<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>F5 Solutions</title>
	<atom:link href="https://f5solutions.com.au/feed/" rel="self" type="application/rss+xml" />
	<link>https://f5solutions.com.au</link>
	<description>IT Services and Support - Richmond, Windsor, Sydney</description>
	<lastBuildDate>Tue, 05 Nov 2019 01:59:49 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.3</generator>

<image>
	<url>https://f5solutions.com.au/wp-content/uploads/2019/08/cropped-WPfav-2-32x32.png</url>
	<title>F5 Solutions</title>
	<link>https://f5solutions.com.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>KRACK Attack &#8211; WPA2 Wi-Fi Vulnerability: Why You Should Be Concerned</title>
		<link>https://f5solutions.com.au/security/krack-attack-wpa2-wi-fi-vulnerability-why-you-should-be-concerned/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 17 Oct 2017 00:37:14 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://f5solutions.com.au/newsite/?p=1085</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/krack-attack-wpa2-wi-fi-vulnerability-why-you-should-be-concerned/">KRACK Attack &#8211; WPA2 Wi-Fi Vulnerability: Why You Should Be Concerned</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_0 et_pb_with_background et_section_regular" >
				
				
				
				
					<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_post_title et_pb_post_title_0 et_pb_bg_layout_light  et_pb_text_align_left"   >
				
				
				
				<div class="et_pb_title_container">
					<h1 class="entry-title">KRACK Attack &#8211; WPA2 Wi-Fi Vulnerability: Why You Should Be Concerned</h1>
				</div>
				
			</div><div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><div class="itemIntroText">
<p>You probably haven&#8217;t been able to avoid hearing about the<span> </span><a href="https://www.krackattacks.com/">KRACK Attack</a><span> </span>vulnerability, but here is why you should be paying attention to this particular issue.</p>
<p>KRACK is a proof-of concept (PoC) attack which works on modern wi-fi networks: WPA1 &amp; WPA2, Personal and Enterprise networks, and ciphers WPA-TKIP, AES-CCMP and GCMP.<span> </span><br />The attack can be used to steal personal and sensitive information such as passwords, messages, credit card numbers, emails, photos and more.</p>
<p>Released 13 years ago, WPA2 is the standard security protocol that is used worldwide and just about every single wi-fi enabled device in homes and businesses use this WPA (Wi-Fi Protected Access) protocol.</p>
</div>
<div class="itemFullText">
<p>Computers, routers, phones, and particularly all of the IoT devices that we have grown to depend on and adopt as quickly as they are released, are all at risk of this attack.</p>
<p>Via their proof-of-concept video below, researchers were able to successfully launch the attack on an Android phone, demonstrating how the attacker can decrypt any data that is transmitted over protected wi-fi, by the victim.</p>
</div></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/52376574_s.jpg" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/52376574_s.jpg 450w, https://f5solutions.com.au/wp-content/uploads/2019/08/52376574_s-300x180.jpg 300w" sizes="(max-width: 450px) 100vw, 450px" class="wp-image-1088" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_video et_pb_video_0">
				
				
				<div class="et_pb_video_box"><iframe title="KRACK Attacks: Bypassing WPA2 against Android and Linux" width="1080" height="608" src="https://www.youtube.com/embed/Oh4WURZoR98?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div>
				
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>KRACK (Key Reinstallation Attacks) was discovered by Mathy Vanhoef, of imec-DistriNet, KU Leuven, by accident whilst he was working on an unrelated security paper.<span> </span><a href="https://www.krackattacks.com/">Further investigation</a><span> </span>revealed that the attack works by<span> </span><a href="https://thehackernews.com/2017/10/wpa2-krack-wifi-hacking.html">exploiting a 4-way handshake of the WPA2 protocol</a><span> </span>which lets new devices that have a pre-shared password, join the network.</p>
<p>Once an attacker establishes a man-in-the-middle position between the client and the access point, they can then<span> </span><a href="http://www.kb.cert.org/vuls/id/228519">&#8220;selectively manipulate the timing and transmission of messages in the WPA2 Four-way, Group Key, Fast Basic Service Set (BSS) Transition, PeerKey, Tunneled Direct-Link Setup (TDLS) PeerKey (TPK), or Wireless Network Management (WNM) Sleep Mode handshakes, resulting in out-of-sequence reception or retransmission of messages.&#8221;</a></p>
<p>In easier to understand terms, the victim is tricked into reinstalling a key that is already in use and the attacker does this by manipulating the handshake and then replaying it.<span> </span><br /> After getting inside your network, the attacker can then listen in on all of your network traffic and although the attacker does need to be within physical proximity to the device or wi-fi network, public wi-fi hotspots are everywhere with many people using them in their day-to-day travels, so there is still some cause for alarm.</p>
<p>Because the vulnerabilities are in the Wi-Fi standard itself and not the actual device, if your WPA2 is set up correctly it is still affected.</p>
<p>Any device that uses wi-fi is at risk, so taking stock of all of your wi-fi connected &#8216;things&#8217; is a good idea. Vendors of IoT devices don&#8217;t often release updates or security patches, so these are the devices you need to be particularly wary of on your network.<br /> Changing passwords will not make the device secure, so it is up to these vendors to provide patches for their devices and up to you to make sure that patch is applied as soon as it is available.</p>
<p>It is also being advised that use of a secure VPN whilst browsing the internet to encrypt all of your traffic is a good idea. Visiting HTTPS only websites may also be safer as (at this stage) this traffic can&#8217;t be decrypted using this attack.</p>
<p>At this stage, it is unknown as to whether attackers have been/are currently exploiting this in the wild, but as with every proof-of-concept that gets released, there is a risk of would-be attackers taking it upon themselves to test and utilise this exploit.</p>
<h3>What you need to do</h3>
<p>Update/patch the firmware for your router/modem and access points as soon as a patch is available.<span> </span><br /> Make sure updates/patches are also applied to any of your IoT devices (Home assistants, amplifiers, sound bars, stereo equipment, kettles, aircon, etc) as well as tablets and phones.<span> </span><br /> Update/patch any devices with wi-fi capabilities: printers, faxes, switches, computers, particularly laptops &#8211; make sure the firmware has been updated as well as your operating system.</p>
<p>A list of currently known vendors who have products affected by this vulnerability, can be found<span> </span><a href="http://www.kb.cert.org/vuls/byvendor?searchview&amp;Query=FIELD+Reference=228519&amp;SearchOrder=4">here</a>.<br /> If your vendor hasn&#8217;t released an update for your device as yet, continue to check for it or visit the vendors website for more information.</p>
<p>&nbsp;</p>
<h3>Patches that have been released by vendors thus far:</h3>
<ul>
<li><strong>Apple</strong>: iOS, macOS, watchOS and tvOS patches are currently in beta stage and are to be released via software updates over the coming weeks</li>
<li><strong>Arch Linux</strong>: Patches for <a href="https://git.archlinux.org/svntogit/packages.git/commit/trunk?h=packages/wpa_supplicant&amp;id=9c1bda00a846ff3b60e7c4b4f60b28ff4a8f7768">WPA Supplicant</a> and <a href="https://git.archlinux.org/svntogit/community.git/commit/trunk?h=packages/hostapd&amp;id=d31735a09b4c25eaa69fb13b1031910ca3c29ee5">Hostapad</a><span> </span>are available<strong><a href="http://www.support.arubanetworks.com/"></a></strong></li>
<li><strong><a href="http://www.support.arubanetworks.com/">Aruba</a></strong>: Patches are available for ArubaOS, Aruba Instant, Clarity Engine and others<strong></strong></li>
<li><strong><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa">Cisco</a></strong>: Many of the Cisco devices are affected but at this stage only some patches are available, pending further investigation<strong></strong></li>
<li><strong><a href="http://svn.dd-wrt.com/changeset/33525">DD-WRT</a></strong>: Flashrouter patch available<strong></strong></li>
<li><strong><a href="https://www.debian.org/security/2017/dsa-3999">Debian/Ubuntu (Linux)</a></strong><strong></strong></li>
<li><strong><a href="http://espressif.com/en/media_overview/news/espressif-releases-patches-wifi-vulnerabilities-cert-vu228519?position=0&amp;list=W1-rtfr4C9e1Vhf5JEhY_1EPZ-Dag7NT6M7sJEphvS0">Espressif Systems</a></strong>: Patches have been released for ESP-IF and ESP8266 versions<strong></strong></li>
<li><strong><a href="https://bodhi.fedoraproject.org/updates/FEDORA-2017-12e76e8364">Fedora</a></strong></li>
<li><strong>Fortinet</strong>: Firmware updates are expected</li>
<li><strong>Google</strong>: Any affected devices will be patched over the coming weeks<strong></strong></li>
<li><strong><a href="https://w1.fi/security/2017-1/">HostAP</a></strong>: Several patches are available<strong></strong></li>
<li><strong><a href="https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&amp;languageid=en-fr">Intel</a></strong>: Updated wi-fi drivers and patches for chipsets that are affected have been listed<strong></strong></li>
<li><strong><a href="https://review.lineageos.org/#/q/topic:krack-n">LineageOS</a></strong><strong></strong></li>
<li><strong><a href="https://w1.fi/security/2017-1/">Linux</a></strong>: Patch is available (OpenBSD was previously fixed in July)</li>
<li><strong>Microsoft</strong>: Security update was released via automatic updates on October 10, 2017<strong></strong></li>
<li><strong><a href="http://www.microchip.com/design-centers/wireless-connectivity/embedded-wi-fi/wpa2-protocol-vulnerability">Microchip Technology</a></strong><strong></strong></li>
<li><strong><a href="https://forum.mikrotik.com/viewtopic.php?f=21&amp;t=126695">MikroTik</a></strong><strong></strong></li>
<li><strong>Netgear</strong>:<span> </span><a href="https://kb.netgear.com/000049353/WAC120-Firmware-Version-2-1-5">WAC120</a>,<span> </span><a href="https://kb.netgear.com/000049065/WAC505-WAC510-Firmware-Version-1-5-3-7">WAC505/WAC510</a>,<span> </span><a href="https://kb.netgear.com/000049001/WAC720-WAC730-Firmware-Version-3-7-12-0">WAC720/730</a>,<span> </span><a href="https://kb.netgear.com/000049352/WN604-Firmware-Version-3-3-8">WN604</a>,<span> </span><a href="https://kb.netgear.com/000049348/WNAP210v2-Firmware-Version-3-7-7-0">WNAP210v2</a>,<span> </span><a href="https://kb.netgear.com/000049349/WNAP320-Firmware-Version-3-7-7-0">WNAP320</a>,<span> </span><a href="https://kb.netgear.com/000049346/WNDAP350-Firmware-Version-3-7-7-0">WNDAP350</a>,<span> </span><a href="https://kb.netgear.com/000049350/WNDAP620-Firmware-Version-2-1-4">WNDAP620</a>,<span> </span><a href="https://kb.netgear.com/000049345/WNDAP660-Firmware-Version-3-7-7-0">WNDAP660</a>,<span> </span><a href="https://kb.netgear.com/000049351/WND930-Firmware-Version-2-1-3">WND930</a><strong></strong></li>
<li><strong><a href="https://marc.info/?l=openbsd-announce&amp;m=148839684520133&amp;w=2">OpenBSD</a></strong><strong></strong></li>
<li><strong><a href="https://community.ubnt.com/t5/UniFi-Updates-Blog/FIRMWARE-3-9-3-7537-for-UAP-USW-has-been-released/ba-p/2099365">Ubiqiuti</a></strong><strong></strong></li>
<li><strong><a href="https://usn.ubuntu.com/usn/usn-3455-1/">Ubuntu</a></strong><strong></strong></li>
<li><strong><a href="https://www.watchguard.com/wgrd-blog/wpa-and-wpa2-vulnerabilities-update">WatchGuard</a></strong></li>
</ul></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_nav_0 et_pb_posts_nav nav-single">
								<span class="nav-previous"
									>
					<a href="https://f5solutions.com.au/general/10-it-technology-myths/" rel="prev">
												<span class="meta-nav">&larr; </span><span class="nav-label">10 IT &amp; Technology Myths</span>
					</a>
				</span>
			
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --><div class="et_pb_section et_pb_section_2 et_pb_with_background et_section_regular section_has_divider et_pb_top_divider" >
				<div class="et_pb_top_inside_divider et-no-transition"></div>
				
				
				
					<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_0  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap"><img loading="lazy" width="202" height="76" src="https://f5solutions.com.au/wp-content/uploads/2019/08/2014-Logo-long-thin-white-on-black-PNG-a.png" alt="" class="et-waypoint et_pb_animation_top wp-image-1320" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>F5 Solutions has been providing refreshing IT support for small-to-medium sized businesses since 2011. Our collective experience and industry service began as early as 1999.<br /> We deliver IT support and services in Richmond, Windsor, Hawkesbury, Blue Mountains, and the Greater Sydney area. We also service customers with branches Australia-wide.</p></div>
					</div>
				</div> <!-- .et_pb_blurb_content -->
			</div> <!-- .et_pb_blurb -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span size="4" style="font-size: large;"><b>More Information</b></span></p>
<p><a href="https://f5solutions.com.au/about-us/">About Us</a><br /> <a href="https://f5solutions.com.au/testimonials/">Testimonials</a><br /> <a href="https://f5solutions.com.au/resources/">Resources</a><br /> <a href="https://f5solutions.com.au/blog/">Blog</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Services Links</strong></span></p>
<p><a href="https://f5solutions.com.au/managed-services/">Managed Services</a><br /> <a href="https://f5solutions.com.au/business-cloud-services/">Business Cloud Services</a><br /> <a href="https://f5solutions.com.au/it-security/">IT Security Management</a><br /> <a href="https://f5solutions.com.au/network-solutions/">Computer Network Solutions</a><br /> <a href="https://f5solutions.com.au/it-support/">IT Support</a><br /> <a href="https://f5solutions.com.au/backup-data-recovery/">Managed Backup &amp; Disaster Recovery</a><br /> <a href="https://f5solutions.com.au/it-consulting/">IT Consulting Services</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Contact Info</strong></span></p>
<p>PO BOX 56 Kurrajong NSW 2758<br /> PH: <a href="tel:+61245722206">02 4572 2206</a><br /> Email: <a href="mailto:hello@f5solutions.com.au">hello@f5solutions.com.au</a><br /> Office Hours: Mon-Fri, 8AM-6PM<br /> (After Hours by Appointment)</p>
<p><a href="https://f5solutions.com.au/contact-us/"><span style="font-size: large;">Send Us A Message</span></a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_cta_0 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				<div class="et_pb_promo_description et_multi_view_hidden"></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_custom_button_icon et_pb_promo_button" href="https://f5solutions.com.au/contact-us/" data-icon="&#x35;">Book Your Free Onsite Review</a></div>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<ul class="et_pb_module et_pb_social_media_follow et_pb_social_media_follow_0 clearfix  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<li
            class='et_pb_social_media_follow_network_0 et_pb_social_icon et_pb_social_network_link  et-social-facebook et_pb_social_media_follow_network_0'><a
              href='https://www.facebook.com/F5SolutionsPtyLimited/'
              class='icon et_pb_with_border'
              title='Follow on Facebook'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_1 et_pb_social_icon et_pb_social_network_link  et-social-twitter et_pb_social_media_follow_network_1'><a
              href='https://twitter.com/F5SolutionsAU'
              class='icon et_pb_with_border'
              title='Follow on Twitter'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_2 et_pb_social_icon et_pb_social_network_link  et-social-linkedin et_pb_social_media_follow_network_2'><a
              href='https://www.linkedin.com/company/f5-solutions-pty.-limited'
              class='icon et_pb_with_border'
              title='Follow on LinkedIn'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_3 et_pb_social_icon et_pb_social_network_link  et-social-instagram et_pb_social_media_follow_network_3'><a
              href='https://www.instagram.com/f5solutions/'
              class='icon et_pb_with_border'
              title='Follow on Instagram'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li>
			</ul> <!-- .et_pb_counters -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>© 2021 F5 Solutions Pty. Limited   ABN 89 153 991 765</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><a href="https://f5solutions.com.au/faq/">FAQ</a> | <a href="https://f5solutions.com.au/privacy-terms-conditions/">Privacy, Terms &amp; Conditions </a>| <a href="https://f5solutions.com.au/sitemap_index.xml" target="_blank" rel="noopener noreferrer">Site Map</a> | <a href="https://f5solutions.com.au/website-disclaimer/">Website Disclaimer</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/krack-attack-wpa2-wi-fi-vulnerability-why-you-should-be-concerned/">KRACK Attack &#8211; WPA2 Wi-Fi Vulnerability: Why You Should Be Concerned</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>10 IT &#038; Technology Myths</title>
		<link>https://f5solutions.com.au/general/10-it-technology-myths/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 02 Aug 2017 20:10:51 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://f5solutions.com.au/newsite/?p=1070</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://f5solutions.com.au/general/10-it-technology-myths/">10 IT &#038; Technology Myths</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_pb_with_background et_section_regular" >
				
				
				
				
					<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_title et_pb_post_title_1 et_pb_bg_layout_light  et_pb_text_align_left"   >
				
				
				
				<div class="et_pb_title_container">
					<h1 class="entry-title">10 IT &#038; Technology Myths</h1>
				</div>
				
			</div><div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/14657049_s.jpg" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/14657049_s.jpg 450w, https://f5solutions.com.au/wp-content/uploads/2019/08/14657049_s-300x287.jpg 300w" sizes="(max-width: 450px) 100vw, 450px" class="wp-image-1073" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>In the IT industry, we hear some interesting (and more often than not, entirely untrue misconceptions) from our customers, and like many others have done before us, we thought it might be fun to visit some of these myths and explain the untruths behind them (in no particular order):</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium;"><strong><span style="color: #066da0;">1. BitTorrent is illegal</span></strong></span></h3>
<div class="itemIntroText">
<p>Because<span> </span><a href="http://www.bittorrent.com/">BitTorrent</a><span> </span>is frequently associated with the illegal downloading of TV shows, movies and music, it is easy to understand why most people believe that it is illegal. It&#8217;s not.</p>
<p>BitTorrent is a communication protocol that was designed in April 2001 by an American programmer, Bram Cohen. The protocol was released in July 2001 and is used for peer-to-peer file sharing (P2P).</p>
</div>
<div class="itemFullText">
<p>Instead of connecting to one single source to download data and electronic files, BitTorrent lets a user connect to a &#8220;swarm&#8221; of hosts that are uploading and downloading from each other at the same time. </p>
</div></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_3 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/not-a-crime_opt.png" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/not-a-crime_opt.png 590w, https://f5solutions.com.au/wp-content/uploads/2019/08/not-a-crime_opt-480x255.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 590px, 100vw" class="wp-image-1204" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>Users then act as both &#8220;seeds&#8221; and &#8220;leechers&#8221; &#8211; seeds send pieces of the file out and leechers take those pieces. This enables a fast and continuous/uninterrupted download of data.</p>
<p>A BitTorrent client is needed to assemble those pieces back together, and this client searches for and monitors each piece and determines what it has and what it needs to complete a file, but the BitTorrent client doesn&#8217;t actually hold any data itself. The BitTorrent protocol is also used by software companies to distribute patches and data for games, as it is faster and reduces server loads while increasing availability.</p>
<p>The use of the BitTorrent protocol is only illegal when it&#8217;s used to download copyright infringing work such as movies, TV shows and music as well as any other digital work protected by the copyright infringement act.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium;"><strong><span style="color: #066da0;">2. Data is less secure in the Cloud</span></strong></span></h3>
<p>This is another common misconception, probably brought about due to numerous data breaches that have been publicised over the last few years. Any data that can be accessed from outside of a business or a cloud environment has the same chances of being hacked, if the opportunity to do so exists.</p>
<p>The truth is that on-premise data is more at risk of theft and corruption than data in the cloud. In an on-premise environment, data is exposed to real people, every day. Being located on-site means that a lack of physical security (locked, secure communications rooms as well as secure site entrances) can allow anyone direct access to your data; disgruntled employees, employes without restricted data access as well as on-site service providers.</p>
<p>Research has shown that more on-premise user data has suffered from data security incidents than cloud data service providers. Cloud data is harder to gain access to, and cloud service providers must adhere to strict data security standards and therefore tend to provide a far more secure environment in order to maintain their reputation, especially if their core business is selling cloud hosting services.</p>
<p>This doesn&#8217;t make a cloud environment bullet-proof but it does significantly reduce the risk that on-premise data faces.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium;"><strong><span style="color: #066da0;">3. Incognito browsing makes you invisible/anonymous</span></strong></span></h3>
<p>Sorry, but no. It doesn&#8217;t. Going incognito, as most browsers will tell you when you open up that window, does not hide your browsing from your employer, your ISP or the websites that you may visit.</p>
<p>Browsing in incognito mode will not record the browser history, store cookies or any search history accumulated whilst using incognito but any bookmarks you create and any files that you download will be kept. (Google Chrome used to remind us that your browsing habits are also not protected from the person standing behind you.)<span> </span><br /> Local privacy is the only privacy that incognito actually affects and your online privacy remains the same as if you were browsing normally.</p>
<p>&nbsp;</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_3">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/incog.png" alt="" title="" height="auto" width="auto" class="wp-image-1075" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_20  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>Incognito is handy if you share a computer or device with another person. You can do your gift shopping in secret and it&#8217;s also effective and safer to use for any bank transactions or conversations that you don&#8217;t want to leave traces of on your PC.</p>
<p>So can you actually make your browsing private? You can take measures to make it more private, but there is no true 100% privacy option available. A VPN can be used to mask your IP address and your physical location and TOR, an open source browser, works like VPN does but as a browser.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_21  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium;"><strong><span style="color: #066da0;">4. Antivirus will protect me from&#8230;</span></strong></span></h3>
<p>Everything? No, not even close. Most antivirus software will protect you from viruses, trojans, worms and some malware, but they are only as good as their last update.</p>
<p>In a perfect world, an antivirus solution would protect from every one of these threats but because new variants are released every single day, it takes time for an AV provider to update their engines and provide protection from newly developed threats.</p>
<p>Often it&#8217;s necessary to use both an antivirus as well as an anti-malware software, and if you want to get as close as possible to being safe from &#8216;everything&#8217;, a firewall should be considered first and foremost in your line of defense.</p>
<p>Lastly, nothing can protect you from yourself or other local users because unfortunately, humans are the greatest risk element of all.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_22  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium;"><strong><span style="color: #066da0;">5. USB connected devices should be dismounted before removing them</span></strong></span></h3>
<p>This one is interesting because there are two sides to this myth: those who say you should dismount them first and those who swear that it doesn&#8217;t matter.</p>
<p>In a Windows OS environment, the write cache feature is disabled for drives that the OS believes are removable. There is an option to turn this on or off, found under Device Manager &gt; Disk Drives &gt; Drive Name &gt; Properties &gt; Policies. Turning this off enables write caching but you have to then always use the &#8216;Safely Remove Hardware&#8217; notification icon in order to disconnect the device safely.<span> </span><br />Having write caching on provides better performance of the device.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_16">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_23  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>The problem with the default &#8216;Quick Removal&#8217; setting is that it won&#8217;t prevent drive errors from occurring after time, which is something that we see often and you can&#8217;t always be certain that your USB device is not in use. Obviously if data is being written to the device, data corruption may occur upon removal.</p>
<p>As a precaution, we always recommend users to manually eject their USB drives before removal but feel free to live dangerously.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_24  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_4">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/usb.png" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/usb.png 330w, https://f5solutions.com.au/wp-content/uploads/2019/08/usb-300x84.png 300w" sizes="(max-width: 330px) 100vw, 330px" class="wp-image-1076" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_17">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_25  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium;"><strong><span style="color: #066da0;">6. WWW is the same thing as the Internet</span></strong></span></h3>
<p>Many people believe that the Internet and the World Wide Web is the same thing, and they could be forgiven for it because we use the term &#8216;Internet&#8217; as a generalisation for just about everything &#8216;online&#8217;.</p>
<p>The World Wide Web (www) is how we access information over the internet. It uses the HTTP protocol to transmit data and web services that use HTTP to allow apps to communicate, use the World Wide Web to share information. Browsers are used to access websites which are web pages linked to each other by hyperlinks (http:// or https://).</p>
<p>The Internet is essentially a great big network of networks or rather, a network infrastructure. It globally connects millions of devices together to form a network where any internet device can communicate with another internet connected device. Information data is transferred across the internet by various traffic protocols such as SMTP (email), FTP (file transfer protocol) and IM (instant messaging).</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_18">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_26  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: medium;"><strong><span style="color: #066da0;">7. Common sense is as good as having antivirus software</span></strong></span></p>
<p>The problem with common sense is that it&#8217;s really not that common.</p>
<p>Knowing what not to click, what sites you shouldn&#8217;t visit and what files you shouldn&#8217;t download is not common knowledge. The savviest and most sensible users can be tricked by fraudsters, from emails that look legit and websites that appear to be the real deal, many a smart user has been tricked into visiting or downloading something they did not want to.</p>
<p>We live in a world of phishing, data mining and attackers who simply want something we have in order to get something they want for free and you would be a fool to think otherwise. Antivirus, anti-malware and firewalls are designed to be additional layers of protection so that if and when you do make that mistake, you can (hopefully) be saved from it or at the very least, minimise the damage.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_27  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_5">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/sense.png" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/sense.png 300w, https://f5solutions.com.au/wp-content/uploads/2019/08/sense-286x300.png 286w" sizes="(max-width: 300px) 100vw, 300px" class="wp-image-1077" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_19">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_28  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_18  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium;"><strong><span style="color: #066da0;">8. Macs don&#8217;t get viruses</span></strong></span></h3>
<p>This one is a favourite and it&#8217;s a great talking point for both Mac enthusiasts and Windows users alike.</p>
<p>The reason for this misconception is that for many years it has been far more profitable for attackers to target Windows devices because there are more of them. This means that the likelihood of a successful malware or viral campaign is far greater and an attacker will reap more of the reward (money) that they are after.<span> </span><br />Macs have always been vulnerable to malwares and viruses, but because viruses designed for Windows can&#8217;t be deployed on Macs, attackers choose to take the easy route and target the larger group of users.</p>
<p>Now that Mac users are on the rise, we are seeing more Mac targeted malware and viruses released into the wild.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_20">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_29  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_19  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium;"><strong><span style="color: #066da0;">9. Hacking is illegal</span></strong></span></h3>
<p>Seems legitimate, and for the most part hacking into a private computer system or systems is illegal. However there are plenty of people making a living hacking ethically and by ethical hacking, we mean &#8220;white hat&#8221; hackers whose job it is to seek out the bugs and vulnerabilities that allow &#8220;black hat&#8221; hackers to do their thing.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_21">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_30  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_20  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>Because hacking is depicted in movies and TV shows as being something that is done in a basement by shady looking &#8216;guys&#8217; wearing balaclavas, most people assume that the word &#8216;hack&#8217; only refers to nefarious deeds done in the dark, on PCs lit up with lines of green code. The truth is most hacking is done on websites and applications, by both male and female, and takes hours and hours, and copious amounts of coffee.</p>
<p>Many technology companies such as Google, Microsoft and Facebook actually offer bounties to hackers for finding these flaws in their code, which inevitably makes their users much safer. So feel free to go and learn because you can do a lot of good in this world with some well honed hacking skills.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_31  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_6">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/38346225_s.jpg" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/38346225_s.jpg 450w, https://f5solutions.com.au/wp-content/uploads/2019/08/38346225_s-300x200.jpg 300w" sizes="(max-width: 450px) 100vw, 450px" class="wp-image-1078" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_22">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_32  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_21  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><h3><span style="font-size: medium; color: #066da0;"><strong>10. My PC is slow, it must have a virus</strong></span></h3>
<p>This seems like a reasonable assessment but you&#8217;re probably wrong. If you&#8217;ve done the scans without getting a result and are still convinced you have a virus, taking a look at your PC&#8217;s overall health is a good idea.</p>
<p>PCs get slower simply because we use them. Everything you do, both locally on your machine and online, is cached somewhere in your PCs memory. Combine this with all of the programs you have installed, big or small, your browser extensions (which you really do not need especially if it&#8217;s one of those free ones that came bundled with something else) and plugins and the fact that your PC just might not have enough memory (RAM) to cope with the 1001 tasks you&#8217;ve asked it perform all at the same time, no wonder your PC is slow!</p>
<p>Hard drive failure can also cause a drop in speed, because they have moving parts they are built to eventually fail. Not having enough space on your drive will also slow things down. Having too many tabs open in your browser can also hog memory and any programs running in the background (like virus scans) may be contributing to your PC&#8217;s lack of speed.</p>
<p>Sometimes all that&#8217;s needed is a restart &#8211; this is where the old &#8216;Have you tried turning it off and on again?&#8217; comes from because doing this flushes out the system and starts everything up fresh.</p>
<p>There are many more IT myths out there so remember to check out the facts before believing anything is true.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_23">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_33  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_nav_1 et_pb_posts_nav nav-single">
								<span class="nav-previous"
									>
					<a href="https://f5solutions.com.au/security/why-hackers-dont-need-computers-to-get-in/" rel="prev">
												<span class="meta-nav">&larr; </span><span class="nav-label">Why Hackers Don&#039;t Need Computers To Get In</span>
					</a>
				</span>
							<span class="nav-next"
									>
					<a href="https://f5solutions.com.au/security/krack-attack-wpa2-wi-fi-vulnerability-why-you-should-be-concerned/" rel="next">
												<span class="nav-label">KRACK Attack - WPA2 Wi-Fi Vulnerability: Why You Should Be Concerned</span><span class="meta-nav"> &rarr;</span>
					</a>
				</span>
			
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --><div class="et_pb_section et_pb_section_5 et_pb_with_background et_section_regular section_has_divider et_pb_top_divider" >
				<div class="et_pb_top_inside_divider et-no-transition"></div>
				
				
				
					<div class="et_pb_row et_pb_row_24">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_34  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_1  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap"><img loading="lazy" width="202" height="76" src="https://f5solutions.com.au/wp-content/uploads/2019/08/2014-Logo-long-thin-white-on-black-PNG-a.png" alt="" class="et-waypoint et_pb_animation_top wp-image-1320" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>F5 Solutions has been providing refreshing IT support for small-to-medium sized businesses since 2011. Our collective experience and industry service began as early as 1999.<br /> We deliver IT support and services in Richmond, Windsor, Hawkesbury, Blue Mountains, and the Greater Sydney area. We also service customers with branches Australia-wide.</p></div>
					</div>
				</div> <!-- .et_pb_blurb_content -->
			</div> <!-- .et_pb_blurb -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_35  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_22  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span size="4" style="font-size: large;"><b>More Information</b></span></p>
<p><a href="https://f5solutions.com.au/about-us/">About Us</a><br /> <a href="https://f5solutions.com.au/testimonials/">Testimonials</a><br /> <a href="https://f5solutions.com.au/resources/">Resources</a><br /> <a href="https://f5solutions.com.au/blog/">Blog</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_36  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_23  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Services Links</strong></span></p>
<p><a href="https://f5solutions.com.au/managed-services/">Managed Services</a><br /> <a href="https://f5solutions.com.au/business-cloud-services/">Business Cloud Services</a><br /> <a href="https://f5solutions.com.au/it-security/">IT Security Management</a><br /> <a href="https://f5solutions.com.au/network-solutions/">Computer Network Solutions</a><br /> <a href="https://f5solutions.com.au/it-support/">IT Support</a><br /> <a href="https://f5solutions.com.au/backup-data-recovery/">Managed Backup &amp; Disaster Recovery</a><br /> <a href="https://f5solutions.com.au/it-consulting/">IT Consulting Services</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_37  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_24  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Contact Info</strong></span></p>
<p>PO BOX 56 Kurrajong NSW 2758<br /> PH: <a href="tel:+61245722206">02 4572 2206</a><br /> Email: <a href="mailto:hello@f5solutions.com.au">hello@f5solutions.com.au</a><br /> Office Hours: Mon-Fri, 8AM-6PM<br /> (After Hours by Appointment)</p>
<p><a href="https://f5solutions.com.au/contact-us/"><span style="font-size: large;">Send Us A Message</span></a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_25">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_38  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_cta_1 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				<div class="et_pb_promo_description et_multi_view_hidden"></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_custom_button_icon et_pb_promo_button" href="https://f5solutions.com.au/contact-us/" data-icon="&#x35;">Book Your Free Onsite Review</a></div>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_26">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_39  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<ul class="et_pb_module et_pb_social_media_follow et_pb_social_media_follow_1 clearfix  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<li
            class='et_pb_social_media_follow_network_4 et_pb_social_icon et_pb_social_network_link  et-social-facebook et_pb_social_media_follow_network_4'><a
              href='https://www.facebook.com/F5SolutionsPtyLimited/'
              class='icon et_pb_with_border'
              title='Follow on Facebook'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_5 et_pb_social_icon et_pb_social_network_link  et-social-twitter et_pb_social_media_follow_network_5'><a
              href='https://twitter.com/F5SolutionsAU'
              class='icon et_pb_with_border'
              title='Follow on Twitter'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_6 et_pb_social_icon et_pb_social_network_link  et-social-linkedin et_pb_social_media_follow_network_6'><a
              href='https://www.linkedin.com/company/f5-solutions-pty.-limited'
              class='icon et_pb_with_border'
              title='Follow on LinkedIn'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_7 et_pb_social_icon et_pb_social_network_link  et-social-instagram et_pb_social_media_follow_network_7'><a
              href='https://www.instagram.com/f5solutions/'
              class='icon et_pb_with_border'
              title='Follow on Instagram'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li>
			</ul> <!-- .et_pb_counters -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_27">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_40  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_25  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>© 2021 F5 Solutions Pty. Limited   ABN 89 153 991 765</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_41  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_26  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><a href="https://f5solutions.com.au/faq/">FAQ</a> | <a href="https://f5solutions.com.au/privacy-terms-conditions/">Privacy, Terms &amp; Conditions </a>| <a href="https://f5solutions.com.au/sitemap_index.xml" target="_blank" rel="noopener noreferrer">Site Map</a> | <a href="https://f5solutions.com.au/website-disclaimer/">Website Disclaimer</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>The post <a rel="nofollow" href="https://f5solutions.com.au/general/10-it-technology-myths/">10 IT &#038; Technology Myths</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Hackers Don&#8217;t Need Computers To Get In</title>
		<link>https://f5solutions.com.au/security/why-hackers-dont-need-computers-to-get-in/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 20 Jun 2017 01:50:04 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://f5solutions.com.au/newsite/?p=1063</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/why-hackers-dont-need-computers-to-get-in/">Why Hackers Don&#8217;t Need Computers To Get In</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_pb_with_background et_section_regular" >
				
				
				
				
					<div class="et_pb_row et_pb_row_28">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_42  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_post_title et_pb_post_title_2 et_pb_bg_layout_light  et_pb_text_align_left"   >
				
				
				
				<div class="et_pb_title_container">
					<h1 class="entry-title">Why Hackers Don&#8217;t Need Computers To Get In</h1>
				</div>
				
			</div><div class="et_pb_module et_pb_text et_pb_text_27  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>Hacker this, hacker that, virus, malware, blah, blah.</p>
<p>Sometimes (unless you work in this industry of course) we tend to tune out when talk of the latest hacking attempts, data breaches and malware is being splashed across the news and social media because we hear about it all the time.<span> </span><br />And there&#8217;s a good reason for that because with great technology comes great criminal danger. There will always be someone out there trying to exploit the newest tech to their advantage and personal.</p>
<p>Traditionally, hackers are often thought of as hoody-wearing or masked deviants, lurking in dark basements, fingers madly tapping away upon keyboards illuminated only by the eerie green glow of lines upon lines of code on the screen before them.<span> <br />This cliche is great for television but it&#8217;s pretty far from the truth (although yes, there are probably quite a few out there who enjoy wearing balaclavas in the dark).<br /></span></p>
<p><span>Hackers are just people after all. And they don&#8217;t need to hide or use a PC in order to infiltrate a computer or network.</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_43  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_7">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/27773284_s.jpg" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/27773284_s.jpg 450w, https://f5solutions.com.au/wp-content/uploads/2019/08/27773284_s-300x212.jpg 300w, https://f5solutions.com.au/wp-content/uploads/2019/08/27773284_s-400x284.jpg 400w" sizes="(max-width: 450px) 100vw, 450px" class="wp-image-1066" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_29">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_44  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_28  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>Hackers (or bad actors) can and will use all sorts of means to gain access to a device or a network; adware, malware, RATs (remote access trojans), that random usb drive you found (on the ground outside the office maybe), but a good hacker also knows how to use low-tech methods for hacking and these start with simple physical access rather than remote.</p>
<p>Best of breed hackers know how to pick locks. If they can<span> </span><a href="https://www.inverse.com/article/18829-computer-hackers-love-picking-locks">unlock the right door</a>, they can get to your data in person.<span> </span><br />They know how to fit in. That guy behind you in the suit with the serious face chatting steadily away on his phone obviously needs to be here, so you hold the door open for him after you&#8217;ve swiped your access card.<span> </span><br />The person who strolls in with a computer tucked under his arm says he&#8217;s the IT Guy so you nod and say sure, go right ahead.<br /><strong style="font-size: 14px;"><br />When was the last time you asked someone for their ID? And when was the last time you were asked for yours?</strong></p>
<p><span style="font-size: 14px;">Reading a report last night, on</span><span style="font-size: 14px;"> </span><a href="https://www.inc.com/will-yakowicz/hackers-use-e-cigarettes-whiskey.html?utm_content=buffer504f3&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer" style="font-size: 14px;">inc.com</a><span style="font-size: 14px;">, I was reminded of how stupidly simple it is for an unauthorised person to gain access to a building, even a secure one.</span><span style="font-size: 14px;"> </span></p>
<p>In the report, David Kennedy (founder of<span> </span><a href="https://www.trustedsec.com/">TrustedSec&#8221;</a><span> </span>and former cyber intelligence analyst), explained at Inc.&#8217;s<span> </span><a href="https://www.inc.com/iconic-live-stream.html?cid=so13007">Iconic Conference</a>, how he helps other companies find their security weaknesses.</p>
<p>He starts with the physical security and will literally try to break in and steal something. Alternatively, using a &#8220;piggybacking&#8221; method, he said he is quite often successful at following an employee through a security door and if that doesn&#8217;t work, he resorts to &#8220;MacGyver-style hacks&#8221;; blowing smoke or spitting whiskey through door cracks in order to trigger the motion sensors.<span> </span><br />He went on to explain that once access is gained, getting what he wants is as easy as telling an employee that he&#8217;s part of the IT department and needs to update their computer. As Kennedy said, &#8220;When hackers break into one individual, it&#8217;s the downfall of an entire company.&#8221;</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_30">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_45  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_8">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/11214844_s.jpg" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/11214844_s.jpg 450w, https://f5solutions.com.au/wp-content/uploads/2019/08/11214844_s-300x200.jpg 300w" sizes="(max-width: 450px) 100vw, 450px" class="wp-image-1067" /></span>
			</div>
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_46  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_29  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>When I read this, I&#8217;m not ashamed to admit that I was thrilled in a way and I think it&#8217;s because the simplicity of it is so beautiful.<span> </span><br />We are all so busy making sure we don&#8217;t open those email attachments or trying to make our passwords as hard as possible, that we&#8217;ve overlooked the basics of keeping a business secure. Locked doors only work when employees are educated on how to use them correctly.</p>
<p>In passing, I mentioned the topic of this blog post with a fellow employee and was startled to learn that he sees this kind of thing at customer sites all the time.<br />As recently as this week, my colleague was at a site where a new employee was manning a reception desk at a locked entry door. Although this person had never met my colleague, they buzzed him in without a second thought and didn&#8217;t ask any questions as he strolled past and made his way deeper into the building.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_31">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_47  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_30  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>He also recalled another time when he showed up at a new customer site, having not met anyone there face to face before. He informed the staff member that he was the computer guy (as most of us computer people casually do) and without being asked for any form of identification or questioned any further, was shown directly to the comms room.</p>
<p>This seemingly inconsequential kind of negligence highlights just how bloody easy it is for someone to not only gain physical access, but gain access to the heart of your business where your crucial data lives<span> </span><em>without using a computer</em>.<br />&#8220;When a hacker gets past one employee, the hacker spreads to the entire network.&#8221;<span> </span><a href="https://www.inc.com/will-yakowicz/hackers-use-e-cigarettes-whiskey.html?utm_content=buffer504f3&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer">Kennedy said.</a><span> </span>&#8220;People are the No. 1 target when it comes to how hackers get access to offices and computer systems.&#8221;</p>
<p>So whilst you are busy ensuring that your firewalls are impenetrable, your devices are armed with AV or anti-malware software and that your employees have been educated in art of not clicking, you need to make sure that your building is secure and remains that way.<span> </span><br />If someone outside of your organisation claims to be there for a service or a meeting and they are not familiar (and maybe even if they are), the question of identification should be raised. It takes two seconds to ask and could save thousands, if not millions of dollars in damage because once that damage is done, it&#8217;s too late.</p>
<p>Site security should be considered a core part of any employee induction, no matter who the employee (or the business) is. Combined with essential computer security basics, an employee can be a valuable part of your line of defence instead of your weakest link.</p>
<p>Ignorance will not prevent you from the theft of assets or business data and it certainly won&#8217;t save your job.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_32">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_48  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_nav_2 et_pb_posts_nav nav-single">
								<span class="nav-previous"
									>
					<a href="https://f5solutions.com.au/security/wanacrypt0r-will-make-you-wannacry/" rel="prev">
												<span class="meta-nav">&larr; </span><span class="nav-label">WanaCrypt0r - Will Make You WannaCry</span>
					</a>
				</span>
							<span class="nav-next"
									>
					<a href="https://f5solutions.com.au/general/10-it-technology-myths/" rel="next">
												<span class="nav-label">10 IT &amp; Technology Myths</span><span class="meta-nav"> &rarr;</span>
					</a>
				</span>
			
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --><div class="et_pb_section et_pb_section_8 et_pb_with_background et_section_regular section_has_divider et_pb_top_divider" >
				<div class="et_pb_top_inside_divider et-no-transition"></div>
				
				
				
					<div class="et_pb_row et_pb_row_33">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_49  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_2  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap"><img loading="lazy" width="202" height="76" src="https://f5solutions.com.au/wp-content/uploads/2019/08/2014-Logo-long-thin-white-on-black-PNG-a.png" alt="" class="et-waypoint et_pb_animation_top wp-image-1320" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>F5 Solutions has been providing refreshing IT support for small-to-medium sized businesses since 2011. Our collective experience and industry service began as early as 1999.<br /> We deliver IT support and services in Richmond, Windsor, Hawkesbury, Blue Mountains, and the Greater Sydney area. We also service customers with branches Australia-wide.</p></div>
					</div>
				</div> <!-- .et_pb_blurb_content -->
			</div> <!-- .et_pb_blurb -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_50  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_31  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span size="4" style="font-size: large;"><b>More Information</b></span></p>
<p><a href="https://f5solutions.com.au/about-us/">About Us</a><br /> <a href="https://f5solutions.com.au/testimonials/">Testimonials</a><br /> <a href="https://f5solutions.com.au/resources/">Resources</a><br /> <a href="https://f5solutions.com.au/blog/">Blog</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_51  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_32  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Services Links</strong></span></p>
<p><a href="https://f5solutions.com.au/managed-services/">Managed Services</a><br /> <a href="https://f5solutions.com.au/business-cloud-services/">Business Cloud Services</a><br /> <a href="https://f5solutions.com.au/it-security/">IT Security Management</a><br /> <a href="https://f5solutions.com.au/network-solutions/">Computer Network Solutions</a><br /> <a href="https://f5solutions.com.au/it-support/">IT Support</a><br /> <a href="https://f5solutions.com.au/backup-data-recovery/">Managed Backup &amp; Disaster Recovery</a><br /> <a href="https://f5solutions.com.au/it-consulting/">IT Consulting Services</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_52  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_33  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Contact Info</strong></span></p>
<p>PO BOX 56 Kurrajong NSW 2758<br /> PH: <a href="tel:+61245722206">02 4572 2206</a><br /> Email: <a href="mailto:hello@f5solutions.com.au">hello@f5solutions.com.au</a><br /> Office Hours: Mon-Fri, 8AM-6PM<br /> (After Hours by Appointment)</p>
<p><a href="https://f5solutions.com.au/contact-us/"><span style="font-size: large;">Send Us A Message</span></a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_34">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_53  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_cta_2 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				<div class="et_pb_promo_description et_multi_view_hidden"></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_custom_button_icon et_pb_promo_button" href="https://f5solutions.com.au/contact-us/" data-icon="&#x35;">Book Your Free Onsite Review</a></div>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_35">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_54  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<ul class="et_pb_module et_pb_social_media_follow et_pb_social_media_follow_2 clearfix  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<li
            class='et_pb_social_media_follow_network_8 et_pb_social_icon et_pb_social_network_link  et-social-facebook et_pb_social_media_follow_network_8'><a
              href='https://www.facebook.com/F5SolutionsPtyLimited/'
              class='icon et_pb_with_border'
              title='Follow on Facebook'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_9 et_pb_social_icon et_pb_social_network_link  et-social-twitter et_pb_social_media_follow_network_9'><a
              href='https://twitter.com/F5SolutionsAU'
              class='icon et_pb_with_border'
              title='Follow on Twitter'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_10 et_pb_social_icon et_pb_social_network_link  et-social-linkedin et_pb_social_media_follow_network_10'><a
              href='https://www.linkedin.com/company/f5-solutions-pty.-limited'
              class='icon et_pb_with_border'
              title='Follow on LinkedIn'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_11 et_pb_social_icon et_pb_social_network_link  et-social-instagram et_pb_social_media_follow_network_11'><a
              href='https://www.instagram.com/f5solutions/'
              class='icon et_pb_with_border'
              title='Follow on Instagram'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li>
			</ul> <!-- .et_pb_counters -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_36">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_55  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_34  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>© 2021 F5 Solutions Pty. Limited   ABN 89 153 991 765</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_56  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_35  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><a href="https://f5solutions.com.au/faq/">FAQ</a> | <a href="https://f5solutions.com.au/privacy-terms-conditions/">Privacy, Terms &amp; Conditions </a>| <a href="https://f5solutions.com.au/sitemap_index.xml" target="_blank" rel="noopener noreferrer">Site Map</a> | <a href="https://f5solutions.com.au/website-disclaimer/">Website Disclaimer</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/why-hackers-dont-need-computers-to-get-in/">Why Hackers Don&#8217;t Need Computers To Get In</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WanaCrypt0r &#8211; Will Make You WannaCry</title>
		<link>https://f5solutions.com.au/security/wanacrypt0r-will-make-you-wannacry/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 15 May 2017 06:28:25 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://f5solutions.com.au/newsite/?p=1058</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/wanacrypt0r-will-make-you-wannacry/">WanaCrypt0r &#8211; Will Make You WannaCry</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_pb_with_background et_section_regular" >
				
				
				
				
					<div class="et_pb_row et_pb_row_37">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_57  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_post_title et_pb_post_title_3 et_pb_bg_layout_light  et_pb_text_align_left"   >
				
				
				
				<div class="et_pb_title_container">
					<h1 class="entry-title">WanaCrypt0r &#8211; Will Make You WannaCry</h1>
				</div>
				
			</div><div class="et_pb_module et_pb_text et_pb_text_36  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><div class="itemIntroText">
<p><strong>WanaCrypt0r, WanaCrypt, Wcry or WannaCry</strong><span> </span>as it is more commonly known (because you know, if it gets you, you’re gonna wanna cry) has been making headline news around the world since Friday, 12th May 2017 and with very good reason. You’ve no doubt already heard plenty of chatter about this ransomware attack, so this post will be brief to get the information out to our customers and to those out there who may not be totally up to speed.</p>
<p><strong>What We Know</strong></p>
</div>
<div class="itemFullText">
<p>WannaCry is a fast spreading ransomware worm that spreads itself by using the ETERNABLUE SMB vulnerability. This vulnerability was made public in April 2017 by the hacker group,<span> </span><a href="https://en.wikipedia.org/wiki/The_Shadow_Brokers">ShadowBrokers</a>, who published several leaks containing some of the National Security Agency (NSA)’s hacking tools which included several zero-day exploits.</p>
<p>&nbsp;</p>
</div></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_58  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_9">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/Ransom.WannaCrypt2.1.png" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/Ransom.WannaCrypt2.1.png 816w, https://f5solutions.com.au/wp-content/uploads/2019/08/Ransom.WannaCrypt2.1-480x361.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 816px, 100vw" class="wp-image-1061" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_38">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_59  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_37  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>This ransomware targets computers running on unpatched or unsupported versions of Windows. Once a PC is infected, it then scans for all other vulnerable computers on the same network. In March of this year, Microsoft applied patches to its currently supported operating systems but due to the cessation of support for older operating systems such as Windows XP, many machines were left wide open to this exploit. Whilst ransomware is nothing new, this particular variant is outstanding due to the incredible speed that it spreads as well as the high profile targets it’s aimed at. It uses strong RSA-2048 encryption which makes it next to impossible to decrypt.</p>
<p>At the time of writing this, reports of over 250,000 computers across 150 countries have been affected. The victims have been hospitals, telecommunications, courier services as well as many others.<span> </span><br />In Australia, only a few instances have been reported however it’s still early and now that Monday is upon us, we are certain there will be a great deal more.<span> </span><br />The question has been raised as to why so many computers have fallen victim to this attack but the answer is simple: many organisations as well as users have not caught up with security updates and security practices. A great many number of PC’s in business environments as well as homes are not only still running an unsupported Microsoft operating system, (namely, Windows XP) but are not ensuring that Windows Updates are being applied.</p>
<p>We know that thanks to the quick thinking of a<span> </span><a href="https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html">MalwareTech</a><span> </span>researcher, this current wave of attacks by WannaCry were thwarted by the registering of a website domain (hidden in the malware) which brought the spread of the ransomware on a system to a halt. Registration of this website created a ‘sinkhole’ which redirected traffic from the infected computers to a self-controlled system. That said, the threat is far from over. WannaCry, as with other ransomware and malware, was spread in the usual ways long before this and will continue to do so in the future.</p>
<p>Now that the bad actors are aware of the flaw you can guarantee that they will be re-writing, re-working and re-deploying this ransomware as soon as possible.<span> </span><br />This means it’s time to suit up and protect your assets.</p>
<p>&nbsp;</p>
<p><strong>What You Need To Do</strong></p>
<p>If you aren’t already and still haven’t done so, make sure your PC’s are up-to-date. Don’t assume that they are or that you in particular are safe because believe it or not, ransomware does not discriminate.</p>
<p>If you are running Windows 10, you are generally safe as the particular vulnerability that WannaCry targets exists only in older version of Windows.<br />For users running Windows Vista, Windows 7 or Windows 8.1, if your PC has been regularly updated it will have already installed the update that contained the patch, back in March. Businesses running Windows Server 2008, 2008 R2, 2012, 2012 R2 or 2016 will have also received the patch.<br />If you aren’t sure or you know that your system is behind, you should update immediately. The patch that applies directly to this vulnerability is<span> </span><a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx">MS17-010</a>. Patches can be found at the bottom of the<span> </span><a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/">Customer Guidance for WannaCrypt Attacks</a><span> </span>post by Microsoft.</p>
<p>Educate your employees and yourself in the best practices for computer security. Knowing what not to click or open should form the basis of any staff training where the use of a computer is involved in a day-to-day job.</p>
<p>&nbsp;</p>
<p><strong>Is Up-To-Date Patching Enough?</strong></p>
<p>Patching only provides a &#8216;patch&#8217; over the ‘hole’ in the code of the operating system. WannaCry, as with any ransomware on the market, can still target you via a link or a download in an email or in a drive-by website visit.<span> </span><br />You should never rely on patches wholly and solely to provide security. At the very least, your PC should have a good, reputable antivirus program installed and where possible, a secondary malware detection program such as<span> </span><a href="https://www.malwarebytes.com/">MalwareBytes</a>.<span> </span><br />Businesses should have a secure, multi-function threat management firewall appliance, of course our firewall of choice and the only one we recommend to our customers, is a<span> </span><a href="https://www.watchguard.com/">WatchGuard</a><span> </span>device.</p>
<p>Businesses often feel that the cost involved with both security, computer and/or operating system upgrades is either too much or an unnecessary trend however this is simply not the case. If your business relies on computers to operate, it is imperative that they are secure, current and efficient.</p>
<p>Backing up your data regularly is an essential step for both business and home. If ransomware does get through your defences, the threat will be nothing more than an inconvenience because you will still have your data. When backing up data, ensure that once your backup is complete, your drive is removed.<br />An automated, secure off-site backup can take the hassle out of needing to switch drives daily and as an addition to on-site backup, provides a dual safety net for your data.</p>
<p>Finally, if you or your business are still running computers on Windows XP, there has never been a better reason to upgrade.</p>
<p>&nbsp;</p>
<p><i>For help, support or guidance on any of the above, don’t hesitate to contact us.</i></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_39">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_60  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_nav_3 et_pb_posts_nav nav-single">
								<span class="nav-previous"
									>
					<a href="https://f5solutions.com.au/security/have-i-been-hacked/" rel="prev">
												<span class="meta-nav">&larr; </span><span class="nav-label">Have I Been Hacked?</span>
					</a>
				</span>
							<span class="nav-next"
									>
					<a href="https://f5solutions.com.au/security/why-hackers-dont-need-computers-to-get-in/" rel="next">
												<span class="nav-label">Why Hackers Don&#039;t Need Computers To Get In</span><span class="meta-nav"> &rarr;</span>
					</a>
				</span>
			
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --><div class="et_pb_section et_pb_section_11 et_pb_with_background et_section_regular section_has_divider et_pb_top_divider" >
				<div class="et_pb_top_inside_divider et-no-transition"></div>
				
				
				
					<div class="et_pb_row et_pb_row_40">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_61  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_3  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap"><img loading="lazy" width="202" height="76" src="https://f5solutions.com.au/wp-content/uploads/2019/08/2014-Logo-long-thin-white-on-black-PNG-a.png" alt="" class="et-waypoint et_pb_animation_top wp-image-1320" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>F5 Solutions has been providing refreshing IT support for small-to-medium sized businesses since 2011. Our collective experience and industry service began as early as 1999.<br /> We deliver IT support and services in Richmond, Windsor, Hawkesbury, Blue Mountains, and the Greater Sydney area. We also service customers with branches Australia-wide.</p></div>
					</div>
				</div> <!-- .et_pb_blurb_content -->
			</div> <!-- .et_pb_blurb -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_62  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_38  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span size="4" style="font-size: large;"><b>More Information</b></span></p>
<p><a href="https://f5solutions.com.au/about-us/">About Us</a><br /> <a href="https://f5solutions.com.au/testimonials/">Testimonials</a><br /> <a href="https://f5solutions.com.au/resources/">Resources</a><br /> <a href="https://f5solutions.com.au/blog/">Blog</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_63  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_39  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Services Links</strong></span></p>
<p><a href="https://f5solutions.com.au/managed-services/">Managed Services</a><br /> <a href="https://f5solutions.com.au/business-cloud-services/">Business Cloud Services</a><br /> <a href="https://f5solutions.com.au/it-security/">IT Security Management</a><br /> <a href="https://f5solutions.com.au/network-solutions/">Computer Network Solutions</a><br /> <a href="https://f5solutions.com.au/it-support/">IT Support</a><br /> <a href="https://f5solutions.com.au/backup-data-recovery/">Managed Backup &amp; Disaster Recovery</a><br /> <a href="https://f5solutions.com.au/it-consulting/">IT Consulting Services</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_64  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_40  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Contact Info</strong></span></p>
<p>PO BOX 56 Kurrajong NSW 2758<br /> PH: <a href="tel:+61245722206">02 4572 2206</a><br /> Email: <a href="mailto:hello@f5solutions.com.au">hello@f5solutions.com.au</a><br /> Office Hours: Mon-Fri, 8AM-6PM<br /> (After Hours by Appointment)</p>
<p><a href="https://f5solutions.com.au/contact-us/"><span style="font-size: large;">Send Us A Message</span></a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_41">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_65  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_cta_3 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				<div class="et_pb_promo_description et_multi_view_hidden"></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_custom_button_icon et_pb_promo_button" href="https://f5solutions.com.au/contact-us/" data-icon="&#x35;">Book Your Free Onsite Review</a></div>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_42">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_66  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<ul class="et_pb_module et_pb_social_media_follow et_pb_social_media_follow_3 clearfix  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<li
            class='et_pb_social_media_follow_network_12 et_pb_social_icon et_pb_social_network_link  et-social-facebook et_pb_social_media_follow_network_12'><a
              href='https://www.facebook.com/F5SolutionsPtyLimited/'
              class='icon et_pb_with_border'
              title='Follow on Facebook'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_13 et_pb_social_icon et_pb_social_network_link  et-social-twitter et_pb_social_media_follow_network_13'><a
              href='https://twitter.com/F5SolutionsAU'
              class='icon et_pb_with_border'
              title='Follow on Twitter'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_14 et_pb_social_icon et_pb_social_network_link  et-social-linkedin et_pb_social_media_follow_network_14'><a
              href='https://www.linkedin.com/company/f5-solutions-pty.-limited'
              class='icon et_pb_with_border'
              title='Follow on LinkedIn'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_15 et_pb_social_icon et_pb_social_network_link  et-social-instagram et_pb_social_media_follow_network_15'><a
              href='https://www.instagram.com/f5solutions/'
              class='icon et_pb_with_border'
              title='Follow on Instagram'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li>
			</ul> <!-- .et_pb_counters -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_43">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_67  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_41  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>© 2021 F5 Solutions Pty. Limited   ABN 89 153 991 765</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_68  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_42  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><a href="https://f5solutions.com.au/faq/">FAQ</a> | <a href="https://f5solutions.com.au/privacy-terms-conditions/">Privacy, Terms &amp; Conditions </a>| <a href="https://f5solutions.com.au/sitemap_index.xml" target="_blank" rel="noopener noreferrer">Site Map</a> | <a href="https://f5solutions.com.au/website-disclaimer/">Website Disclaimer</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/wanacrypt0r-will-make-you-wannacry/">WanaCrypt0r &#8211; Will Make You WannaCry</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Have I Been Hacked?</title>
		<link>https://f5solutions.com.au/security/have-i-been-hacked/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 26 Jul 2016 08:08:40 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://f5solutions.com.au/newsite/?p=1052</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/have-i-been-hacked/">Have I Been Hacked?</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_12 et_pb_with_background et_section_regular" >
				
				
				
				
					<div class="et_pb_row et_pb_row_44">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_69  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_post_title et_pb_post_title_4 et_pb_bg_layout_light  et_pb_text_align_left"   >
				
				
				
				<div class="et_pb_title_container">
					<h1 class="entry-title">Have I Been Hacked?</h1>
				</div>
				
			</div><div class="et_pb_module et_pb_text et_pb_text_43  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>It seems like every other day a news story is published detailing the latest email hack or data breach and it’s no wonder – for some strange reason, the world isn’t taking the simplest of security procedures, seriously enough.</p>
<p>Passwords have been around since the dawn of time. In ancient times, according to<span> </span><a href="https://en.wikipedia.org/wiki/Password">Wiki</a>, Sentries would challenge people who wanted to enter an area by asking them for a password and would only allow them through if they knew the correct answer (remember the tale of Ali Baba and the Forty Thieves?). Now more than ever, passwords are synonymous with any kind of account creation. They provide a simple and secure handshake between the user and the provider, enabling access to everything from information, to money, to personal data and beyond.</p>
<p style="font-weight: 300;">Because passwords are asked for all the time, people typically choose them based on personal details; a pet&#8217;s name, a child’s date of birth or their favourite sporting team. Worse yet, there are those that go beyond this simplicity and choose to use what I like to refer to as<span> </span><i><em>dumbwords</em></i><span> </span>such as ‘welcome’ or ‘123456’ or the not-so-very-clever ‘password’.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_70  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_10">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/7407053_s.jpg" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/7407053_s.jpg 450w, https://f5solutions.com.au/wp-content/uploads/2019/08/7407053_s-150x150.jpg 150w, https://f5solutions.com.au/wp-content/uploads/2019/08/7407053_s-300x300.jpg 300w" sizes="(max-width: 450px) 100vw, 450px" class="wp-image-1055" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_45">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_71  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_44  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p style="font-weight: 300;">In January 2016,<span> </span><a href="http://www.splashdata.com/">SplashData</a><span> </span>published their annual top 25 most commonly used passwords based on a list of millions of stolen passwords that have been made public over the previous twelve months:</p>
<ol style="font-weight: 300;">
<li>123456</li>
<li>password</li>
<li>12345678</li>
<li>qwerty</li>
<li>12345</li>
<li>123456789</li>
<li>football</li>
<li>1234</li>
<li>1234567</li>
<li>baseball</li>
<li>welcome</li>
<li>1234567890</li>
<li>abc123</li>
<li>111111</li>
<li>1qaz2wsx</li>
<li>dragon</li>
<li>master</li>
<li>monkey</li>
<li>letmein</li>
<li>login</li>
<li>princess</li>
<li>qwertyuiop</li>
<li>solo</li>
<li>passw0rd</li>
<li>starwars</li>
</ol>
<p style="font-weight: 300;">The amusement one might feel whilst reading this list may also be accompanied by a profound feeling of disbelief. When did we get so stupid? If your password or a variation of it is on this list, give yourself an uppercut. Then go and change it.</p>
<p style="font-weight: 300;"><b><strong>What should your password be?</strong></b></p>
<p style="font-weight: 300;">Anything that is too painful to read let alone remember is your best bet. I know, it seems difficult but it’s the most secure type of password you could have. If it’s hard for you to remember, it will be just as hard for someone else to hack.</p>
<ul style="font-weight: 300;">
<li>We recommend using no less than a 15 character password using a mixture of numbers, lowercase and uppercase letters as well as punctuation symbols.</li>
<li>Use a different password for each account that you have. Because passwords are almost always linked to an email address, it’s highly likely that you’ve used it and the same password elsewhere. In the event of a data breach or an email hack, you may inadvertently give a hacker access to all of your online accounts.</li>
</ul>
<p style="font-weight: 300;">I asked a co-worker (with a particularly rain-man-like brain) what his answer would be if he were asked this question. He suggested that every website/account should/could be associated with a memory; a song title, a line from a song or a book, poem or movie, or a particular item – something that could trigger a password memory. Unfortunately, instead of making me feel like I could regain some control over my own passwords and then impart that knowledge confidently to others, it left me standing there with a painfully confused expression on my face that resembled something like a smacked bum crossed with a toothache.</p>
<p style="font-weight: 300;">The fact is, my<span> </span>boss<span> </span>co-worker makes a good point – passwords don’t have to be a word. They could be a phrase, a line or a song title and of course the more obscure to everyone else, the better. It could be an abbreviated version of these using a mixture of numbers, letters and symbols.<span> </span><br /> User names can also follow the same guidelines – you don’t have to provide your real name. It’s also a good idea to blatantly lie when it comes to filling out those password security questions. Anyone who knows you well enough probably has all the information they need to take you down, should they be so inclined. In saying that, as was demonstrated very clearly in a recent episode of Mr. Robot, gathering this kind of information about someone from something as simple as a Facebook account is way too easy to do and can be done by anyone (is your Facebook account set to private and if so, are all those friends actually trustworthy friends?).</p>
<p style="font-weight: 300;"><b><strong>So how are<span> </span><i><em>we</em></i> supposed to remember the 3,487 passwords we need?</strong></b></p>
<p style="font-weight: 300;">If associating smells, colours and sounds doesn&#8217;t work for you, not all hope is lost.</p>
<p style="font-weight: 300;"><b><strong>Repetition</strong></b></p>
<p style="font-weight: 300;">Repetitive anything will always ingrain something into your mind. Try it, you may be pleasantly surprised at what you can remember.<span> </span><br /> Using the suggestions above, you could even develop your own personal format as to the way you create passwords which will then make it easier to remember.</p>
<p style="font-weight: 300;"><b><strong>Write them down</strong></b></p>
<p style="font-weight: 300;">Woah, Nelly.<span> </span><br /> No,<span> </span><b><strong>don&#8217;t write them</strong></b><span> </span>down unless you live in a deep cavern on the side of a very tall, hard to climb mountain, in a very remote part of the world where your nearest (and only) neighbour is an antelope you call Fred.<span> </span><br /> Writing down a password one time only and then destroying that piece of paper can be an effective way to remember something but if you do this please make sure it&#8217;s destroyed. If someone breaks into your office/home and is looking for access to accounts, you&#8217;ve made it way too easy.<span> </span><br /> I would never advise this regardless of the reason but please, whatever you do, <b><strong>do not write it on a post-it note and stick it to your monitor</strong></b>.</p>
<p style="font-weight: 300;"><b><strong>Locked Documents</strong></b></p>
<p style="font-weight: 300;">An alternative to a password manager.<span> </span><br /> <b><strong>Making the master password complex</strong></b><span> </span>is the key to securing this document and it will then serve the same purpose as a password manager, although you will have to manually enter in your password into the website account you wish to log into. For an extra two minutes of your time, it&#8217;s not a big deal. These documents are encrypted so that in the event of a hack into your machine or network your data is safe. Make sure this document is backed up externally or remotely because if you lose your data, your drive, or some other disaster should render your machine unusable, you may lose this file forever.<span> </span><br /> If you choose this option, I would recommend using an Excel file and ensuring that it is from version 2013 onward as Microsoft have very thoughtfully increased the<span> </span><a href="http://www.thespreadsheetguru.com/blog/2014/8/20/understanding-excels-password-security-methodology">hash value and added an additional layer of protection the form of a Salt Value</a>. Bravo, Microsoft.</p>
<p><b><strong>Password Managers</strong></b></p>
<p style="font-weight: 300;">Are great if they aren’t logged in 24/7.<span> </span><br /> There&#8217;s not much point in having a third party application manage your passwords for you if it is always open/unlocked. You might as well use the built in password manager on Chrome or IE/Edge which is always ready to fill out your details for you. If you remember to log out of your Google account and don&#8217;t have<span> </span><i><em>that</em></i><span> </span>password saved, it&#8217;s an option. Logged in permanently makes it no different to having book sitting on open on your desk with all of your passwords written down (or an unsecured document on your desktop titled &#8216;Passwords&#8217;) or as previously mentioned the one we see most often &#8211; the post-it note stuck to the monitor on the desk.<span> </span><br /> If you do choose to use a password manager, do some research. Free isn’t always the best option but be sure to investigate and be comfortable with the one you choose to use.<span> </span><b><strong>Make sure that it is not logged in 24/7</strong></b><span> </span>and that you have to enter your master password before it fills in your login details to the website you want to login to.<span> </span><b><strong>Make your master password complex</strong></b><span> </span>and memorize it – if it’s the only password you have to remember, then remembering it shouldn’t be too hard.</p>
<p style="font-weight: 300;"><b><strong>So. Have you been hacked?<br /> </strong></b><br /> If you think any of your accounts may have been hacked, there are ways to check. A tried and true favourite is<span> </span><a href="http://www.haveibeenpwned.com/">haveibeenpwned.com</a><span> </span>where you simply enter in the email address (or two or three) that you most commonly use to sign up to sites with. It will go off and check them against a list of known hacks and data breaches and then inform you whether your information has been stolen and which of your details have been compromised.</p>
<p style="font-weight: 300;">Before you do that though, you may just want to go and change those passwords.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_46">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_72  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_nav_4 et_pb_posts_nav nav-single">
								<span class="nav-previous"
									>
					<a href="https://f5solutions.com.au/security/phishing-scams-dont-take-the-bait/" rel="prev">
												<span class="meta-nav">&larr; </span><span class="nav-label">Phishing Scams - Don&#039;t Take The Bait</span>
					</a>
				</span>
							<span class="nav-next"
									>
					<a href="https://f5solutions.com.au/security/wanacrypt0r-will-make-you-wannacry/" rel="next">
												<span class="nav-label">WanaCrypt0r - Will Make You WannaCry</span><span class="meta-nav"> &rarr;</span>
					</a>
				</span>
			
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --><div class="et_pb_section et_pb_section_14 et_pb_with_background et_section_regular section_has_divider et_pb_top_divider" >
				<div class="et_pb_top_inside_divider et-no-transition"></div>
				
				
				
					<div class="et_pb_row et_pb_row_47">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_73  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_4  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap"><img loading="lazy" width="202" height="76" src="https://f5solutions.com.au/wp-content/uploads/2019/08/2014-Logo-long-thin-white-on-black-PNG-a.png" alt="" class="et-waypoint et_pb_animation_top wp-image-1320" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>F5 Solutions has been providing refreshing IT support for small-to-medium sized businesses since 2011. Our collective experience and industry service began as early as 1999.<br /> We deliver IT support and services in Richmond, Windsor, Hawkesbury, Blue Mountains, and the Greater Sydney area. We also service customers with branches Australia-wide.</p></div>
					</div>
				</div> <!-- .et_pb_blurb_content -->
			</div> <!-- .et_pb_blurb -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_74  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_45  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span size="4" style="font-size: large;"><b>More Information</b></span></p>
<p><a href="https://f5solutions.com.au/about-us/">About Us</a><br /> <a href="https://f5solutions.com.au/testimonials/">Testimonials</a><br /> <a href="https://f5solutions.com.au/resources/">Resources</a><br /> <a href="https://f5solutions.com.au/blog/">Blog</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_75  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_46  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Services Links</strong></span></p>
<p><a href="https://f5solutions.com.au/managed-services/">Managed Services</a><br /> <a href="https://f5solutions.com.au/business-cloud-services/">Business Cloud Services</a><br /> <a href="https://f5solutions.com.au/it-security/">IT Security Management</a><br /> <a href="https://f5solutions.com.au/network-solutions/">Computer Network Solutions</a><br /> <a href="https://f5solutions.com.au/it-support/">IT Support</a><br /> <a href="https://f5solutions.com.au/backup-data-recovery/">Managed Backup &amp; Disaster Recovery</a><br /> <a href="https://f5solutions.com.au/it-consulting/">IT Consulting Services</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_76  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_47  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Contact Info</strong></span></p>
<p>PO BOX 56 Kurrajong NSW 2758<br /> PH: <a href="tel:+61245722206">02 4572 2206</a><br /> Email: <a href="mailto:hello@f5solutions.com.au">hello@f5solutions.com.au</a><br /> Office Hours: Mon-Fri, 8AM-6PM<br /> (After Hours by Appointment)</p>
<p><a href="https://f5solutions.com.au/contact-us/"><span style="font-size: large;">Send Us A Message</span></a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_48">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_77  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_cta_4 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				<div class="et_pb_promo_description et_multi_view_hidden"></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_custom_button_icon et_pb_promo_button" href="https://f5solutions.com.au/contact-us/" data-icon="&#x35;">Book Your Free Onsite Review</a></div>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_49">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_78  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<ul class="et_pb_module et_pb_social_media_follow et_pb_social_media_follow_4 clearfix  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<li
            class='et_pb_social_media_follow_network_16 et_pb_social_icon et_pb_social_network_link  et-social-facebook et_pb_social_media_follow_network_16'><a
              href='https://www.facebook.com/F5SolutionsPtyLimited/'
              class='icon et_pb_with_border'
              title='Follow on Facebook'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_17 et_pb_social_icon et_pb_social_network_link  et-social-twitter et_pb_social_media_follow_network_17'><a
              href='https://twitter.com/F5SolutionsAU'
              class='icon et_pb_with_border'
              title='Follow on Twitter'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_18 et_pb_social_icon et_pb_social_network_link  et-social-linkedin et_pb_social_media_follow_network_18'><a
              href='https://www.linkedin.com/company/f5-solutions-pty.-limited'
              class='icon et_pb_with_border'
              title='Follow on LinkedIn'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_19 et_pb_social_icon et_pb_social_network_link  et-social-instagram et_pb_social_media_follow_network_19'><a
              href='https://www.instagram.com/f5solutions/'
              class='icon et_pb_with_border'
              title='Follow on Instagram'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li>
			</ul> <!-- .et_pb_counters -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_50">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_79  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_48  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>© 2021 F5 Solutions Pty. Limited   ABN 89 153 991 765</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_80  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_49  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><a href="https://f5solutions.com.au/faq/">FAQ</a> | <a href="https://f5solutions.com.au/privacy-terms-conditions/">Privacy, Terms &amp; Conditions </a>| <a href="https://f5solutions.com.au/sitemap_index.xml" target="_blank" rel="noopener noreferrer">Site Map</a> | <a href="https://f5solutions.com.au/website-disclaimer/">Website Disclaimer</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/have-i-been-hacked/">Have I Been Hacked?</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phishing Scams &#8211; Don&#8217;t Take The Bait</title>
		<link>https://f5solutions.com.au/security/phishing-scams-dont-take-the-bait/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 09 Jun 2016 00:28:48 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://f5solutions.com.au/newsite/?p=1047</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/phishing-scams-dont-take-the-bait/">Phishing Scams &#8211; Don&#8217;t Take The Bait</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_15 et_pb_with_background et_section_regular" >
				
				
				
				
					<div class="et_pb_row et_pb_row_51">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_81  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_post_title et_pb_post_title_5 et_pb_bg_layout_light  et_pb_text_align_left"   >
				
				
				
				<div class="et_pb_title_container">
					<h1 class="entry-title">Phishing Scams &#8211; Don&#8217;t Take The Bait</h1>
				</div>
				
			</div><div class="et_pb_module et_pb_text et_pb_text_50  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><div class="itemIntroText">
<p><strong>What is Phishing?</strong></p>
<p><a href="http://www.webopedia.com/TERM/P/phishing.html" target="_blank" rel="noopener noreferrer">(fish´ing) (n.)The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.</a></p>
<p>Phishing is designed to trick you into giving out your personal details in order for the Phisher to ultimately steal your identity and/or your money. Phishing attempts are most commonly made by sending out emails claiming to be from reputable companies, in order to trick you into revealing personal information such as credits card numbers and passwords, online. Many people also fall victim to these same phishing tactics via phone calls (you know, those &#8216;Microsoft&#8217; calls) and websites (gaudy flashing boxes telling you that you have won, insisting you download a Registry Cleaner to clean your infected PC or that you have been selected to receive something for free). <br />Phishing differs from spam in that spam is generally annoying, unsolicited contact (like those flyers in your mail box) whereas phishing is targeted and actually results in real theft and real losses.</p>
</div></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_82  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_11">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/29330853_s-300x200.jpg" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/29330853_s-300x200.jpg 300w, https://f5solutions.com.au/wp-content/uploads/2019/08/29330853_s.jpg 450w" sizes="(max-width: 300px) 100vw, 300px" class="wp-image-1037" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_52">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_83  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_51  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><strong>Why Phish?</strong></p>
<p>Because phishing works well by tempting users with offers, freebies and giveaways, which are tried and true methods of success. Humans by default are curious and even in 2016 when we are more aware than ever of the need to exercise caution, we still get lured in by these baits.<br /> Phishing is extremely profitable and takes very little effort from the cyber criminal. Even if only 1% of those targeted by phishing fall into the trap, that cyber criminal will still net themselves a nice payday.</p>
<p>A global study by the Anti-Phishing Work Group (APWG) in<span> </span><a href="https://apwg.org/" target="_blank" rel="noopener noreferrer">May 2016</a>, revealed that:</p>
<ul>
<li>The Retail/Service sector remained the most- targeted industry sector during the first quarter of 2016, with 42.71% of attacks</li>
<li>The number of brands targeted by phishers in the first quarter remained constant – ranging from 406 to 431 brands each month.</li>
</ul>
<p>This means targeted brands such as PayPal, Apple, Facebook, (and in Australia) the ATO, AGL, Australia Post etc. are used most often in phishing attempts. Fake websites are hard to distinguish from the real thing and are now being seen to use HTTPS connections and certificates in a further attempt to mislead the user. People generally trust many of these brand and because of that, they are the perfect cloak for cyber criminals and bring in a greater catch.</p>
<p><strong>How Can I Tell If I Am Being Phished?</strong></p>
<p>Phishing emails almost always contain the following:</p>
<ul>
<li><strong>Typos and grammatical errors</strong><br /> For some reason, cyber criminals aren&#8217;t very literate and are known for their poor grammar and bad spelling.</li>
<li><strong>Web Links or Attachments</strong><br /> This is the number one bait tactic that almost always works. Clicking on these links results in a redirection to a website that will install some form of malware onto your PC. If no link is present, usually there will be an attachment and once you open and execute the file, the virus/malware happily installs itself and then goes about its business.</li>
<li><strong>Threats</strong><br /> Often these emails are threatening in nature, warning of an account closure, a fine or trying to convince you that your security is at risk. No better way to get you to react hastily than by threatening you.</li>
<li><strong>Spoofing</strong><br /> Spoofing involves using popular website or company names and addresses in order to appear legitimate. When you click on a spoofed link, you end up somewhere similar to where you may think you were going or somewhere else entirely. Spoofing often occurs within a network, sending emails that appear to be from within your network (your boss, the receptionist, the person at the desk next to you or even yourself), particularly from a scanner or fax.</li>
<li><strong>Phone Calls</strong><br /> These start out pleasant enough with the caller informing you that they are phoning from the &#8216;Windows Department&#8217; or from &#8216;Telecom&#8217;, perhaps even from a legitimate business within your country (in Australia, Telstra is often used in these calls). They may convince you to give your user name or password for a particular site or have you give them your credit card or banking information in order to make a payment for something. They may also instruct you to visit a website and download or install software that will let them access your PC.</li>
</ul>
<p><strong><br /> How To Avoid Being Phished</strong></p>
<p>There are some really easy ways to avoid phishing and most of them just require a few seconds inspection before you react:</p>
<ul>
<li><strong>Is the email from someone you know or someone you are expecting to hear from?</strong><br /> If not, chances are it is spam or very likely a phishing attempt. Just because it claims to be &#8216;Your Monthly Electricity Usage&#8217; doesn&#8217;t mean that it is.</li>
<li><strong>Are the links in the email real?</strong><br /> A simple way to check is by hovering your mouse (do not click, just hover) over the link &#8211; this will reveal the true destination of the link.</li>
<li><strong>What is in the attachment?</strong><br /> Attachments in phishing emails will more than likely be zip or macro files. The attachments are usually obscurely named and will often contain your own name or a default &#8216;scan&#8217; or &#8216;attachment&#8217; which is a pretty good indication that it is not what it&#8217;s claiming to be.</li>
<li><strong>Assess the threat</strong><br /> An email from an electricity company telling you that your account is being suspended <em>unless you click this link </em>or <em>open the attachment</em><span> </span>can easily be checked by calling your electricity supplier first. Don&#8217;t assume that because they&#8217;ve appeared to have sent you an email advising of this suspension, that it is for real. The same goes for any company that you may do business with. Make a phone call, speak with your account representative, ask a real person.</li>
<li><strong>Is it a Spoof Email?</strong><br /> To identify spoofing, simply take a minute to look and think &#8211; does that scanner or fax machine in the email address exist on your network? Is it normal for your CEO to be emailing you a file of that nature or asking for your user name or password? Would your boss actually want to <em>start you on one of the most amazing pesos making journeys you&#8217;ll ever take</em>?</li>
<li><strong>Personal use of work email addresses</strong><br /> Don&#8217;t use your business email account for personal use. By this I mean that you shouldn&#8217;t be signing up to websites for personal reasons using your work email address. Doing this greatly reduces the chances of falling for a phishing scam. The damage that can be done by unleashing ransomware or malware into your work network because you believed an email to be from a place that you have personal business dealings with, is just not worth the cost to your business. Whilst we are all only human, reducing the chances of being a victim is of great benefit to your organisation.</li>
<li><strong>Phone calls can be returned<br /> </strong> Businesses such as Microsoft, Paypal or Telstra will never contact you via phone to ask for personal details. If you are unsure as to whether a call is legitimate or not, insist that the caller provide you with identifying information of their own such as an employee ID number or ask that they give you their number so that you can call them back later. The best way to deal with these calls is to simply hang up and then phone back the actual business if you believe you do need to speak with them further.</li>
<li><strong>Just take a few moments to check. Those few moments could save you a whole load of hassle, not to mention money.</strong><strong></strong></li>
</ul>
<p>An example of a phishing email:<strong></strong></p>
<p>&nbsp;</p></div>
			</div> <!-- .et_pb_text --><div class="et_pb_module et_pb_image et_pb_image_12">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/Image7.png" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/Image7.png 622w, https://f5solutions.com.au/wp-content/uploads/2019/08/Image7-480x179.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 622px, 100vw" class="wp-image-1095" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_52  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: 14px;">Question: is that the email address of my bank, let alone my bank manager? Is that her name?<br /> </span><span style="font-size: 14px;">Question: a message in the form of a zip? Why would it be called scan? Why would my bank manager not just type the message in the email and save herself the hassle?<br /> </span><span style="font-size: 14px;">Unusual: it doesn&#8217;t read with the usual professional edge that my bank manager would use. There is no signature, nothing to confirm that it is what it claims to be.</span></p>
<p>Below is another example of a phishing email currently doing the rounds and catching many Australians out by claiming to be from AGL:</p></div>
			</div> <!-- .et_pb_text --><div class="et_pb_module et_pb_image et_pb_image_13">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/Image5.png" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/Image5.png 975w, https://f5solutions.com.au/wp-content/uploads/2019/08/Image5-480x283.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 975px, 100vw" class="wp-image-1096" /></span>
			</div><div class="et_pb_module et_pb_image et_pb_image_14">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/Image6.png" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/Image6.png 964w, https://f5solutions.com.au/wp-content/uploads/2019/08/Image6-480x276.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 964px, 100vw" class="wp-image-1097" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_53  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>We have seen many people fooled by this very email over the past few weeks.<span> </span><br /> When I received this email, right away I knew it was spam based on a few things. Firstly, we don&#8217;t get our electricity bill via email. Second, this email is missing the AGL company logo. Third, (if I was still unsure) before even clicking on any buttons, I hovered my mouse over the links as you can see in the second image. The link is not going to AGL in fact it looks like it&#8217;s going to take me to a coach development website.<br /> This email actually contains a link to ransomware and once clicked, sends a message back to base which then deploys the ransomware into your system. Similar to this email are the ones claiming to be from Australia Post and/or the ATO. Combined, these phishing/malware emails have claimed thousands of victims and counting.</p>
<p><strong><br /> Don&#8217;t Become Complacent.</strong></p>
<p>Just because the general rules of poor spelling, bad grammar and cloaked links usually apply, doesn&#8217;t mean that they are hard and fast. Sophisticated phishers can and will use professional marketing techniques in order to get you to click. They may include logos and other legitimate information taken directly from a company website, newsletter or email. Remember that no organisation would urgently request you to send your credit card details via email. If in doubt, pick up the phone. Make a call. Manually type in the email address of the website if you need to go there.<br /> It is far better to delete an email and have it resent or to hangup on a suspicious caller than it is to be phished and hacked or robbed.</p>
<p>Keep your anti-virus up to date. Keep your firewalls updated and secure and above all, don&#8217;t rush.<span> </span><br /> Read what is before you and take a breath before clicking a link or opening an attachment.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_53">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_84  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_nav_5 et_pb_posts_nav nav-single">
								<span class="nav-previous"
									>
					<a href="https://f5solutions.com.au/security/ransomware-not-a-matter-of-if-but-when/" rel="prev">
												<span class="meta-nav">&larr; </span><span class="nav-label">Ransomware: Not A Matter Of If, But When</span>
					</a>
				</span>
							<span class="nav-next"
									>
					<a href="https://f5solutions.com.au/security/have-i-been-hacked/" rel="next">
												<span class="nav-label">Have I Been Hacked?</span><span class="meta-nav"> &rarr;</span>
					</a>
				</span>
			
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --><div class="et_pb_section et_pb_section_17 et_pb_with_background et_section_regular section_has_divider et_pb_top_divider" >
				<div class="et_pb_top_inside_divider et-no-transition"></div>
				
				
				
					<div class="et_pb_row et_pb_row_54">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_85  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_5  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap"><img loading="lazy" width="202" height="76" src="https://f5solutions.com.au/wp-content/uploads/2019/08/2014-Logo-long-thin-white-on-black-PNG-a.png" alt="" class="et-waypoint et_pb_animation_top wp-image-1320" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>F5 Solutions has been providing refreshing IT support for small-to-medium sized businesses since 2011. Our collective experience and industry service began as early as 1999.<br /> We deliver IT support and services in Richmond, Windsor, Hawkesbury, Blue Mountains, and the Greater Sydney area. We also service customers with branches Australia-wide.</p></div>
					</div>
				</div> <!-- .et_pb_blurb_content -->
			</div> <!-- .et_pb_blurb -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_86  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_54  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span size="4" style="font-size: large;"><b>More Information</b></span></p>
<p><a href="https://f5solutions.com.au/about-us/">About Us</a><br /> <a href="https://f5solutions.com.au/testimonials/">Testimonials</a><br /> <a href="https://f5solutions.com.au/resources/">Resources</a><br /> <a href="https://f5solutions.com.au/blog/">Blog</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_87  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_55  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Services Links</strong></span></p>
<p><a href="https://f5solutions.com.au/managed-services/">Managed Services</a><br /> <a href="https://f5solutions.com.au/business-cloud-services/">Business Cloud Services</a><br /> <a href="https://f5solutions.com.au/it-security/">IT Security Management</a><br /> <a href="https://f5solutions.com.au/network-solutions/">Computer Network Solutions</a><br /> <a href="https://f5solutions.com.au/it-support/">IT Support</a><br /> <a href="https://f5solutions.com.au/backup-data-recovery/">Managed Backup &amp; Disaster Recovery</a><br /> <a href="https://f5solutions.com.au/it-consulting/">IT Consulting Services</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_88  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_56  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Contact Info</strong></span></p>
<p>PO BOX 56 Kurrajong NSW 2758<br /> PH: <a href="tel:+61245722206">02 4572 2206</a><br /> Email: <a href="mailto:hello@f5solutions.com.au">hello@f5solutions.com.au</a><br /> Office Hours: Mon-Fri, 8AM-6PM<br /> (After Hours by Appointment)</p>
<p><a href="https://f5solutions.com.au/contact-us/"><span style="font-size: large;">Send Us A Message</span></a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_55">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_89  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_cta_5 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				<div class="et_pb_promo_description et_multi_view_hidden"></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_custom_button_icon et_pb_promo_button" href="https://f5solutions.com.au/contact-us/" data-icon="&#x35;">Book Your Free Onsite Review</a></div>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_56">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_90  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<ul class="et_pb_module et_pb_social_media_follow et_pb_social_media_follow_5 clearfix  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<li
            class='et_pb_social_media_follow_network_20 et_pb_social_icon et_pb_social_network_link  et-social-facebook et_pb_social_media_follow_network_20'><a
              href='https://www.facebook.com/F5SolutionsPtyLimited/'
              class='icon et_pb_with_border'
              title='Follow on Facebook'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_21 et_pb_social_icon et_pb_social_network_link  et-social-twitter et_pb_social_media_follow_network_21'><a
              href='https://twitter.com/F5SolutionsAU'
              class='icon et_pb_with_border'
              title='Follow on Twitter'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_22 et_pb_social_icon et_pb_social_network_link  et-social-linkedin et_pb_social_media_follow_network_22'><a
              href='https://www.linkedin.com/company/f5-solutions-pty.-limited'
              class='icon et_pb_with_border'
              title='Follow on LinkedIn'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_23 et_pb_social_icon et_pb_social_network_link  et-social-instagram et_pb_social_media_follow_network_23'><a
              href='https://www.instagram.com/f5solutions/'
              class='icon et_pb_with_border'
              title='Follow on Instagram'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li>
			</ul> <!-- .et_pb_counters -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_57">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_91  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_57  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>© 2021 F5 Solutions Pty. Limited   ABN 89 153 991 765</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_92  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_58  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><a href="https://f5solutions.com.au/faq/">FAQ</a> | <a href="https://f5solutions.com.au/privacy-terms-conditions/">Privacy, Terms &amp; Conditions </a>| <a href="https://f5solutions.com.au/sitemap_index.xml" target="_blank" rel="noopener noreferrer">Site Map</a> | <a href="https://f5solutions.com.au/website-disclaimer/">Website Disclaimer</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/phishing-scams-dont-take-the-bait/">Phishing Scams &#8211; Don&#8217;t Take The Bait</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware: Not A Matter Of If, But When</title>
		<link>https://f5solutions.com.au/security/ransomware-not-a-matter-of-if-but-when/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 17 May 2016 06:10:17 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://f5solutions.com.au/newsite/?p=396</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/ransomware-not-a-matter-of-if-but-when/">Ransomware: Not A Matter Of If, But When</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_18 et_pb_with_background et_section_regular" >
				
				
				
				
					<div class="et_pb_row et_pb_row_58">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_93  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_post_title et_pb_post_title_6 et_pb_bg_layout_light  et_pb_text_align_left"   >
				
				
				
				<div class="et_pb_title_container">
					<h1 class="entry-title">Ransomware: Not A Matter Of If, But When</h1>
				</div>
				
			</div><div class="et_pb_module et_pb_text et_pb_text_59  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>This is a statement we find ourselves often repeating. It’s not a threat or a way of getting a business to spend more money but a simple truth. The response we tend to get is “but we are just a small business” or “we have nothing of value worth stealing”. If your business has any form of data, it is valuable – to you.</p>
<p>Holding it to ransom is a clever move by cyber thieves and one that is working and extremely profitable. In fact, it is being said that ransomware is so profitable, cyber criminals are<span> </span><a href="https://www.wired.com/2016/05/4-ways-protect-ransomware-youre-target/">“abandoning their old ways of making money – stealing credit card numbers and bank account credentials – in favour of ransomware”. </a></p>
<p>After deployment, ransomware holds your data hostage by encrypting files and folders on drives, including local, attached (USB) drives and can go as far as deploying itself onto other machines on the same network. It then demands that you pay a ransom, usually in Bitcoin, in order to facilitate its release. Once your files have been encrypted, there is no way back without the encryption key and of course you must pay big money for this key. Ransoms demanded are reported to be anywhere from $4000 up to and beyond $25,000.</p>
<p>&nbsp;</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_2_5 et_pb_column_94  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_image et_pb_image_15">
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" src="https://f5solutions.com.au/wp-content/uploads/2019/08/41781161_s2.jpg" alt="" title="" height="auto" width="auto" srcset="https://f5solutions.com.au/wp-content/uploads/2019/08/41781161_s2.jpg 450w, https://f5solutions.com.au/wp-content/uploads/2019/08/41781161_s2-300x225.jpg 300w" sizes="(max-width: 450px) 100vw, 450px" class="wp-image-1006" /></span>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_59">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_95  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_60  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>Ransomware isn’t only deployed via email,<span> </span><a href="https://www.fbi.gov/news/stories/incidents-of-ransomware-on-the-rise/incidents-of-ransomware-on-the-rise">according to FBI Cyber Division Assistant Director James Trainor</a>, “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers.”</p>
<p>How do you prevent your business from becoming a victim of ransomware?<br /> There are a number of ways you can do this. These are some of the key elements that together, can provide a strong and long lasting wall of defence for your organisation (all of these steps can also be applied to the home user).</p>
<p>&nbsp;</p>
<p><b><strong>Backup your data</strong></b></p>
<p>Backing up your data on a daily basis will reduce your vulnerability to ransomware attacks. If your data gets locked/encrypted, you won’t have to pay that ransom to see it again. You may lose a day’s work (this may mean re-keying some data) but in comparison to losing everything, it’s a small loss.</p>
<p>Backing up onsite, however, does still come with a risk – ransomware is clever enough to seek out and destroy backup data. In fact, the ransomware attacks we have come across in the past week have actively sought out this data first. The creators behind this malware know that backups will save their victim. On-site backups are often done to external drives, connected to servers/machines via USB, and plugged in 24/7. If the backup drive is connected at the same time that the ransomware is deployed, that data can and will also be compromised.</p>
<p>An off-site/cloud backup is ideal and can be used in conjunction with an on-site solution if preferred but because the off-site backup only ever creates a connection when the backup runs, if a user comes in the following morning and accidentally deploys ransomware throughout your organisation, your off-site backed up data will be safe and ready for restoration. Machines/hardware may still be damaged by ransomware, but your business can be back up and running if a copy of your data is intact.</p>
<p><b><strong>Educate your staff</strong></b></p>
<p>If an employee uses a computer that is connected to the internet/receives email, ensure that they have the knowledge they need to be aware.</p>
<p>Users should not login to any site that doesn’t show<span> </span><strong>https</strong>:// because that site is not secure. Take another look at that email address – is it actually the right web address or is it misspelled? Many of these websites appear to be legit but contain typos. A site, such as a banking site, should display a https:// but the link displays http://. The domain .whatever may not be your banks regular domain. Because we humans tend to skim read it is easy to be tricked into thinking that you are heading somewhere legitimate.</p>
<p>Users should be taught about the importance of not opening emails, clicking on links or opening attachments within emails, from people they do not know or do not normally receive mail from. These can also appear in web chat and users should be aware that these tactics are the same ones used in phishing emails.<br /> Phishing emails from known organisations may appear to be legit, but if you hover your mouse over a link within these emails you may find that the link that appears is going to take you somewhere else entirely.</p>
<p>Users should be aware that any banking or government organisation (among many others) will never ask for your user name, password or any other personally defining information in an email. They will generally never send a zip file or word document to you. In the instance that they do, it will be locked and a separate email will be sent with the password to open the file. A phone call will often initiate this kind of contact either from yourself or the institution.</p>
<p>Malware, both online and the kind that pops up in an email, is almost always easy to detect – they are full of grammatical and spelling errors and tend to read awkwardly.<span> </span><br /> It is better to delete a legitimate email from a legitimate source than it is to open something that you aren’t sure about. Emails can be re-sent. If an email does appear to be from someone you know, but not an attachment that you were expecting or would normally receive from them, pick up the phone. Ask the question. They themselves may have been compromised but taking that second step by asking is far better than putting your business at risk.</p>
<p>&nbsp;</p>
<p><b><strong>Firewalls</strong></b></p>
<p>Firewalls are a necessary and extremely effective defence tool for any business, big or small. A good firewall will offer at least a 3-layer protection, a web blocker service which prevents ransomware (and other forms of virus/malware) from making its call back to ‘home’ and a deep inspection feature of all traffic and websites. This feature runs security scans even on encrypted web traffic. Of course these all need to be configured correctly but when they are, they are an ultimate tool of defence. (At F5 Solutions, we highly recommend, use and deploy<span> </span><a href="https://www.watchguard.com/">WatchGuard Firewalls</a>)</p>
<p>&nbsp;</p>
<p><b><strong>Antivirus</strong></b></p>
<p>Antivirus programs should never be your first or only line of defence. Most AV’s will prevent most viruses and malware from infiltrating your systems but not all are created equally. An AV program is only as effective as its last update. Many AV’s cannot detect or prevent ransomware from being deployed and if they do detect it, the damage may have already been done.</p>
<p>&nbsp;</p>
<p><b><strong>Patching</strong></b></p>
<p>Ensuring that patches are updated and applied to all machines and servers within your organisation. Keeping machines updated won’t necessarily stop them from being attacked or the attacks from taking hold, but it is an important step that shouldn’t be overlooked. Patches are released regularly to address security as well as critical operating issues present on a machine.</p>
<p>&nbsp;</p>
<p>No security solution is 100% foolproof and multiple steps will always need to be taken in order to protect your business. These elements of prevention are not &#8216;set and forget&#8217; and will require ongoing updating, monitoring and changes as malicious software becomes smarter.</p>
<p>If your business has any form of data, then you have something worth stealing or holding to ransom.<br /> Don’t forget; it’s not a matter of if, but when. Educate your staff, build your defence and stay vigilant.</p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_60">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_96  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_nav_6 et_pb_posts_nav nav-single">
								<span class="nav-previous"
									>
					<a href="https://f5solutions.com.au/general/welcome/" rel="prev">
												<span class="meta-nav">&larr; </span><span class="nav-label">Welcome</span>
					</a>
				</span>
							<span class="nav-next"
									>
					<a href="https://f5solutions.com.au/security/phishing-scams-dont-take-the-bait/" rel="next">
												<span class="nav-label">Phishing Scams - Don&#039;t Take The Bait</span><span class="meta-nav"> &rarr;</span>
					</a>
				</span>
			
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --><div class="et_pb_section et_pb_section_20 et_pb_with_background et_section_regular section_has_divider et_pb_top_divider" >
				<div class="et_pb_top_inside_divider et-no-transition"></div>
				
				
				
					<div class="et_pb_row et_pb_row_61">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_97  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_6  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap"><img loading="lazy" width="202" height="76" src="https://f5solutions.com.au/wp-content/uploads/2019/08/2014-Logo-long-thin-white-on-black-PNG-a.png" alt="" class="et-waypoint et_pb_animation_top wp-image-1320" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>F5 Solutions has been providing refreshing IT support for small-to-medium sized businesses since 2011. Our collective experience and industry service began as early as 1999.<br /> We deliver IT support and services in Richmond, Windsor, Hawkesbury, Blue Mountains, and the Greater Sydney area. We also service customers with branches Australia-wide.</p></div>
					</div>
				</div> <!-- .et_pb_blurb_content -->
			</div> <!-- .et_pb_blurb -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_98  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_61  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span size="4" style="font-size: large;"><b>More Information</b></span></p>
<p><a href="https://f5solutions.com.au/about-us/">About Us</a><br /> <a href="https://f5solutions.com.au/testimonials/">Testimonials</a><br /> <a href="https://f5solutions.com.au/resources/">Resources</a><br /> <a href="https://f5solutions.com.au/blog/">Blog</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_99  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_62  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Services Links</strong></span></p>
<p><a href="https://f5solutions.com.au/managed-services/">Managed Services</a><br /> <a href="https://f5solutions.com.au/business-cloud-services/">Business Cloud Services</a><br /> <a href="https://f5solutions.com.au/it-security/">IT Security Management</a><br /> <a href="https://f5solutions.com.au/network-solutions/">Computer Network Solutions</a><br /> <a href="https://f5solutions.com.au/it-support/">IT Support</a><br /> <a href="https://f5solutions.com.au/backup-data-recovery/">Managed Backup &amp; Disaster Recovery</a><br /> <a href="https://f5solutions.com.au/it-consulting/">IT Consulting Services</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_100  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_63  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Contact Info</strong></span></p>
<p>PO BOX 56 Kurrajong NSW 2758<br /> PH: <a href="tel:+61245722206">02 4572 2206</a><br /> Email: <a href="mailto:hello@f5solutions.com.au">hello@f5solutions.com.au</a><br /> Office Hours: Mon-Fri, 8AM-6PM<br /> (After Hours by Appointment)</p>
<p><a href="https://f5solutions.com.au/contact-us/"><span style="font-size: large;">Send Us A Message</span></a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_62">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_101  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_cta_6 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				<div class="et_pb_promo_description et_multi_view_hidden"></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_custom_button_icon et_pb_promo_button" href="https://f5solutions.com.au/contact-us/" data-icon="&#x35;">Book Your Free Onsite Review</a></div>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_63">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_102  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<ul class="et_pb_module et_pb_social_media_follow et_pb_social_media_follow_6 clearfix  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<li
            class='et_pb_social_media_follow_network_24 et_pb_social_icon et_pb_social_network_link  et-social-facebook et_pb_social_media_follow_network_24'><a
              href='https://www.facebook.com/F5SolutionsPtyLimited/'
              class='icon et_pb_with_border'
              title='Follow on Facebook'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_25 et_pb_social_icon et_pb_social_network_link  et-social-twitter et_pb_social_media_follow_network_25'><a
              href='https://twitter.com/F5SolutionsAU'
              class='icon et_pb_with_border'
              title='Follow on Twitter'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_26 et_pb_social_icon et_pb_social_network_link  et-social-linkedin et_pb_social_media_follow_network_26'><a
              href='https://www.linkedin.com/company/f5-solutions-pty.-limited'
              class='icon et_pb_with_border'
              title='Follow on LinkedIn'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_27 et_pb_social_icon et_pb_social_network_link  et-social-instagram et_pb_social_media_follow_network_27'><a
              href='https://www.instagram.com/f5solutions/'
              class='icon et_pb_with_border'
              title='Follow on Instagram'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li>
			</ul> <!-- .et_pb_counters -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_64">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_103  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_64  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>© 2021 F5 Solutions Pty. Limited   ABN 89 153 991 765</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_104  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_65  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><a href="https://f5solutions.com.au/faq/">FAQ</a> | <a href="https://f5solutions.com.au/privacy-terms-conditions/">Privacy, Terms &amp; Conditions </a>| <a href="https://f5solutions.com.au/sitemap_index.xml" target="_blank" rel="noopener noreferrer">Site Map</a> | <a href="https://f5solutions.com.au/website-disclaimer/">Website Disclaimer</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>The post <a rel="nofollow" href="https://f5solutions.com.au/security/ransomware-not-a-matter-of-if-but-when/">Ransomware: Not A Matter Of If, But When</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Welcome</title>
		<link>https://f5solutions.com.au/general/welcome/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 30 Mar 2016 04:59:09 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://f5solutions.com.au/newsite/?p=1</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://f5solutions.com.au/general/welcome/">Welcome</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_21 et_pb_with_background et_section_regular" >
				
				
				
				
					<div class="et_pb_row et_pb_row_65">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_105  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_66  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p>Welcome to the F5 Solutions Blog.</p>
<p>F5 Solutions has been providing IT solutions for many businesses in the Sydney region since 2011. Our team consists of highly skilled, creative, honest and caring IT professionals who strive for excellence within their fields. As a business, our core focus is on tailoring IT solutions to suit individual businesses, rather than just supplying a blanket fix. This means that we have no interest in selling you a service that you don’t need and because of this, our solutions are refreshingly simple and effective.</p>
<p>The purpose of this blog is to inform not only our clients but the general public about various aspects of IT within businesses. We will be sharing our thoughts as well as experiences from a solution point-of-view as well as any discoveries we may make along the way. From information regarding viruses and malware to informative articles about new technologies and IT capabilities, we hope to share a wide variety of information that may be useful and taken into consideration when making decisions about your business IT solutions.</p>
<p>We welcome your feedback and your comments and encourage any questions that you may have regarding our blog content or general questions about our business, so don’t be afraid to ask. We hope that you find the information here helpful and we thank you for taking the time to poke around.</p>
<p>F5 Solutions Pty. Limited<br /> <span id="cloak0be4c6d589c38281f6a4962048acb8cf"><a href="mailto:info@f5solutions.com.au">info@f5solutions.com.au </a></span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_66">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_106  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_post_nav_7 et_pb_posts_nav nav-single">
								<span class="nav-next"
									>
					<a href="https://f5solutions.com.au/security/ransomware-not-a-matter-of-if-but-when/" rel="next">
												<span class="nav-label">Ransomware: Not A Matter Of If, But When</span><span class="meta-nav"> &rarr;</span>
					</a>
				</span>
			
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --><div class="et_pb_section et_pb_section_23 et_pb_with_background et_section_regular section_has_divider et_pb_top_divider" >
				<div class="et_pb_top_inside_divider et-no-transition"></div>
				
				
				
					<div class="et_pb_row et_pb_row_67">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_107  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_7  et_pb_text_align_left  et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap"><img loading="lazy" width="202" height="76" src="https://f5solutions.com.au/wp-content/uploads/2019/08/2014-Logo-long-thin-white-on-black-PNG-a.png" alt="" class="et-waypoint et_pb_animation_top wp-image-1320" /></span></div>
					<div class="et_pb_blurb_container">
						
						<div class="et_pb_blurb_description"><p>F5 Solutions has been providing refreshing IT support for small-to-medium sized businesses since 2011. Our collective experience and industry service began as early as 1999.<br /> We deliver IT support and services in Richmond, Windsor, Hawkesbury, Blue Mountains, and the Greater Sydney area. We also service customers with branches Australia-wide.</p></div>
					</div>
				</div> <!-- .et_pb_blurb_content -->
			</div> <!-- .et_pb_blurb -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_108  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_67  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span size="4" style="font-size: large;"><b>More Information</b></span></p>
<p><a href="https://f5solutions.com.au/about-us/">About Us</a><br /> <a href="https://f5solutions.com.au/testimonials/">Testimonials</a><br /> <a href="https://f5solutions.com.au/resources/">Resources</a><br /> <a href="https://f5solutions.com.au/blog/">Blog</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_109  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_68  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Services Links</strong></span></p>
<p><a href="https://f5solutions.com.au/managed-services/">Managed Services</a><br /> <a href="https://f5solutions.com.au/business-cloud-services/">Business Cloud Services</a><br /> <a href="https://f5solutions.com.au/it-security/">IT Security Management</a><br /> <a href="https://f5solutions.com.au/network-solutions/">Computer Network Solutions</a><br /> <a href="https://f5solutions.com.au/it-support/">IT Support</a><br /> <a href="https://f5solutions.com.au/backup-data-recovery/">Managed Backup &amp; Disaster Recovery</a><br /> <a href="https://f5solutions.com.au/it-consulting/">IT Consulting Services</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_1_4 et_pb_column_110  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_69  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: large;"><strong>Contact Info</strong></span></p>
<p>PO BOX 56 Kurrajong NSW 2758<br /> PH: <a href="tel:+61245722206">02 4572 2206</a><br /> Email: <a href="mailto:hello@f5solutions.com.au">hello@f5solutions.com.au</a><br /> Office Hours: Mon-Fri, 8AM-6PM<br /> (After Hours by Appointment)</p>
<p><a href="https://f5solutions.com.au/contact-us/"><span style="font-size: large;">Send Us A Message</span></a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_68">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_111  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_cta_7 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark">
				
				
				<div class="et_pb_promo_description et_multi_view_hidden"></div>
				<div class="et_pb_button_wrapper"><a class="et_pb_button et_pb_custom_button_icon et_pb_promo_button" href="https://f5solutions.com.au/contact-us/" data-icon="&#x35;">Book Your Free Onsite Review</a></div>
			</div>
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_69">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_112  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<ul class="et_pb_module et_pb_social_media_follow et_pb_social_media_follow_7 clearfix  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<li
            class='et_pb_social_media_follow_network_28 et_pb_social_icon et_pb_social_network_link  et-social-facebook et_pb_social_media_follow_network_28'><a
              href='https://www.facebook.com/F5SolutionsPtyLimited/'
              class='icon et_pb_with_border'
              title='Follow on Facebook'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_29 et_pb_social_icon et_pb_social_network_link  et-social-twitter et_pb_social_media_follow_network_29'><a
              href='https://twitter.com/F5SolutionsAU'
              class='icon et_pb_with_border'
              title='Follow on Twitter'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_30 et_pb_social_icon et_pb_social_network_link  et-social-linkedin et_pb_social_media_follow_network_30'><a
              href='https://www.linkedin.com/company/f5-solutions-pty.-limited'
              class='icon et_pb_with_border'
              title='Follow on LinkedIn'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li><li
            class='et_pb_social_media_follow_network_31 et_pb_social_icon et_pb_social_network_link  et-social-instagram et_pb_social_media_follow_network_31'><a
              href='https://www.instagram.com/f5solutions/'
              class='icon et_pb_with_border'
              title='Follow on Instagram'
               target="_blank"><span
                class='et_pb_social_media_follow_network_name'
                aria-hidden='true'
                >Follow</span></a></li>
			</ul> <!-- .et_pb_counters -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row --><div class="et_pb_row et_pb_row_70">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_113  et_pb_css_mix_blend_mode_passthrough">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_70  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><span>© 2021 F5 Solutions Pty. Limited   ABN 89 153 991 765</span></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column --><div class="et_pb_column et_pb_column_3_5 et_pb_column_114  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				<div class="et_pb_module et_pb_text et_pb_text_71  et_pb_text_align_right et_pb_bg_layout_light">
				
				
				<div class="et_pb_text_inner"><p><a href="https://f5solutions.com.au/faq/">FAQ</a> | <a href="https://f5solutions.com.au/privacy-terms-conditions/">Privacy, Terms &amp; Conditions </a>| <a href="https://f5solutions.com.au/sitemap_index.xml" target="_blank" rel="noopener noreferrer">Site Map</a> | <a href="https://f5solutions.com.au/website-disclaimer/">Website Disclaimer</a></p></div>
			</div> <!-- .et_pb_text -->
			</div> <!-- .et_pb_column -->
				
				
			</div> <!-- .et_pb_row -->
				
				
			</div> <!-- .et_pb_section --></p>
<p>The post <a rel="nofollow" href="https://f5solutions.com.au/general/welcome/">Welcome</a> appeared first on <a rel="nofollow" href="https://f5solutions.com.au">F5 Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
