Heart of Texas Network Consultants Blog

Heart of Texas Network Consultants has been serving the Central Texas area since 1992, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Do Your IT Solutions Support You the Way They Should?

Do Your IT Solutions Support You the Way They Should?

When selecting which solutions, your business will need as a part of its information technology infrastructure, it helps to look to the future and your plans to advance and expand. Of course, it also doesn’t hurt to make sure that you and your needs are covered, just in case something were to go wrong. This is why it is important to be sure you know the answers to the following questions, especially when someone else is managing your IT solutions.

Continue reading

3 Vital Technologies for Remote Workers

b2ap3_thumbnail_remote_worker_services_400.jpgRemote workers are changing the way that both employees and their employers are viewing their workspace. It’s been proven that businesses can mitigate their overhead costs and increase their employee retention rate by allowing their team to work from home, but without the proper technology, they have no chance of being as productive as they can be if they were in the office.

Continue reading

DecryptCryptoLocker Provides Fix for Nasty Ransomware

b2ap3_thumbnail_decryptolocker_400.jpgA few months ago, we mentioned that a ransomware called CryptoLocker was spreading at a dangerous rate due to the GameOver Zeus malware. The ransomware would lock down files on victims' computers until a fee was paid, but not anymore. Now, with the help of FireEye and Fox-IT, a solution has been created called DecryptCryptoLocker.

Note: DecryptCryptoLocker has been decomissioned by the developer and is no longer supported.

As we mentioned in a previous blog article, Cryptolocker is a Windows-based malware involved in data theft schemes. The ransomware digs through a user's PC until it finds something valuable that contains personal information. If it doesn't find anything, CryptoLocker locks down the files on the user's PC and demands payment for the decryption key.

By December of 2013, CryptoLocker was estimated to have infected 250,000 systems. Since then, the war on CryptoLocker has left it neutralized. However, there are still people all around the world who are feeling its effects, and they cannot access files on their computer because of it. In response, FireEye and Fox-IT have created a tool called DecryptCryptoLocker, which allows users to obtain a decryption key and use it to decrypt the malware.

Follow these steps to activate DecryptCryptoLocker and rid yourself of the malware for good:

  • Find a single encrypted file locked down by CryptoLocker which doesn't house any sensitive information.
  • Upload the file to the DecryptCryptoLocker online portal, which can be found here.DeCryptCryptoLocker has been decommissioned by the developer of the software.
  • DecryptCryptoLocker will provide you with the master encryption key for your PC. If you use multiple systems, you will need to repeat this process to obtain their unique master encryption keys.
  • Download and install Decrtypolocker.exe and run the program locally on your PC.
  • Using the provided master encryption key, you should be able to unlock your files.

So long as your antivirus has removed CryptoLocker from your PC, you should be free from the clutches of the ransomware.

When it comes to keeping your business safe from crippling malware and viruses, nothing beats the Unified Threat Management solution that Heart of Texas Network Consultants can provide you with. The UTM is a combination of powerful antivirus software, firewalls, spam protection, and web filtering. If you have been afflicted with CryptoLocker, we can help you remove it from your computer for good, and our services will prevent your network from being infected in the future.

For more information about our UTM solution or other services that we can equip your business with, contact Heart of Texas Network Consultants at (254) 848-7100 . This world is a dangerous place, so you want only the best for your business. Show hacker's who the boss is by partnering up with Heart of Texas Network Consultants - you'll be glad you did.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Entertainment Chrome WiFi Efficiency BYOD Workplace Tips Internet of Things App Business Continuity Google Drive Technology Information History Lithium-ion battery Microsoft Office Email Applications Proactive IT The Internet of Things Two-factor Authentication Vulnerability Google Alert Marketing Software Productivity Managed IT Services Productivity Automation Vendor Management Ransomware Windows 10 Antivirus Hacking Humor Mobile Office Unsupported Software Operating System Business PowerPoint Wi-Fi Social Media Mobile Device IT Support Employer-Employee Relationship Paperless Office Virtualization Bandwidth Customer Relationship Management IT Support User Tips Data Recovery Saving Money Gmail Telephone Systems Malware USB Disaster Recovery OneNote Miscellaneous Government Bring Your Own Device Health Network Windows 8 Facebook Printer Unified Threat Management Windows Outsourced IT Information Technology Networking Computer Hosted Solutions Education Data Backup Cybersecurity BDR Browser Apps Server Business Computing Risk Management Phishing Small Business Cloud Computing Hackers Hybrid Cloud Spam Avoiding Downtime Remote Computing communications Office 365 Save Money Privacy Android Collaboration Cybercrime Computers Upgrade Data Management Wireless Technology Windows 10 Mobile Computing Shortcut Search Business Management Office Managed Service Provider Office Tips Smartphones Big Data Managed IT Services Data Security Mobile Device Management Microsoft Streaming Media Router Wireless Security Money Artificial Intelligence Innovation Quick Tips Tablet Password Laptop IT Services Holiday Gadgets Internet Passwords Cost Management Mobile Devices Encryption Data Update Tech Support Backup Tech Term Communication Best Practice Network Security Law Enforcement Social Hard Drives VoIP Smartphone iPhone Cloud Mobility Application Users Current Events Going Green User Error Hardware Maintenance Best Practices