<?xml version="1.0" encoding="UTF-8"?>
<!--Generated by Site-Server v@build.version@ (http://www.squarespace.com) on Tue, 12 May 2026 17:20:45 GMT
--><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://www.rssboard.org/media-rss" version="2.0"><channel><title>Blog - Red Clover Technologies</title><link>https://www.redclovertech.net/blog/</link><lastBuildDate>Sat, 21 Aug 2021 07:15:01 +0000</lastBuildDate><language>en-US</language><generator>Site-Server v@build.version@ (http://www.squarespace.com)</generator><description><![CDATA[<p>What you need to know</p>]]></description><item><title>Why Add Cloud Backup</title><category>Cloud</category><dc:creator>Chris Parker</dc:creator><pubDate>Sat, 23 May 2020 02:17:14 +0000</pubDate><link>https://www.redclovertech.net/blog/why-add-cloud-backup</link><guid isPermaLink="false">5ce6d0515fbc4e0001a65ceb:5ce6fb5d71c10b19d483158a:5ec880cd5060ad27eec49510</guid><description><![CDATA[Many business owners using Microsoft 365 (formerly Office 365) believe that 
their data is totally secure. The reality, however, is a different story.]]></description><content:encoded><![CDATA[<h2><strong>Why Microsoft 365 Customers Need a Backup Solution</strong></h2><p class="">Many business owners using Microsoft 365 (formerly Office 365) believe that their data is totally secure.&nbsp;The reality, however, is a different story.&nbsp;Although&nbsp;Microsoft&nbsp;offers many benefits&nbsp;in productivity, efficiency, and collaboration with&nbsp;Microsoft 365, the company&nbsp;does not provide&nbsp;users with&nbsp;a comprehensive backup system&nbsp;for their underlying data.</p>


































































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png" data-image-dimensions="340x152" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" data-sqsp-image-classic-block-image src="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png?format=1000w" width="340" height="152" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590198926136-LIQXHHFX63SYMECOZEV9/sk1.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <p class="">Mechanical malfunctions and physical damage, hacking and theft, user error, and power outages all put user data at risk in the cloud. While companies do their best to prepare for these problems, no plan is foolproof, and stories of data loss are far from rare, with the average data breach costing small businesses $120,000. About <a href="https://www.redclovertech.net/s/Product-Datasheet-Cloud-Backup.pdf" target="_blank">32% of companies</a> get hit by data loss in the cloud, with the most common cause being deletion. Although nearly two-thirds of data loss is accidental, 20% is lost to malicious intent, including hackers.</p><h2><strong>Cloud Backup Saves Data, Time, and Money</strong></h2><p class="">Cloud backup can be the difference between a slight blip and a disaster, and it can offer end customers a way to mitigate these risks.&nbsp;<a href="https://www.skykick.com/blog/partner-spotlight-advantage/" target="_blank">Advantage</a>, a managed service provider (MSP) in the U.K., had one customer that did not think it needed backup besides Microsoft 365. That was until an employee inadvertently deleted 50,000 files in the accounting department’s SharePoint library.</p>


































































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png" data-image-dimensions="340x152" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" data-sqsp-image-classic-block-image src="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png?format=1000w" width="340" height="152" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199061094-IFMKGBBV1RRD0MW997DZ/sk2.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <p class="">The information was recoverable in the recycling bin, but this would have had to have been done file by file, which was going to take an estimated six days. Luckily, Advantage had been backing up SharePoint files with SkyKick's Cloud Backup. So, the entire folder and all the files were restored within hours — a significant improvement in efficiency. After that, Advantage’s client requested backups for its entire Microsoft 365 tenant as well.</p><p class="">Ransomware is another issue facing SMBs across the globe. Although it has become more sophisticated, many schemes are still simple and catch users off guard. A client of U.S.-based MSP BOAB IT was hit with ransomware in 2016, and the perpetrators wanted $6,000 for the key to unlock the data. Luckily, BAOB IT had deployed Cloud Backup a few months before the attack. So instead of paying the ransom or wasting hours recreating 44,000 encrypted files, the service provider was able to restore all the customer's files, including every pre-attack version.</p><p class="">The fact is that having only one copy of important data is asking for trouble, whether it is stored in the cloud or elsewhere. If your data isn’t backed up, you could be facing&nbsp;<a href="https://www.recordnations.com/2017/09/risks-not-backing-data/" target="_blank">not only</a>&nbsp;a loss of productivity as you scramble to rebuild, but also a loss in revenue and reputation.</p><p class="">Microsoft 365 is an excellent service that gives you access to your data from virtually any place at any time — and across many devices. As a software-as-a-service (SaaS) built on the industry-leading Azure public cloud, Microsoft 365 offers users high reliability, geographic redundancy, and secure connectivity.</p><p class="">This should not, however, be confused with a comprehensive data protection solution. Microsoft does not back up M365 user data, so&nbsp;<a href="https://www.microsoft.com/en-us/servicesagreement" target="_blank">it recommends that customers use third-party solutions</a>.&nbsp;Furthermore,&nbsp;<strong>Microsoft does not protect data from common issues</strong> like file corruption or everyday human error. Nor does it offer a way to easily revert to older versions if something goes wrong beyond their normal data retention policy. </p><p class="">Red Clover Technologies can help you evaluate your options in addressing these shortcomings and specifically discuss how implementing a backup solution can be cost-effective and seamless and offer peace of mind.</p><h2><strong>Cloud Backup Should be Easy to Use, and Recovery Should be Fast</strong></h2>


































































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png" data-image-dimensions="340x152" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" data-sqsp-image-classic-block-image src="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png?format=1000w" width="340" height="152" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1590199737883-DNBBWOD3QO0ZE8J7GX6R/sk3.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <p class="">Not all backups are created equal, however. When looking into a solution that can protect your data stored in the cloud, there are a few fundamental questions:</p><ul data-rte-list="default"><li><p class="">What data is actually being backed up?</p></li><li><p class="">How is the backup data being stored and protected?</p></li><li><p class="">How often is data backed up, and how long is each backup version kept?</p></li><li><p class="">How easy is the data restoration process?</p></li></ul><p class="">RCT’s Cloud Backup&nbsp;is a flexible, agile, and&nbsp;reliable&nbsp;solution that offers comprehensive data protection&nbsp;across the full Microsoft 365 tenant,&nbsp;unlimited storage and retention of user data, and a hassle-free setup and run experience.&nbsp;And data recovery, when needed, happens fast, which gets your company up and running with minimum downtime.</p>]]></content:encoded></item><item><title>Beware of COVID-19 Themed Fraud and Phishing Attacks</title><category>Cybersecurity</category><dc:creator>Chris Parker</dc:creator><pubDate>Wed, 15 Apr 2020 23:04:06 +0000</pubDate><link>https://www.redclovertech.net/blog/beware-of-covid-19-themed-fraud-and-phishing-attacks</link><guid isPermaLink="false">5ce6d0515fbc4e0001a65ceb:5ce6fb5d71c10b19d483158a:5e978359e84e6c2fab961c21</guid><description><![CDATA[Social distancing and thorough hand washing aren’t the only things you 
should be practicing during the current COVID-19 pandemic. Fraudulent posts 
on social media and phishing attacks are on the rise, and they’re not 
easily identifiable at first glance.]]></description><content:encoded><![CDATA[<p class="">Social distancing and thorough hand washing aren’t the only things you should be practicing during the current COVID-19 pandemic. Fraudulent posts on social media and phishing attacks are on the rise, and they’re not easily identifiable at first glance.</p><h2>What exactly is going on?</h2><p class="">Phishing emails and themed ransomware attacks are masquerading as the WHO, CDC or the HHS in an attempt to lure people into visiting malicious websites, providing personal information, stealing login credentials or accept donations.</p><p class="">Some phishing attempts are as simple as trying to portray as a legitimate online web store, but once you click through they may attempt to steal credentials. Sometimes there is also a risk for the attacker to place ransomware on the computer, locking the user out of the system.</p>


































































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png" data-image-dimensions="421x424" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" data-sqsp-image-classic-block-image src="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png?format=1000w" width="421" height="424" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989510563-RLRDPAERX7C35I2MSQ4J/Picture1.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption data-sqsp-image-classic-block-caption-container class="image-caption-wrapper">
            <p class="">Source: <a href="https://blog.knowbe4.com/exploiting-the-coronavirus-the-spammers-the-scammers-and-the-bad-guys" target="_blank">https://blog.knowbe4.com/exploiting-the-coronavirus-the-spammers-the-scammers-and-the-bad-guys</a></p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <p class="">Other styles of phishing pretend to be from the Dept of Health and Human services, and even seemingly will bring you to the hhs.gov website at first glance. However on closer inspection we see that the URL redirects you to a malicious website instead.</p>


































































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png" data-image-dimensions="736x469" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" data-sqsp-image-classic-block-image src="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png?format=1000w" width="736" height="469" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989813090-DBPPJFMHQBRZD09R8VMI/Annotation+2020-04-15+182809.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption data-sqsp-image-classic-block-caption-container class="image-caption-wrapper">
            <p class="">Source: <a href="https://www.bleepingcomputer.com/news/security/hhsgov-open-redirect-used-by-coronavirus-phishing-to-spread-malware/" target="_blank">https://www.bleepingcomputer.com/news/security/hhsgov-open-redirect-used-by-coronavirus-phishing-to-spread-malware/</a></p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <p class="">This example takes it up a notch and is randomly sent to a person’s cell phone as a text message, with the goal of luring them to receive free supplies.</p>


































































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png" data-image-dimensions="426x380" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" data-sqsp-image-classic-block-image src="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png?format=1000w" width="426" height="380" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586989991204-WKXFZHKWO0Q062N46EU3/Picture2.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption data-sqsp-image-classic-block-caption-container class="image-caption-wrapper">
            <p class="">Source: <a href="https://nationalpost.com/news/beware-of-covid-19-scams-fraudsters-offer-free-masks-from-the-red-cross-or-fake-test-kits" target="_blank">https://nationalpost.com/news/beware-of-covid-19-scams-fraudsters-offer-free-masks-from-the-red-cross-or-fake-test-kits</a></p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <p class="">More targeted attacks may be pretending to be from an internal person at a company, or a specific department utilizing vague and generic phrasing. Attackers are taking advantage of organizations implementing new rapidly changing policies surrounding COVID-19 that need to be understood by their staff in an urgent fashion.</p><p class="">The attachment in this example leads the victim to a website that attempts to steal Office 365 credentials.</p>


































































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png" data-image-dimensions="563x404" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" data-sqsp-image-classic-block-image src="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png?format=1000w" width="563" height="404" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1586990515511-SXD1V08TFMCYFHYYW2HA/Picture3.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption data-sqsp-image-classic-block-caption-container class="image-caption-wrapper">
            <p class="">Source: <a href="https://blog.knowbe4.com/extreme-measures-the-epidemic-of-covid-19-phishing-emails-rages-on" target="_blank">https://blog.knowbe4.com/extreme-measures-the-epidemic-of-covid-19-phishing-emails-rages-on</a></p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <h2>Where can I report fraud?</h2><p class="">The federal government is aware these attacks, and has posted several resources online as well. The <a href="https://www.justice.gov/usao-wdpa/covid-19-fraud-page" target="_blank">Dept of Justice</a> has a page with information on how to report fraudulent emails, along with the Cybersecurity and Infrastructure Security Agency’s page with <a href="https://www.us-cert.gov/ncas/current-activity/2020/03/06/defending-against-covid-19-cyber-scams" target="_blank">further reading</a>.</p><h2>What can be done to help protect my employees and my business?</h2><p class="">We offer employee training, along with various mitigation methods to help keep these attackers from being successful and damaging your business. The average industry estimate for a ransomware attack is $713,000 per incident which includes downtime, lost revenue, legal fees and more. (Not to mention if you paid the attacker the ransom, that constitutes a federal charge of money laundering!)</p><p class="">If you are interested in having a risk assessment performed and an action plan put in place, we’re available to help. You can use the contact form below, or give us a call at (833) 733-2587.</p>]]></content:encoded></item><item><title>Microsoft Windows Zero-Day Vulnerability (CVE-2020-0601)</title><category>Cybersecurity</category><dc:creator>Chris Parker</dc:creator><pubDate>Wed, 15 Jan 2020 18:43:49 +0000</pubDate><link>https://www.redclovertech.net/blog/windows-zero-day-vulnerability-cve-2020-0601</link><guid isPermaLink="false">5ce6d0515fbc4e0001a65ceb:5ce6fb5d71c10b19d483158a:5e1f4dc8c31424453fb69eac</guid><description><![CDATA[An attacker could exploit the vulnerability by using a spoofed code-signing 
certificate to sign a malicious executable, making it appear the file was 
from a trusted, legitimate source.]]></description><content:encoded><![CDATA[<p class=""><strong>Impacts:</strong> Windows 10, Windows Server 2016, Windows Server 2019<br><strong>More information:</strong> <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601" target="_blank">Windows CryptoAPI Spoofing Vulnerability</a></p><p class="">Microsoft released a patch for its Windows 10 desktop operating system, and Windows 2016/2019 server operating system yesterday to address a severe bug in its Windows CryptoAPI. The bug was discovered by the NSA, and released in a press conference by Director of Cybersecurity Anne Neuberger.</p><p class="">The excerpt from the Microsoft vulnerability report best describes the scope of this bug:</p><blockquote><p class="">An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source.<br>The user would have no way of knowing the file was malicious, because the digital signature would appear to be from a trusted provider.<br>A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software.</p></blockquote><h3>What does this mean in layman’s Terms?</h3><p class="">An attacker can spoof the credibility of software, or even secure connections you or your computer establishes.</p><p class="">Typically this credibility is verified by trusted entities online such as Microsoft, VeriSign, etc. These trusted entities are like a State’s Department of Motor Vehicles in the sense that they issue identification, after vetting your identity. </p><p class="">However with this vulnerability left unpatched, an attacker could issue their own identification and fake the credibility of the issuer (which is the DMV in this example). This is sort of like someone using a really, really, really good fake ID - however instead of trying to get into a bar while underage, they’re running malicious programs on someone’s computer or listening to secure communications, such as online banking.</p><h3>How Can I Stay Safe?</h3><p class="">Our clients are audited for the presence of security patches, or lack thereof on their systems. If a system is not properly patched, we will apply our automated measures to install the patch.<br>The name of the patch will look something like this “2020-01 Cumulative Update for Windows 10 Version xxxx for x64-based System” (xxxx = build number of Windows, i.e. 1909)</p>























&nbsp;&nbsp;]]></content:encoded></item><item><title>Logitech Wireless Keyboard Security Risk</title><category>Hardware</category><dc:creator>Chris Parker</dc:creator><pubDate>Wed, 17 Jul 2019 03:37:05 +0000</pubDate><link>https://www.redclovertech.net/blog/logitech-wireless-keyboard-security-risk</link><guid isPermaLink="false">5ce6d0515fbc4e0001a65ceb:5ce6fb5d71c10b19d483158a:5d2e6c8a607b8f00015ab77d</guid><description><![CDATA[A three year old proof of concept hack still poses a threat to Logitech 
wireless peripherals in a new form.]]></description><content:encoded><![CDATA[<figure data-test="image-block-v2-outer-wrapper" data-sqsp-image-classic-block-layout="poster" class="
            sqs-block-image-figure
            image-block-outer-wrapper
            image-block-v2
            design-layout-poster
            combination-animation-none
            individual-animation-none
            individual-text-animation-none
            image-position-left
            
          " data-scrolled
      >

        
          
            
            
              
              
              
              
              
              
              
              <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg" data-image-dimensions="640x427" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" data-sqsp-image-classic-block-image src="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg?format=1000w" width="640" height="427" sizes="100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5ce6d0515fbc4e0001a65ceb/1563333574225-P2DREDPKIBMPPR6HRWZI/logitech-unifying-receiver.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

              
            
          
            
          

        

        

      </figure>

    

  





  <p class="">When’s the last time you updated your operating system for security fixes? Likely several times within the past few months, at least we hope so. But what about your wireless keyboard or mouse?</p><p class="">A three year old proof of concept hack still poses a threat to Logitech wireless peripherals in a new form. (source: <a href="https://www.theverge.com/2019/7/14/20692471/logitech-mousejack-wireless-usb-receiver-vulnerable-hack-hijack" target="_blank">The Verge</a>)</p><p class="">Within the past week it was discovered these devices are vulnerable to a series of new attacks, allowing someone to take remote control of the computer. The saving grace here is that you would need to re-initiate the pairing process, and inside of that small amount of time they can grab control.</p><p class="">It’s not just Logitech devices that are affected - the original vulnerability from 2016 can grab control of keyboards and mice from other manufactures as well from HP, Lenovo, Dell and Microsoft. Devices utilizing the same hardware in the dongle are at risk.</p><p class=""><a href="https://support.logi.com/hc/en-us/community/posts/360032078393-Logitech-Response-to-Research-Findings" target="_blank">Logitech has provided a support page</a> containing links to update software to address the vulnerability.</p><p class="">As security is one of Red Clover Technologies’ primary concerns, we strongly encourage anyone with these devices to update the firmware on them as soon as possible. If you have questions, don’t hesitate to <a href="https://www.redclovertech.net/support">reach out to us</a>, and we’d be happy to help.</p>]]></content:encoded></item></channel></rss>