Heart of Texas Network Consultants Blog

Heart of Texas Network Consultants has been serving the Central Texas area since 1992, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Do Your IT Solutions Support You the Way They Should?

Do Your IT Solutions Support You the Way They Should?

When selecting which solutions, your business will need as a part of its information technology infrastructure, it helps to look to the future and your plans to advance and expand. Of course, it also doesn’t hurt to make sure that you and your needs are covered, just in case something were to go wrong. This is why it is important to be sure you know the answers to the following questions, especially when someone else is managing your IT solutions.

Continue reading

3 Vital Technologies for Remote Workers

b2ap3_thumbnail_remote_worker_services_400.jpgRemote workers are changing the way that both employees and their employers are viewing their workspace. It’s been proven that businesses can mitigate their overhead costs and increase their employee retention rate by allowing their team to work from home, but without the proper technology, they have no chance of being as productive as they can be if they were in the office.

Continue reading

DecryptCryptoLocker Provides Fix for Nasty Ransomware

b2ap3_thumbnail_decryptolocker_400.jpgA few months ago, we mentioned that a ransomware called CryptoLocker was spreading at a dangerous rate due to the GameOver Zeus malware. The ransomware would lock down files on victims' computers until a fee was paid, but not anymore. Now, with the help of FireEye and Fox-IT, a solution has been created called DecryptCryptoLocker.

Note: DecryptCryptoLocker has been decomissioned by the developer and is no longer supported.

As we mentioned in a previous blog article, Cryptolocker is a Windows-based malware involved in data theft schemes. The ransomware digs through a user's PC until it finds something valuable that contains personal information. If it doesn't find anything, CryptoLocker locks down the files on the user's PC and demands payment for the decryption key.

By December of 2013, CryptoLocker was estimated to have infected 250,000 systems. Since then, the war on CryptoLocker has left it neutralized. However, there are still people all around the world who are feeling its effects, and they cannot access files on their computer because of it. In response, FireEye and Fox-IT have created a tool called DecryptCryptoLocker, which allows users to obtain a decryption key and use it to decrypt the malware.

Follow these steps to activate DecryptCryptoLocker and rid yourself of the malware for good:

  • Find a single encrypted file locked down by CryptoLocker which doesn't house any sensitive information.
  • Upload the file to the DecryptCryptoLocker online portal, which can be found here.DeCryptCryptoLocker has been decommissioned by the developer of the software.
  • DecryptCryptoLocker will provide you with the master encryption key for your PC. If you use multiple systems, you will need to repeat this process to obtain their unique master encryption keys.
  • Download and install Decrtypolocker.exe and run the program locally on your PC.
  • Using the provided master encryption key, you should be able to unlock your files.

So long as your antivirus has removed CryptoLocker from your PC, you should be free from the clutches of the ransomware.

When it comes to keeping your business safe from crippling malware and viruses, nothing beats the Unified Threat Management solution that Heart of Texas Network Consultants can provide you with. The UTM is a combination of powerful antivirus software, firewalls, spam protection, and web filtering. If you have been afflicted with CryptoLocker, we can help you remove it from your computer for good, and our services will prevent your network from being infected in the future.

For more information about our UTM solution or other services that we can equip your business with, contact Heart of Texas Network Consultants at (254) 848-7100 . This world is a dangerous place, so you want only the best for your business. Show hacker's who the boss is by partnering up with Heart of Texas Network Consultants - you'll be glad you did.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

History Unified Threat Management Application Search Best Practices Server Encryption Email Communication Data Backup Office Tips Phishing Vulnerability Tip of the Week Managed IT Humor Hackers Marketing Windows 10 Office 365 App Managed Service Provider Meetings Innovation Laptop Tablet Network Security Hosted Solutions Mobile Devices Disaster Recovery Microsoft Office Tech Term Data Management Computer Cloud Money Printer Users VoIP Business Continuity Hacking Data Security Business Computing Workplace Tips Privacy Android Gmail Cost Management Backup Social Proactive IT Shortcut Vendor Management Security Current Events Efficiency Automation Employer-Employee Relationship Managed IT Services Going Green Unsupported Software The Internet of Things Law Enforcement Wireless Technology Business Management Networking Router Customer Relationship Management Maintenance Tech Support BDR Risk Management Password Government Chrome Data Recovery Productivity Browser Alert Saving Money Remote Computing PowerPoint User Tips Windows 8 Avoiding Downtime BYOD Wi-Fi Computers Business Virtualization Productivity Data Mobile Device Management communications Education Google Drive Update Windows Artificial Intelligence Internet of Things Information Technology Information Applications Holiday IT Solutions OneNote Wireless User Error Cloud Computing Cybersecurity Managed IT Services Small Business Two-factor Authentication Software Lithium-ion battery Outsourced IT iPhone Miscellaneous Mobile Office Windows 10 Augmented Reality Telephone Systems Google Apps Save Money Collaboration Bandwidth IT Support Office Antivirus Ransomware Smartphones Passwords Hardware USB Bring Your Own Device Recovery Gadgets Microsoft Mobility Spam Social Media Internet Health Big Data Hard Drives IT Support Malware Technology Network Quick Tips Mobile Computing WiFi Cybercrime Operating System Best Practice IT Services Smartphone Upgrade Facebook