Cybersecurity blog posts

Security and cyber liability panel discussion

Published January 20, 2023

New River Computing recently hosted a panel discussion on security and cyber liability featuring the following panelists:

The panel was moderated by Jeff Nosenzo - Vice President of Brown Insurance.

If you missed out on the panel or want to revisit it, you can check it out in the video above!


Solarwinds, security, New River Computing, and you

Published February 05, 2021

Many recent news reports have come out regarding a massive hack of the Solarwinds Orion IT asset management system. This compromise is unprecedented in scale and reach, and the fallout from it will reverberate throughout the IT industry for years.

Solarwinds Orion is one of many IT asset management systems (New River Computing uses one called Connectwise Automate). This software is great for managing a large number of IT systems, with the ability to provide security updates, monitoring, and many other functions from a single console, with the click of a mouse. These abilities make it an ideal target for a malicious actor – By owning a software system such as this, the bad actor in turn owns every company or agency that uses the software.

Solarwinds Orion was hacked from the inside, most likely because of poor security practices at the Solarwinds company. Once the hackers had the ability to change the Orion software, they added backdoor code to it that was then distributed to Orion customers, allowing the bad actors access to every network that uses this management tool.

Starting in March, as many as 18,000 companies and government agencies downloaded the malicious software – 425 of the Fortune 500 companies, 10 top US telecoms, the Pentagon, Departments of State and Treasury, and many others. This malicious backdoor software remained undetected for months, allowing the bad actors access to the infected network resources, data, and almost anything on a network that you can imagine. The backdoor code is so stealthy that many organizations may not ever know that they were compromised.

The attack was almost certainly perpetrated by a government – Russia, China, and the US all have the capabilities to achieve an attack like this, as well as many other state actors. This attack will have long lasting impacts, taking years to clean up, and changing IT management behavior.

Luckily, New River Computing did not use any Solarwinds software, and so we and our clients were not affected by this attack. Early in 2020, however, New River Computing looked around and realized that security was the top priority for our internal resources. The IT industry as a whole has spent the last few years improving efficiency of and driving down costs for rigorous asset management. But Security has been lagging behind, as evidenced by this attack. New River Computing will be spending 2021 and beyond improving access to top-notch security tools and techniques.

Please feel free to reach out if you have any questions.


The Equifax data breach

Published October 01, 2017

abstract security breach image

I'm sure everyone is painfully aware of the recent data breach at Equifax. Industry experts are suggesting that this breach was a state-sponsored hack, and I believe them. Chances are everyone reading this newsletter has had their personal financial information compromised. You must take action.

Go to annualcreditreport.com and get a free copy of your credit reports from the big three and review for discrepancies. You can go to the official Equifax site and jump through their hoops just don't use other sites: Some are scams. Annualcreditreport.com is the official site.

  1. Freezing your credit is a protective measure, my family chose. You can contact each credit reporting agency individually, or in our case, pay Experian to freeze accounts at all three agencies. Not sure if Experian is still offering this option, but it saved some hassle!
  2. Freezing your credit can be done online or you can call each of the three reporting agencies: TransUnion: 1-888-909-8872; Equifax: 1-800-349-9960; Experian: 1-888-397-3742.
  3. Freezing your credit takes about 30-45 minutes per identity.
  4. There are some additional costs and time associated with unfreezing your credit when you apply for a new credit card or home/auto loan. Additionally, applying for a rental agreement, new utility service or even cell phone agreements may be impacted. When you unfreeze your credit, it can only be unfrozen with your PIN. Don't lose it!
  5. Freezing and unfreezing your credit may be easier than cleaning up after having an identity stolen.
  6. Instituting a fraud alert is another option, but in my opinion, the credit freeze is adequate.

I suspect each of the credit reporting firms is doing a top-down security risk assessment, so hopefully a recurrence is unlikely.

More info is available at Federal Trade Commission's Equifax Data Breach page.


The cost of "free" software

Published April 11, 2016

Have you ever been tempted to try to acquire expensive software without paying for it? It turns out that &quto;free" software can be more expensive than one might think!

Take Photoshop for example: Subscribers can sign up and start using Photoshop for as little as $10, a far cry from the high upfront cost that it used to be, in the range of $600+. Adobe’s move to this subscription model makes it easy for aspiring artists or even amateur photographers to use the professional software at a reasonable cost.

Don’t want to pay? Cracked versions of Photoshop are illegal, and trying to obtain them can lead to more than just legal trouble. A Google search for "Photoshop crack," "Photoshop key," or similar keywords can yield a wide array of results. It’s possible that some of these results will actually lead to a download of Photoshop. However, many of them can lead to pages full of malware, viruses, or worse.

When searching for a "free" version of copyright protected information or product, there is a high probability of coming across websites that are less than trustworthy. Often times, these sites have malicious advertisements or pop-ups that are created to harm the computer and the entire network that is connected to it.

New River Computing has seen quite a few “ransomware” infections in recent weeks as a result of Flash ads from searches, malicious email links, and more. Here’s an example of what can go wrong:

We received a call about some files not being accessible. Our engineers connected to the server and immediately noticed the issue—all of the client’s files had been encrypted by a malicious virus. Our team jumped into action right away and disabled access to the server to stop the encryption process. The next step was to identify the infected computer. After a bit of digging, the computer was identified and steps were taken to determine how it became infected. By stepping through the web browser’s search history, several sites associated with free software were identified. Many of these sites contained pop-ups and Flash-based ads. It was eventually determined that the infection came from a compromised Flash ad stream.

Here’s how the virus works:

  1. The virus installs using a security flaw
  2. It searches for files to encrypt, scanning the network for shared folders on other computers and servers
  3. Then the virus encrypts (locks or conceals) the files and folders making it impossible for you to retrieve them
  4. The virus reveals itself when you try to access a file or folder and you see a pop up with an “800” number to call for the ransom
  5. If you call the number and pay them, they may release your files and folders; or they could take your credit card information and go on vacation

After all is said and done, several engineers worked simultaneously in order to regain control and scrub the network, adding up to about 11 hours, with the cleanup cost totaling around $1500. Comparing the costs of a virus remediation vs the costs of paying for Adobe Photoshop: For the same price as the infection cleanups, the user could have had the full Photoshop subscription for 30 months (2 ½ Years) or just the photography suite for 150 months (or 12 ½ years.).

We should note that we were able to restore all files that had been encrypted, because there was a complete and current backup.

As Robert H. Heinlein once said, "TANSTAAFL!" (There ain’t no such thing as a free lunch.)


The most destructive computer viruses – infographic

Published October 05, 2015

Supreme Systems IT put together this infographic about the “most destructive” computer viruses of all-time. It gives a broad overview and history of computer viruses and malicious software.

Infographic of the most destructive computer viruses

Get a quote!

Your request has been successfully submitted.

Thank you for contacting New River Computing. We will respond to you as soon as possible.