We are a busy real estate agency with multiple offices and staff
We are a busy real estate agency with multiple offices and staff working remotely, so it didn’t take long before we knew that we needed someone that specialised in both PC’s and Apple products to take care of our computer and IT needs. When it comes to computers, most of us know how to use …
We have been dealing with Allan for four years and what can we say he is excellent. With any issues he is instantly on the phone resolving it remotely and if he needs to come to the office is usually here within the hour. We would not have survived without him many times and especially …
Stuart has been my IT guy for years. His determination to really work out a solution to whatever unique IT problem I have has never phased him, and he’s never tried a quick fix that results in the problem just coming back or getting worse. He is always professional and genial, delivers outstanding customer service, …
Stuart & Allan are not the usual IT support team. Why?….well for one they don’t look down their noses at those of us who are techno challenged. In fact they are happy to try and explain in layman’s terms what the problems may be. They are quick to respond to our cries for help- and …
Access Nephrology is dependent on the reliability!
Stuart from Symmetry IT has managed the information technology complexities of Access Nephrology for 2.5 years. Access Nephrology is a busy Consultant Medical Practice, with out-reach clinics in many parts of NSW. Medical information comes into Access Nephrology from a multitude of sources, to be used by three busy Consultant Physicians in the Practice. Access …
Intelligent Business Continuity is a process that can be both data and Server at the same time in a disaster recovery scenario. This process is a Hybrid backup solution that holds data locally and backs up off-site to an Australian Data Centre.
Visa to ditch signatures for cards as biometrics trial gets underway.
Visa will start a small-scale trial of payment cards with built-in fingerprint scanners this year after setting April as the date it will eliminate the need for signatures with EMV chip or contactless payments.
Visa joins American Express, Discover, and MasterCard to phase out signatures, making them optional for all EMV contact or contactless chip-enabled merchants in North America from this April.
Older credit cards without EMV chips will still require signatures for authentication, it said.
Increase in ransomware campaigns impacting organisations globally
The ACSC is aware of an increase in ransomware campaigns impacting organisations globally. Ransomware is malicious software that makes data or systems unusable until the victim makes a payment.
The mitigations for ransomware are well known, criminals do not discriminate, and no organisation should be unprepared for when it hits them.
Mitigation advice: ◾Patch/update all software and operating systems immediately. ◾Ensure that your data is backed up regularly and that offline and/or offsite backups are available. ◾Ensure your antivirus software is up-to-date. ◾Organisations and individuals should not pay the ransom. There is no guarantee that paying the ransom will recover the affected data or systems, and it could make you vulnerable to further attacks. Restore your files from backup and seek technical advice.
Domino's Pizzas recently had its Australian database leaked with scammers having obtained at least names, email addresses and locations where the pizza was brought. Customers have been receiving phishing emails since the leak. Be diligent if you are one of their customers.
The Australian Broadcasting Corporation (ABC) has become the latest organisation to expose sensitive information through a misconfigured Amazon Web Services S3 storage bucket.
Security firm Kromtech revealed the government-funded broadcaster had accidentally leaked "a trove of data that is connected with ABC Commercial” including “production services and stock files that should not have been publicly available online".
A new strain of ransomware that has emerged in the past few days has hit a number of high profile institutions in Russia and Ukraine, such as the Kiev metro system, the Odessa airport, as well as the Russian news agency Interfax.
The new family of ransomware is dubbed Bad Rabbit and appears to target critical infrastructure and high profile entities in the former Soviet space. Preliminary analysis reveals that this new strain of ransomware comes bundled with several open source tools that are leveraged for data encryption and lateral movement, as described below.
The infection process starts with a fake Adobe Flash installer that is downloaded from compromised websites. This fake Flash installer holds the actual ransomware payload in a ZLIB-packed overlay. Once decrypted, it drops and executes the actual ransomware (identified as b14d8faf7f0cbcfad051cefe5f39645f).
Customers using Symmetry-IT Managed Services are protected against this ransomware strain.
Customers using Symmetry-IT subscription antivirus are also protected.
Confusion is sweeping Australian internet users after the disclosure of a flaw in the WPA2 protocol used to secure wi-fi, with many unsure of what they need to patch.
The flaw, which was made public late on Monday night local time, puts almost all personal and enterprise wireless-enabled devices and networks at risk of attack.
The researchers who uncovered the so-called KRACK attack assert that it “does not exploit access points, but instead targets clients” - and that “for ordinary home users, your priority should be updating clients such as laptops and smartphones”.
Despite this, there remains considerable confusion on whether home routers need to be updated or not.
A D-Link A/NZ representative told Whirlpool that the vulnerability “is targeting ... clients and not the routers/access points" (APs).
A recently discovered vulnerability could allow attackers to intercept sensitive data being transmitted between a Wi-Fi access point and a computer or mobile device, even if that data is encrypted. The flaw, known as KRACK, affects WPA2, a security protocol widely used in most modern Wi-Fi devices. In some cases, a hacker could exploit KRACK to inject malware such as ransomware into websites, according to KU Leuven's Mathy Vanhoef, the researcher who discovered the vulnerability. Vanhoef's findings were reported by tech site Ars Technica early Monday morning.
Please note that there is a zero day vulnerability, classified as CVE-2017-1182 that affects Microsoft Office. Please ensure that you patch your computers with the October Security Update from Microsoft. Managed Service customers will be patched by Symmetry-IT. ... See MoreSee Less
Global hoteliers Hyatt are warning guests of a systems breach that has resulted in credit card information being stolen from several locations around the world.
In a notice posted on its corporate website, Hyatt said the breaches took place in mid-March and early July this year.
"Based on our investigation, we understand that such unauthorised access to card data was caused by an insertion of malicious software code from a third party onto certain hotel IT systems," Chuck Floyd, Hyatt's global president of operations said.
Hyatt said its "enhanced cybersecurity measures and additional layers of defence" helped identify the breach.