well.
  • Content Delivery – Content Delivery Network (CDN) is a service that securely delivers data, videos, applications, and APIs to your viewers with low latency and high transfer speeds.

For an obligation free consultancy session, please feel free to contact Majestic Computer Technology at any time. We are here to help.

MAJESTIC PATCH MANAGER HAS BEEN UPDATED

At Majestic Computer Technology, we make sure that no stone is left unturned to provide the best service for our SLA clients. We constantly keep updating, let it be our knowledge or our software system. We have made some commendable changes to our patch manager recently to give the best services to our clients. With the growing ransomware attacks around the world, ” Patching is a serious job” and we never skip any opportunity to make it even better.

We constantly strive hard to make your network more resistant to the ever surrounding cyber attacks, as a result we have  reinvented the way patching is performed. Here are latest updates.

  • Majestic patch manager now also manages third party applications patching along with Microsoft updates. For example, we can now apply Adobe Reader®, Google Chrome® and Apple iTunes® updates from our patch manager.
  • We always ensure that all security and critical patches are applied on the systems. To make it more effective we can now create patch groups in our patch manager according to the system’s configuration.
  • Majestic patch manager now integrates with the Windows API to detect the potential patches that are needed to be deployed on the systems.

Majestic Computer Technology’s Service Level Agreement includes all the above features, giving you a sense of security and ensure that you are in safe hands.

If you would like to know more, please feel free to contact Majestic Computer Technology at any time. We are here to help.