IT ArchiTeks Launches a Powerful New Professional Website

IT ArchiTeks, the hardware, software and network solution providers in Dallas-Fort Worth, launches a new state-of-the-art website equipped with powerful features designed by iKonix Studios.

May 29, 2014 | Frisco, Texas – IT ArchiTeks, an IT service provider that has been in business in the Dallas/Fort Worth area for the past 15 years, has revamped its old outdated website. The company’s new professional website has enhanced features, a modern sophisticated visual appeal and user-friendly features.

About the new professional website

The new website for the Dallas based IT service provider has been designed by iKonix Studios, a nine year old company based in Frisco, Texas. iKonix Studios has done a great job on the website. While the primary expertise of iKonix is designing custom websites and building complex web development projects, it has also expanded its scope of services to include search engine optimization, content writing services, social media marketing and other digital marketing services.

The CEO of IT ArchiTeks, Derek Veillon said: “I am pleased that we have finally launched a professional new website for IT ArchiTeks. The Dallas-Fort Worth metroplex is growing at a spectacular rate and being on the cutting edge of the latest web technologies is paramount to having continued growth in the Dallas-Fort Worth IT sector.”

IT ArchiTeks has been providing a wide range of services to large and small businesses in Dallas-Fort Worth region. The itinerary of services provided by the company includes computer servicesnetwork servicesserver administration and IT solutions.

As part of its computer services, the company handles hardware issues, software issues, security patches, email administration and upgrades for home or office computers. IT ArchiTeks provides services related to Microsoft Server 2008, SBS 2008, Exchange 2010, SQL server and terminal server. Clients receive 24×7 monitoring service as well.

Furthermore, included in the range of network and IT solutions provided by the company are network evaluations, LAN setup and repair, VoIP, Cisco routers, wireless routers, network security, Internet monitoring, employee Internet usage monitoring, data recovery and much more.

Essentially, IT ArchiTeks is well on its way to become a one-stop destination for IT requirements of small and big business. By creating a new state-of-the-art website, the company is taking its services to an all new high. This technology is the best the industry has to offer.

A major strength of IT ArchiTeks is its staff. All members of its technical team hold certifications by Microsoft and CompTIA. Mr. Veillon says, “Quality of service has always been our topmost priority. We will always stay true to our ethics. Our technical staff is qualified and certified, our customer service team is trained for efficiency and our administrators are driven by strong work ethics. As a result, we have been able to offer high quality services while ensuring that our clients do not incur unnecessary expenditure.”

The new website reflects the professionalism of the company. It has a futuristic and sophisticated look while being easy to navigate and presenting all the important information at first glance. The right blend of colored and white spaces on every page of the website ensures a high visual appeal. The website is easy on the eyes and has a high informative value as well.

About IT ArchiTeks

IT ArchiTeks, based in Frisco, Texas, specializes in providing services related to hardware, software and networks within Intranet and Internet environments. The company has certified technical personnel who help small and big businesses enhance their performance and profitability with the use of latest advancements in information technology. IT ArchiTeks is a dynamic company that evolves with time and keeps abreast of the latest technological developments in its field of work.

Has Your Business Been Impacted by a CryptoLocker Virus?

Despite the enormous publicity surrounding the staggering losses created by CryptoLocker and its variants, few small businesses have taken steps to prevent it. In this article are some of the best ways to avoid lost revenues and other negative results of ransomware infections.

Know the Facts of CryptoLocker

Despite common misconceptions, CryptoLocker and similar malware spreads through certain methods such as:

  • Opening a ZIP file from a spam email that’s disguised as normal correspondence
  • Drive-by downloads that occur without clicking a link or an acceptance button
  • Pop-up ads

Once the machine is infected, CryptoLocker takes the following steps.

  • It creates an autostart registry entry that hijacks the .exe file extension, so programs delete shadow copies and prevent local restoration.
  • It finds and communicates with command/control servers to get a public encryption key for the machine’s data.
  • It scans network and physical drives for common file extensions and encrypts those files, making them completely unusable.

The machine’s user then sees a ransom screen that demands the payment of a certain amount of bitcoin within 72 hours, in exchange for a private decryption key. Much of the public is unaware of the risks of CryptoLocker, and most malware removal tools will remove it, but the files will remain inaccessible.

Block .exe Files in MS Office 365

The most effective way to block the virus in Office is to block all attachments containing .exe files. Take the following steps:

  • Log into Office under administrator privileges
  • Click Exchange under the admin menu on the left
  • Click the Mail Flow option
  • Create a rule that blocks executable content
  • Click More Options to see available rule options
  • Apply the new rule to all attachments with executable content

Now these messages will be deleted without notification. While Office 365 makes up about 70% of the Internet’s email services, similar options are available in other spam filters. There’s no real reason to get .exe files by email, but exclusion conditions are available.

Turn On Filtering for Malicious Websites

Filtering is a bit controversial because many apps show a continuous connection, making it impossible to find out how long someone has been online. There may be conflicts between business and personal activities, but the desire to avoid malware is universal. Therefore, most firewalls offer categorical web filtering that automatically blocks sites known to be risky.

Use Cloud Management to Protect Devices

Today, people do just as much work away from the office as they do while there. This means that onsite antivirus and software update systems can’t provide up-to-the-minute protection for most users. With cloud management services, security policies are automatically enforced and updates are pushed to devices whenever they connect to the internet. Furthermore, users can see each device’s real-time status to run malware scans, pinpoint infections, and perform full wipes.

Take Away Local Administrator Privileges

Somewhat surprisingly, some business apps still require users to have administrator privileges. Nevertheless, most users shouldn’t be in a local machine’s admin group; this prevents apps from running without the proper authorization. Users should have to enter a local admin username and password to install new software. While this is inconvenient, it can prevent malware and inadvertent system changes that can do immense damage. Local admin passwords can be changed as necessary, and advanced permissions can be granted on an as-needed basis.

Turn on System Restore

With system restore points, users and system owners can recover from bad driver updates and malware. Access it by opening the System Protection menu, which is in the Control Panel. System Protection is another important option; it has to be activated under the Configure menu. By rolling back to an earlier restore point, users can efficiently and quickly remove malware.

Implement Software Restriction Policies

Since CryptoLocker first became a problem back in 2013, a surprising number of enterprises haven’t formed software restriction policies to prevent it. Start by creating a group software restriction policy that blocks %LocalAppData%\*.exe files. This step requires testing, but it’s likely that the policy should be applied domain-wide. While users may have to use GPUPDATE /FORCE, restart a machine several times, or wait a day for the restrictions to take full effect, these restrictions are beneficial in preventing virus outbreaks.

Set Up AppLocker for the Environment

AppLocker provides enhanced restriction policies that are based on a file’s attributes, such as version, publisher, and digital signature. Policies can be deployed by user or security group, and they can be managed via PowerShell. There’s a step-by-step guide that covers the most common scenarios, and Microsoft Virtual Academy has plentiful resources as well.

Avoid OneDrive Syncing

As many have found, it’s not very practical to sync large amounts of data at regular intervals. If OneDrive files or other cloud data are synced to a local machine, it becomes vulnerable to CryptoLocker infection. When current apps such as MS Office are opened, OneDrive is one of the open locations. OneDrive can be added to a Favorites menu, and the link is a URL that’s inaccessible to CryptoLocker.

Put Data in SharePoint Online

Just as in the example above, data stored in a SharePoint Online document library is accessed via a URL rather than a drive letter. Not only is it inaccessible to CryptoLocker and similar viruses, the data can be used in Explorer just like any other folder. With SharePoint, users can find out when a file was last accessed and/or modified, and by whom, and they also get change alerts and previous versions. Data is more accessible, and users escape the tedious job of updating and maintaining another server.

Set Up SAN Snapshots

If a user has over a terabyte of data, they should consider a SAN, or storage area network. Apart from providing central storage for diverse servers, users get faster file access and easier storage expansion. Unlike a shadow copy held on a server, a SAN snapshot can’t be infected by a virus. With SAN snapshots, it’s easier to perform restorations and recover from CryptoLocker. These snapshots simplify compliance with schedule retention requirements and they use less storage than local copies. Furthermore, they can be replicated externally for additional protection.

Ensure Complete Retention and Backup

Because of the simplicity of online backup, many users don’t learn what’s being done or what they get for the price they pay. Many providers, to lower costs, perform limited backups without retention. In many cases, restoration tasks either fall to the customer or are separately billed. When CryptoLocker strikes, an unknowing user may find that restored data is a combination of files created since the online backup process started. Here, restoration can take several days rather than a few hours. To prevent CryptoLocker damage and other related difficulties, choose a comprehensive backup and retention solution.

Put These Strategies Into Play

When users implement the above strategies, they can prevent revenue losses and other damages associated with a CryptoLocker infection. If a small business owner needs help, they can contact a reputable IT company for advice and service.