Recent Spear Phishing Attacks

Recently one of my corporate customers weathered an email spear phishing attack.  An administrative assistant received an email purportedly from the CEO, but the details were a bit off.  The assistant questioned a fact implicit in the email, that the CEO would have known.  The assistant called me to investigate, and investigate I did! It turns out the email only appeared to be from the CEO.  It actually was from a criminal masquerading as the CEO using a purposely similar email address.  Here is an example to illustrate this technique.  Suppose you normally email bill@microsoft.com.  One day...

read more

Dok Malware Targets Mac OS X

 

read more

How to troubleshoot problems that occur when you start or use Word

Troubleshoot problems in Microsoft Word  

read more

How to Create an Enclave Support Ticket

    This brief video shows how to create an Enclave support ticket. You can pause the video at any time so you can work along with it. Steps to create an Enclave support ticket #1 Open a web browser (Chrome or Firefox recommended) and navigate to https://support.enclave365.net #2 Sign in to the support website using your Enclave support credentials. #3 Click either the OPEN A TICKET button or the “click here to submit your first ticket” hot spot. #4 Enter a subject for this ticket #5 Select a support topic from the Product dropdown list. #6 Enter details into the Description...

read more

How to Enable SSL for a Virtualmin Virtual Server

It nearly drove me nuts the first time I tried to enable SSL on a Virtualmin virtual server.  This topic comes up nine or ten times a year, so I thought I’d make a how-to on this topic. #1  Enable SSL for your virtual server. #2  Edit the associated sites-available conf file.  Replace the asterisk with the actual IP address of your server.  Mine has an internal, private IP address.  You need to change that “Any” to the actual IP address used by your server. I like to use vi at the command line.  This screenshot shows the associated conf file that must be edited. Change the...

read more

Threat to CityWest Customers – Fake Survey

I have contacted CityWest about a survey – supposedly from CityWest – that pops up from time to time on my various computers and devices when connected to CityWest Internet. It is a fake survey and will try to get you to give them your banking or credit card info. Have a look at the screenshot below. It turns out qudsurvey.com is operating out of the Grand Cayman islands.  Definitely not legit. — Dennis Strain Enclave Managed Networks Box 365, Smithers, BC, Canada V0J 2N0 1-877-877-8793 toll-free phone & fax 1-250-847-2589 office...

read more

View Outlook 2016 Calendars in Overlay or Side By Side

The default Calendar view in Outlook 2016 is side by side.  This means as you add calendars to your view, each calendar is shrunk enough so that all calendars can be seen.  It may be more useful to use overlay rather than side by side. In Outlook Calendar: #1  Enable each calendar you wish to view. #2  Select View from the menu bar. #3  Click OVERLAY, which can be found in the arrangement group. Now each selected calendar is viewed together in one view.  These calendars are, in fact, still seperate; only the way you view them has changed.  The link below shows some great screenshots to help...

read more

BCEnclave Twitter Feed

Click the Read More button to view the most recent entries to my Twitter feed. Tweets by BCEnclave

read more

Flipboard – Internet of Things

read more

Flipboard – Internet Safety

read more

Flipboard – Web Browsers

 

read more

Flipboard – Microsoft Office 365

 

read more

Flipboard – Max OS X

read more

Flipboard – Malware

 

read more

Flipboard – Windows

 

read more

Offline Virus & Malware Scanning

Obviously I would like you to hire me to perform this kind of task, but for those do-it-yourselfers out there this article gives a brief introduction to offline security scans. Sometimes the antivirus and anti-malware software you use on a daily basis isn’t enough.  This includes ALL such protection software.  Don’t listen to the salesmen or enthusiasts of one product or another; no security product is 100% effective.  Offline scans can help find and remove pernicious and persistent malicious code from your computer. For the sake of this blog post I will say “security...

read more

June 2016 Ransomware Attacks against MS Office 365 Users

This June saw the first ever large scale ransomware attack against users of MS Office 365.  A ransomware attack is where the bad guys gain access to your computer, then use that access to encrypt your business data and program files.  They then charge you money to buy a decryption key.  Your files will be permanently locked away if you don’t pay within a specified period of time.  And the cost goes up each day until you pay, or until their “offer” expires! Fortunately Enclave customers were not hit, and Microsoft moved very quickly to shut down the threat, but it’s more important than ever...

read more

2015 12 14 Fix to Avoid Forced Upgrade to Windows 10

An unfortunate reality of today’s computing world is we must protect ourselves even from major, world-wide software vendors such as Microsoft, Sun, Adobe, etc. I’m picking on these three just now, but they only represent the overall problem. A problem that is wide spread and the bane of all computer technicians and system administrators. A case in point is the push by Microsoft to force people to upgrade from Windows versions 7 and 8.x to Windows 10. Microsoft is doing everything physically possible to force people to upgrade to Windows 10. I get it. They don’t want to...

read more

2015 03 26 Microsoft does not distribute security updates via email

Today I received the Microsoft Security Advisory Notification shown below in its entirety.   I felt this deserved some special attention.  Read the following excerpt from the advisory: “If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.” Microsoft has issued this statement because a great many people are being tricked into executing malicious attachments sent to them in bogus emails from Microsoft. The results...

read more

From Antivirus to Threats

By Dennis Strain © March 2015  You might ask yourself “do I need antivirus?”  “I never had antivirus before and everything is ok,” you might say. Well, let’s talk about it. This is how Wikipedia defines a computer virus:  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be “infected”. *1   That’s a pretty good definition, and...

read more