<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data-Serv Technologies</title>
	<atom:link href="https://data-serv.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://data-serv.com/</link>
	<description></description>
	<lastBuildDate>Mon, 19 May 2025 12:47:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>What is Malware &#038; How To Protect Your Business</title>
		<link>https://data-serv.com/cyber-security/malware/</link>
					<comments>https://data-serv.com/cyber-security/malware/#respond</comments>
		
		<dc:creator><![CDATA[Data Serv]]></dc:creator>
		<pubDate>Mon, 19 May 2025 12:46:40 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Worms]]></category>
		<guid isPermaLink="false">http://data-serv.com/?p=257</guid>

					<description><![CDATA[<p>Malware infects thousands of businesses every day. Malware can corrupt files, hold data for ransom, and spy on your computer use. So what is malware and how do we prevent it from causing chaos in your business? What is Malware Malware is a general term used to describe all types of malicious software. Malware includes trojans, worms, viruses, adware, spyware, ransomware, and more. Each type of malware has a different function. Usually, malware will try to damage your computer or steal information. Types of Malware Virus A Virus is a piece of code or a software program that is capable of copying itself. The code often has a detrimental effect such as corrupting the system or destroying data. Viruses can be even more dangerous if they are able to spread over a network or bypass security systems. Trojans A Trojan pretends to be something good to trick users into downloading it. Trojans sometimes pretend to be virus removal programs, or games. In reality, they run malicious programs in the background. Then hackers can steal your files, view your browsing history, or even control your pc. Worms A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other computers and may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, even if only by consuming bandwidth. Spyware Spyware is computer software that gets installed... </p>
<p>The post <a href="https://data-serv.com/cyber-security/malware/">What is Malware &#038; How To Protect Your Business</a> appeared first on <a href="https://data-serv.com">Data-Serv Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Malware infects thousands of businesses every day. Malware can corrupt files, hold data for ransom, and spy on your computer use. So what is malware and how do we prevent it from causing chaos in your business?</p>
<h2>What is Malware</h2>
<p>Malware is a general term used to describe all types of malicious software. Malware includes trojans, worms, viruses, adware, spyware, ransomware, and more. Each type of malware has a different function. Usually, malware will try to damage your computer or steal information.</p>
<h2>Types of Malware</h2>
<h3>Virus</h3>
<p>A Virus is a piece of code or a software program that is capable of copying itself. The code often has a detrimental effect such as corrupting the system or destroying data. Viruses can be even more dangerous if they are able to spread over a network or bypass security systems.</p>
<h3>Trojans</h3>
<p>A Trojan pretends to be something good to trick users into downloading it. Trojans sometimes pretend to be virus removal programs, or games. In reality, they run malicious programs in the background. Then hackers can steal your files, view your browsing history, or even control your pc.</p>
<h3>Worms</h3>
<p>A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other computers and may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause harm to the network, even if only by consuming bandwidth.</p>
<h3>Spyware</h3>
<p>Spyware is computer software that gets installed on a computer without user permission. It collects information about a user without the user&#8217;s informed consent. Spyware can collect many various types of personal information. It can also interfere with a users control of the computer. Spyware can install more malware and redirect browser activity. It can also change computer settings, home pages, and cause loss of Internet.</p>
<h3>Adware</h3>
<p>Adware is any software that displays ads to a user without permission. Usually seen by the developer as a way to make money. In some cases, it may allow the software to be free of charge or sold at a reduced price. The user may view the ads as interruptions, or annoyances. In extreme circumstances, the ads can be difficult to exit out of and may prevent the user from working.</p>
<h3>Ransomware</h3>
<p>Ransomware is a type of malware that prevents users from accessing their system. Modern ransomware actually encrypts files on the infected systems. Then forces users to pay a ransom through anonymous payment methods to get a decryption key. This is by far the most malicious type of malware. <a href="http://data-serv.com/wannacrypt-ransomware/">WannaCrypt</a> is one example of a ransomware variant that gained notoriety in May of 2017.</p>
<h3>Botnets</h3>
<p>A Botnet is a type of malware that spreads across many computer systems. Botnets report back to a central &#8216;command and control&#8217; server. The creator of the botnet can then use the control server to make the infected systems perform tasks. Botnets are often used for denial of service attacks, spamming, and cracking passwords.</p>
<h2>The Solution</h2>
<h3>Physical Security</h3>
<p>First, you should have a physical security device such as a firewall. Firewalls protect every device on your network from attack. Firewalls perform packet analysis on the data coming in and out of your network. This allows them to prevent malware from coming in and can stop malware from spreading.</p>
<h3>Software Security</h3>
<p>A good security suite will help defeat the majority of threats you face in the wild.  Companies like <a href="https://www.trendmicro.com">Trend Micro</a> and <a href="https://www.malwarebytes.com/">Malwarebytes</a> have large databases of malware. They offer software to scan your computer systems for infections. If they detect an infection the software will alert you and attempt to remove it.</p>
<h3>Preventative Maintenance</h3>
<p>It is important that you keep your computer systems up-to-date. Software vendors often release security patches to fix vulnerabilities. If your software isn&#8217;t updated you could expose yourself to hackers and malware. Finally, one of the best preventative steps you can take is to have a secure backup system in place. This way if you get infected you can recover your data and get back to work with minimal downtime or loss.</p>
<p>The post <a href="https://data-serv.com/cyber-security/malware/">What is Malware &#038; How To Protect Your Business</a> appeared first on <a href="https://data-serv.com">Data-Serv Technologies</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://data-serv.com/cyber-security/malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WannaCrypt Ransomware</title>
		<link>https://data-serv.com/cyber-security/wannacrypt-ransomware/</link>
					<comments>https://data-serv.com/cyber-security/wannacrypt-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Data Serv]]></dc:creator>
		<pubDate>Tue, 04 Feb 2025 19:26:00 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Exploits]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[SMB]]></category>
		<guid isPermaLink="false">http://data-serv.com/?p=74</guid>

					<description><![CDATA[<p>What Is Ransomware? This form of malware denies the victim access to their files by encrypting them. Then the malware prompts the victim to pay a ransom to recover their data. Most ransomware spreads via email attachments and downloads from malicious websites. Ransomware like WannaCrypt is not a new threat. Ransomware started gaining notoriety back in 2013 with the release of CryptoLocker. What Makes WannaCrypt So Dangerous? WannaCrypt is unique in its ability to self-spread. It does not need a user to click a link or download an email attachment. WannaCrypt leverages a Windows SMB exploit nicknamed &#8216;EternalBlue&#8217;. The exploit allows remote hackers to hijack computers running unpatched versions of Windows. Once infected WannaCrypt also scans for other unpatched PCs connected to the network. It also scans random hosts on the wide area network, to spread itself faster. EternalBlue EternalBlue is an exploit developed by the U.S. National Security Agency. It takes advantage of vulnerabilities in Microsoft Window&#8217;s Server Message Block protocol. Instead of alerting vendors of exploits, governments often stockpile vulnerabilities. This way they can use it for intelligence purposes later. Yet, the Shadow Brokers hacker group found and leaked the SMB vulnerability back in April of 2017. Microsoft did release a patch in March of 2017 that fixed this exploit. Yet, there remained many critical systems online that never received the patch. System admins often delay patches until testing can prove that it won’t break other services. Also, many of these systems such as Windows XP were out-of-life-cycle.... </p>
<p>The post <a href="https://data-serv.com/cyber-security/wannacrypt-ransomware/">WannaCrypt Ransomware</a> appeared first on <a href="https://data-serv.com">Data-Serv Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>What Is Ransomware?</h2>
<p>This form of <a href="http://data-serv.com/malware/">malware</a> denies the victim access to their files by encrypting them. Then the malware prompts the victim to pay a ransom to recover their data.  Most ransomware spreads via email attachments and downloads from malicious websites. Ransomware like WannaCrypt is not a new threat. Ransomware started gaining notoriety back in 2013 with the release of CryptoLocker.</p>
<h2>What Makes WannaCrypt So Dangerous?</h2>
<p>WannaCrypt is unique in its ability to self-spread. It does not need a user to click a link or download an email attachment. WannaCrypt leverages a Windows SMB exploit nicknamed &#8216;EternalBlue&#8217;. The exploit allows remote hackers to hijack computers running unpatched versions of Windows. Once infected WannaCrypt also scans for other unpatched PCs connected to the network. It also scans random hosts on the wide area network, to spread itself faster.</p>
<h2>EternalBlue</h2>
<p>EternalBlue is an exploit developed by the U.S. National Security Agency. It takes advantage of vulnerabilities in Microsoft Window&#8217;s Server Message Block protocol. Instead of alerting vendors of exploits, governments often stockpile vulnerabilities. This way they can use it for intelligence purposes later. Yet, the Shadow Brokers hacker group found and leaked the SMB vulnerability back in April of 2017.</p>
<p>Microsoft did release a patch in March of 2017 that fixed this exploit. Yet, there remained many critical systems online that never received the patch. System admins often delay patches until testing can prove that it won’t break other services. Also, many of these systems such as Windows XP were out-of-life-cycle. This means they are no longer supported by Microsoft and as such, they did not receive any patches.</p>
<h2>The Attack</h2>
<p><strong>Friday, May 12 (AKA: Day 0)</strong> </p>
<p>The attack hit hard in Europe, infecting over 75k systems in over 99 countries. The attack took some notable victims such as Spain’s Telefonica and Russian MegaFon. The British Nation Health Service had 16 hospitals affected. The hospitals had to turn away patients and cancel scheduled operations. FedEx and the Russian Interior Ministry were also affected by the attack.</p>
<p><strong>Saturday, May 13</strong> </p>
<p>A 22-year-old security researcher who calls himself MalwareTech discovered a ‘kill switch’. WannaCrypt would connect to a URL and if it was successful it would continue its attack. The researchers then created a sinkhole by buying the domain and setting it to display a web page. This slowed the infection rate and made it so new infections would not work.</p>
<p><strong>Sunday, May 14</strong> </p>
<p>New variants of WannaCrypt get spotted in the wild. Some with new kill-switch domains and others with no kill-switch at all. It&#8217;s believed that a third party created the new variants and not the hackers behind the first wave. Yet, it is still unknown who is behind WannaCrypt.</p>
<h2>How to Protect Your Systems</h2>
<h3>Data-Serv Customers</h3>
<p>We have already ensured your security against this attack. There is no further action required by you. If you are not a customer and would like to learn more about the services we offer feel free to <a href="http://data-serv.com/contact/">contact us</a>.</p>
<h3>Patch SMB Vulnerability</h3>
<p>Microsoft has decided to released patch for its out-of-life-cycle products. You can download the patch for your system on the Microsoft website.</p>
<p> http://www.catalog.update.microsoft.com/search.aspx?q=4012598 </p>
<h3>Always Install Security Updates</h3>
<p>If you are running any version of Windows make sure that you have automatic updates turned on. </p>
<h3>Disable SMB</h3>
<p>It is advisable to disable the SMBv1 protocol even if you have installed the patches.</p>
<ol>
<li>Go to Windows’ Control Panel and open ‘Programs.’</li>
<li>Open ‘Features’ under Programs and click ‘Turn Windows Features on and off.’</li>
<li>Now, scroll down to find ‘SMB 1.0/CIFS File Sharing Support’ and uncheck it.</li>
<li>Then click OK, close the Control Panel and restart the computer.</li>
</ol>
<h3>Block SMB Ports on your Firewall</h3>
<p>Always have your firewall enabled. If you need SMBv1 enabled change your firewall config to block SMB ports over the internet.</p>
<h3>Use an Antivirus</h3>
<p>Use a good antivirus such as <a href="https://www.malwarebytes.com/">Malwarebytes</a> or <a href="https://www.trendmicro.com/en_us/business.html">Trend Micro</a> and keep it up to date.</p>
<h3>Be suspicious of Emails, Websites, and Apps</h3>
<p>Most ransomware spreads through phishing emails, malicious ads, and third-party apps. You should always exercise caution when opening uninvited documents sent over email. You should never download apps from third-party sources. Also, be sure to read reviews before installing apps from official stores.</p>
<h3>Back Up Your Files!</h3>
<p>Backups are the best way to defend against this type of attack. Having offsite backups that are not connected to the internet is ideal. If a hacker encrypts your system you can restore your files from your backup and won&#8217;t need to pay a ransom.</p>
<p>The post <a href="https://data-serv.com/cyber-security/wannacrypt-ransomware/">WannaCrypt Ransomware</a> appeared first on <a href="https://data-serv.com">Data-Serv Technologies</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://data-serv.com/cyber-security/wannacrypt-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Intelligent Automation</title>
		<link>https://data-serv.com/news/intelligent-automation/</link>
					<comments>https://data-serv.com/news/intelligent-automation/#respond</comments>
		
		<dc:creator><![CDATA[Data Serv]]></dc:creator>
		<pubDate>Tue, 10 Sep 2019 18:02:48 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://data-serv.com/?p=385</guid>

					<description><![CDATA[<p>Robotic Processing Automation is here! Over the last few years, Intelligent Automation (IA) has quickly become a critical force as a “gateway” to digital transformation. It is a key enabler of true end-to-end process transformation, quickly impacting results with a potential ROI of 30% to 200% in just the first 12 months (McKinsey). Successful organizations have realized significant business benefits including increased revenue generation, cost savings, speed of execution, accuracy, and compliance.</p>
<p>The post <a href="https://data-serv.com/news/intelligent-automation/">Intelligent Automation</a> appeared first on <a href="https://data-serv.com">Data-Serv Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Robotic Processing Automation is here! Over the last few years, Intelligent Automation (IA) has quickly become a critical force as a “gateway” to digital transformation. It is a key enabler of true end-to-end process transformation, quickly impacting results with a potential ROI of 30% to 200% in just the first 12 months (McKinsey). Successful organizations have realized significant business benefits including increased revenue generation, cost savings, speed of execution, accuracy, and compliance.</p>
<p>The post <a href="https://data-serv.com/news/intelligent-automation/">Intelligent Automation</a> appeared first on <a href="https://data-serv.com">Data-Serv Technologies</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://data-serv.com/news/intelligent-automation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
