• Get Help

    Please enter the 6-digit code provided by your support representative:


    You will be prompted by your browser to download the file Support-LogMeInRescue.exe.

    Your Security
    • Remote sessions are sometimes recorded for traceability and training purposes.

    • You are in full control of your computer at all times.

    • You always have overriding control of your mouse and keyboard, and you can end the screen-sharing session at any time.

    Use of EasylifeIT™ Support Connection

    EasylifeIT Remote Support is for use by established clients only

  • Call us on 0800 043 9186
    • Brightfield Business Hub Bakewell Road, Peterborough. PE2 6XU

      Sales or support

      0800 043 9186
      01733 715930

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

    • Suite 2, Level 1, London house, 68-72 London street, Norwich, NR2 1JT.

      Sales or support

      0800 043 9186
      01603 562996

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

    • 22 Orton Enterprise Centre Bakewell Road, Peterborough. PE2 6XU

      Sales or support

      0800 043 9186
      01733 715930

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

EasylifeIT Security

Lindsey Hall - Managing Director of EasylifeIT™

Security Advisories and Advice

“Today, 680,000 people joined the Internet. Today, 125,000 new viruses will have been discovered. Today, 9500 websites will have been infected and are already infecting their visitors; 80% of those sites owned by SME’s. Just having an antivirus these days simply isn't enough; education, diligence and vigilance are absolutely key.”

Lindsey Hall, MD of EasylifeIT for FSB Lincolnshire AGB

Security Advisory: Dodgy links in search engines for software updates

Many have been caught recently with virus infections after trying to update commonly used software from links using Google searches. There is a pernicious practice called "poisoned SEO"; where virus writers are getting their dodgy links to infected websites above the official ones in search engines. This is something to make your team aware of. This can bypass the defences of many antivirus systems and poses a potential risk to your systems.

Keeping software up to date is important
 
Keeping your software up to date is a good idea for security, but to ensure you get genuine, non-infected sources; here are the official sites for most common requested software updates and ones we have seen malicious links for.
 
Java : http://www.java.com 
Itunes : http://www.apple.com/itunes/  
Adobe Flash : https://get.adobe.com/flashplayer/ 
Adobe Reader : https://get.adobe.com/uk/reader/
Skype : http://www.skype.com/en/business/

For more information on poisoned SEO and the risks, see the article from Windows Security magazine below

http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/SEO-Poisoning-What-it-is-what-you-can-do-about-it.html 

 

Lindsey Hall
EasylifeIT Support

Print Email

Security Advisory: Telephone Voicemail Hacking Leading to Enormous Bills

We have all heard of voicemail hacking, but it appears it isn't just the red top gossip rags after your secrets, but also criminal gangs targeting your company telephone system ... and bills.

While outside our IT support remit, this morning we assisted a customer whose telephone system had been hacked over the weekend, and as a consequence have run up a bill of several thousand pounds in international phone call charges. Not knowing where to start, the customer called us and what we discovered was quite shocking as to just how easily this was effected by hacking of the voicemail system. So much so that I thought a security advisory was wise; suggesting that you raise this matter with your telephone supplier as a preventative measure.

A little background

Not so long ago, a telephone answering machine was as secure as the room it was in. It was, essentially, a tape recorder bolted onto a phone. If you called someone and they were out, the tiny cassette inside would record your message so that the intended recipient could play it back later. The only way to "hack" the message would be to steal the cassette itself. But mobile telephony has changed all that. Users now need access to their messages wherever they are and sometimes from more than one phone. This provided a way in for the phone hackers.
 
For most circumstances there are three common ways a hacker can take control of your phone system and run up huge long distance charges without you knowing:
 

  • Remote voice mail access is BY FAR the easiest way for a hacker to gain enough access to a phone system to do bad things. Employees want to be able to access information (including voice mail) while out of the office, so your "phone guy" may have setup a way to access your voice mail while you're not in the office - a convenient but hackable feature.
    Hacking a voice mail system is quite easy. Once a voice mail system has the capabilities to be accessed by dialling in from an outside line - this also makes it available to be hacked by anyone in the world who can call your phone number. Phone Engineers who do installations are unfortunately notorious for leaving system programming and user (voice mail) passwords set to their default password assigned by the manufacturer. Most voice mail systems only allow 4-digit passwords, which means there are 9,999 possible password combinations
  • Remote Programming has become extremely profitable for phone engineers and leaves you less secure.
    Once someone has access to the remote programming, they have complete and full control of all phones, phone lines, call forwarding, voice mail, etc.
  • IP-Phones / Remote Phones have saved businesses tons of money by eliminating long-distance communications costs between offices or remote workers. With newer phone systems, it will use the data network to establish communications with the remote office/worker. If improperly setup/secured, hackers will use the same techniques from items #1 and #2 - default passwords. Once a hacker has successfully registered a remote phone, they act like an extension on your phone system - pick up the phone and start dialling anywhere, any time.

 

What should you do?

 
Speak to your telephone system provider and pose the question; is our telephone system secure? While this is the first incident that we have seen, it is by all accounts becoming increasingly common. The steps we have found suggested are often straightforward and include:
 

  • Restrict the use of phone systems to specific dial codes or block all international calls if not required
  • Ask if your phone systems has a built-in firewall to help prevent your phone system from being hacked
  • Prevent call transferring of international calls through your voicemail system.

 

 

Lindsey Hall

Managing Director - EasylifeIT

Portions (C) Sean Brown of Sleepy Shark. Click here for full article

Print Email

What did Homer know about IT security? ... quite a lot surprisingly.

3200 years ago, a city stood on the shores of the Hellespont. Already ancient, it was rich beyond compare and with its mighty walls and formidable warriors it dominated all it surveyed on land and sea.

 Until, one fine spring day, a thousand sails brought an army the like of which the world had never seen before; who besieged the city for 10 long years. Battles, death and carnage ensued, but the walls still held. Eventually; dispirited, exhausted and denied the riches of the city and their conquest, the army retreated back across the Aegean Sea, leaving as the only sign they had been there, a giant effigy of a horse standing on the shore, built from the timbers of their own boats. This was their offering to the Gods to ensure a safe journey home.

 Warily emerging from their city, the inhabitants treated the horse initially with suspicion; but they shared the same Gods and were persuaded by the duplicitous to drag the effigy back into the heart of the city, around which they celebrated, drank and made merry. As darkness fell; tired and happy; they retired and all gradually became quiet.

 Except there was a sudden noise, a creek of wood; then from the horse emerged a small group of enemy warriors; but there was nobody to see them, nobody to challenge them. Taking the guards by surprise from behind, they then threw open the gates of the city to the army that had not in fact retreated but had been hiding out of sight. Flooding into the city and venting the frustration of 10 long years, the destruction was terrible and utterly complete.

 The city was of course Troy, and the effigy by which the city had been tricked and taken has passed into legend as the Trojan horse. So, you might be asking; what has this got to do with IT security?

 The Trojan horse, in today’s parlance; a mechanism by which defences are bypassed and then neutralised by little more than the trust and nativity of the user; causing chaos in its wake. Whoever named this class of viruses certainly knew their classics. To paraphrase Virgil; “beware of geeks bearing gifts”.

Print Email

How to contact EasylifeIT™

  • Contacting EasylifeIT™ is easy. Call us on 0800 043 9186 (+44 1733 715930) if you would like to speak to one of our team. Alternatively, email This email address is being protected from spambots. You need JavaScript enabled to view it. or complete our short enquiry form.

    Please note that you will be redirected to our secure SSL portal to submit your details and returned when finished

    Contact Form

Strategy and consultancy

Strategy and consultancy
EasylifeIT™ Director
ConceiveIT. A bewildering array of choices; unfathomable jargon. EasylifeIT™ will talk to you in plain English. We will help you make sense of your options and give you the confidence to make good decisions

Read more

Preparation and implementation

Preparation and implementation
EasylifeIT™ Project Manager
ImplementIT. Let us plan, manage and implement the project for you, taking the weight off your shoulders while bringing years of cumulative experience to ensure its success.

Read more

IT SITE MANAGER and support

IT SITE MANAGER and support
EasylifeIT™ Site Manager
ManageIT. Few things are so disruptive to your operations as when the IT misbehaves, and a poorly maintained and managed system is much more likely to go wrong. Delegate this responsibility to easylifeIT™

Read more

IT SECURITY and Cyberessentials

IT SECURITY and Cyberessentials
EasylifeIT™ Security
SecureIT. The use of internet and email has brought enormous benefits, but also considerable risk. Every day there are cyber-attacks against companies just like yours

Read more