Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems
A Warning from DHS and Other Government Agencies Regarding Remote Working

By Erik Briceno

A Warning from DHS and Other Government Agencies Regarding Remote Working

In light of the growing Coronavirus (COVID-19) pandemic, in our previous blog, we highlighted some of the numerous remote working solutions that are available to those who are forced to work from home during this worrying time. However, even now at the time of writing, we are hearing warnings and reports from several government agencies on how malicious actors are taking advantage of the crisis to push malware, ransomware, and phishing campaigns into even higher gear. Those who are working from home are especially at risk for a variety of reasons. Today we’re going to outline some of these vulnerabilities that DHS, NIST and other agencies are cautioning on, and what each person can do to secure themselves as much as possible on their end in their own home.   Read more

Password Security in 2020 - Part 2

By Erik Briceno

Password Security in 2020 – Part 2

In our last blog, we covered some generalized password advice that everyone should know. Unfortunately, there is no such thing as a password that can’t be hacked. Phishing scams and malware infections are ongoing problems, and now that we’re in 2020, these serious cyberthreats are on the rise and quickly making traditional password security depreciated.

But the good news is, current efforts to phase out passwords are also giving rise to additional security methods that can (and should) be used in conjunction with standard account protection practices. In today’s article, we’re outlining some very necessary steps to take in addition to simply coming up with a strong password.   Read more

Cities Held Hostage — A Brave New World

By Erik Briceno

Cities Held Hostage — A Brave New World

In the course of a single week, three cities in Florida were struck with three separate ransomware attacks. At the time of writing this, two of the three gave in to the ransom demands and the third is still considering it. Almost immediately following these incidents in Florida, Georgia’s state court system was also hit. This was the second time this year for Georgia, following an event which completely crippled Atlanta’s IT network. Officials paid off the attackers with a hefty $400,000 ransom payment, and it is currently unknown if Georgia will be paying the ransom again this time.

Each of these attacks and capitulations have occurred within a worrisome and remarkably short period of time. It’s also worth noting that all of these events take place merely weeks after the announcement of a ransomware attack on Baltimore — an attack that cost the city $18.2 million to recover from. Here is a breakdown of each one as they happened.   Read more

By Erik Briceno

“Please Patch Your Windows. Pretty Please?” – Microsoft

Do you remember WannaCry? Two years ago, it was arguably the most destructive cyberworm in history — shutting down hospitals, banks, transportation and shipping companies. Perhaps one of the most baffling things of all, though, is the fact that WannaCry didn’t exist until two months AFTER Microsoft had already released a patch that would fix the very vulnerability the worm took advantage of.

Now, in 2019, the same thing is happening again with a vulnerability known as BlueKeep. This security risk is so severe that not only did Microsoft update Windows 10, they even went out of their way to patch its depreciated operating systems: Windows 2003, Windows XP and Windows Vista.   Read more

Recent Malware Attacks Show Why You Need to Protect Your Data

By Erik Briceno

Recent Malware Attacks Show Why You Need to Protect Your Data

Earlier this year, hackers took aim at the city of Atlanta, hobbling the city government’s vital data and computer systems. They used a pernicious form of malware — malicious software programs that can harm or disable your computer or mobile device while robbing you of time, money or your very identity.

That’s exactly what occurred in Atlanta, where Mayor Keisha Lance Bottoms said, “We are dealing with a hostage situation.” And recovery efforts have cost the city an estimated $2.6 million.

What happened in Atlanta, unfortunately, doesn’t stay in Atlanta. The city’s experience with digital extortion illustrates the dangers posed by hackers — and why businesses and individuals must do all they can to detect and prevent cyber attacks.   Read more

Protect Your Businesses From Malware: Know the Common Types

By Erik Briceno

Protect Your Business From Malware: Know the Common Types

When it comes to malware, the bad guys continue to increase in numbers and creativity.

Malicious software comes in a variety of forms. Some are designed to wipe out data, while others want to hold that data for ransom. But every type of malware means lost revenues for your business. That’s why it’s hard to overestimate how important it is for businesses to protect their data from these cybercriminals.   Read more

Your Computer’s Worst Enemy: Malware

By Erik Briceno

Your Computer’s Worst Enemy: Malware

It’s what every tech user fears — malware, those malicious software programs that can harm or disable your computer or mobile device while robbing you of precious time, money or your very identity. In 2017, experts say more than half of American adults were impacted by a malware attack. You don’t want to become part of that statistic.   Read more

A Warning from DHS and Other Government Agencies Regarding Remote Working
A Warning from DHS and Other Government Agencies Regarding Remote Working
Password Security in 2020 - Part 2
Password Security in 2020 – Part 2
Cities Held Hostage — A Brave New World
Cities Held Hostage — A Brave New World
“Please Patch Your Windows. Pretty Please?” – Microsoft
Time to Cut Bait: Don’t Fall Prey to Email Phishing Scams
Recent Malware Attacks Show Why You Need to Protect Your Data
Recent Malware Attacks Show Why You Need to Protect Your Data
Keeping Up With the Bad Guys: 3 Key Trends in Cybersecurity
Keeping Up With the Bad Guys: 3 Key Trends in Cybersecurity
Prevent Malware From Infecting Your Computer: Use These Best Practices
Prevent Malware From Infecting Your Computer: Use These Best Practices
Protect Your Businesses From Malware: Know the Common Types
Protect Your Business From Malware: Know the Common Types
Your Computer’s Worst Enemy: Malware
Your Computer’s Worst Enemy: Malware