World backup day 2017 celebration

Posted by Michael Trimblett on 31 March 2017
World backup day 2017 celebration

Happy world backup day!

(Yes, World Backup Day is a thing)

Did you know that over 60 million computers will fail worldwide in the next 12 months?  1 in 10 computers will be infected with a virus every month?  29% of disasters are caused by accident?  What would you do if you lost everything?  It's a scary prospect considering that 30% of people have never backed up their data!  Don't let this happen to you.

When was the last time you backed up your data?
Is your data recoverable if there was a disaster?
Who checks your backup to make sure it is working?

If you answered "I don't know" to any of these questions, Loyal I.T. Solutions can help.  Our offsite backup solution ensures your data is backed up, recoverable and that a human checks your backup status daily.  Also, any backup maintenance required is included in the low monthly cost.

For the month of April, we are offering free installation and 1 month free of our offsite backup service ($400+ saving).  Call us to discuss your backup needs.  Place an order with us in what we are calling "World Backup Day Month" to secure your special pricing.

To learn more about World Backup Day visit the website:


Posted in: Services IT  

Mick's milkshake story

Posted by Naomi McCahon on 15 March 2017

It was a dark and stormy Tuesday afternoon in mid-March, 4 dedicated Loyal team members made a sudden (but planned) attack on the West Gosford Blood bank to donate their exquisite blood. We entered the building with pride & courage due to the support we have for our dear friend and teammate Adam King.

Mick was the first in line, "Mr. Boss Man" was on the frontline, he rolled up his sleeves and ended up having to get stabbed twice for his blood to flow. He was ever so fearless, but in the back of his mind was the thought of the most amazing milkshake he would make himself as a reward for his bravery.

Next it was Naomi, she was confident when she entered the screening test, however she was knocked back into place as she was told that she had low hemoglobin levels (first time ever) and had to have further testing before she was allowed to donate she passed, as it was a false reading and has battle scars on both arms to prove she was there in the battlefield.

MT, was third in line. He was all prepared to be denied the privilege, however they surprisingly found nothing wrong with him, he had ticked all the right boxes and was marched to the donating chair. With a little apprehension in his eyes, he manned up and took one for the team.

Then it was lucky last, Raewyn a newbie to the Loyal donating team, however she was imagining she may not pass the test phase and would just enjoy the treats while watching us suffer. Raewyn was given the green light and was rearing to go, we heard a little nervous laugh as she was making her way to the chair, while hooked up to the blood sucking machine, Raewyn was told she had amazing veins and had completed her mission in less than 6 minutes.

All of us then met up at the break area, Mick made that milkshake he was visualising, MT complained that Naomi took the last chocolate muffin, but then decided that blue berry was going to be pretty satisfying, Raewyn was given "Queen" like treatment from one of the staff members offering to make her a milkshake, Mick was disappointed he couldn't show off his talents with how he can transform milk into so much more.. A milkshake!!!

We all enjoyed our outing, our task, our mission, and hopefully we helped save 12 unknown lives today!!!

Posted in: Team News Community  

Loyal I.T. is busy saving lives

Posted by Michael Trimblett on 27 February 2017

Late last year the team rolled up their sleeves and gave blood again.  Well, most of us did.  Unfortunately, Michael Trimblett was denied the ability to give blood this time.  No, it's not what you're thinking.  That's right, it was to do with some risky out-of-hours activities that left him with sores on his knees.  Before you jump to any conclusions, it was from playing Soccer 5's as goal keeper.  The wound was so innocuous it was nearly not mentioned on the screener form.  Luckily it was and the woman performing screening assessed it as too much of a risk for those requiring the blood.  As we would go on to learn, any form of infection that could be carried by blood, no matter how small, could have harmful effects on those receiving the blood.  This is why you must declare anything and everything that may cause ill-effects, not matter how small.

Naomi and Michael Goodwin (those who actually gave blood this time), were joined by a newcomer from the Loyal I.T. office, Brendan Lewis.  Hats off to everyone who gave up their blood and to Mick and Julie Goodwin for allowing our team the time to give back to the community.



Life-saving tally to date stands at 33!



Posted in: Team News Community  

Christmas and New Year period

Posted by Michael Trimblett on 22 December 2016
Christmas and New Year period
Loyal I.T. Solutions will be closed from midday December 23rd through to 8:30am on Monday January 9th.  We will have select members of our team available for emergencies between these two dates.  Should you require assistance in that time please contact our office on 02 4337 0700 for instructions.

We thank all of our clients for your continued support during 2016.  Wishing you and your families a very Merry Christmas and all the best for 2017.
Posted in: Team News  

I have an antivirus product so why do I keep getting infected with viruses and malware?

Posted by Michael Trimblett on 23 September 2016

There is no simple answer to this question.  To answer this question, we must understand the motivation for writing these malicious programs, the types of viruses, who gets targeted and why and finally, what can be done to prevent viruses and malware from entering your computer system and network.


Evolution of the virus

The answer to this question has changed over the years.  In the early days, it was mainly "script kiddies" that were starting out in programming and they decided to use their new-found skills to cause a nuisance and gain notoriety.  The real world parallel that can be drawn to this behaviour is someone spraying graffiti on walls or playing mailbox baseball.  This requires relatively little skill and infection usually requires user interaction.

As time has progressed, the behaviour has changed from being a nuisance to trying to keep itself alive.  In 1998 we saw email servers crippled with the Melissa Virus which took advantage of a bug in Microsoft Word and propagated itself to all of your Outlook address book contacts.  The ILOVEYOU virus was the successor to the virus in 2000 which operated in a similar way.

The next step in the evolution of the virus is the Worm.  This type of virus takes advantage of holes and bugs in Windows to propagate itself on computer networks and the Internet.  In 2001 Code Red worm was the first worm to grab headlines as it slowed computers and networks as it propagated itself.  An infected computer would then try to infect others and on a particular date and time the virus would try to bring the down by overwhelming it with traffic.  It managed to infect 250,000 computers in 9 hours.  The good thing is that this worm only affects computers before Windows 2000 (i.e. Windows 95 and 98).  You won't notice it these days but, if you set up a scanner on your internet connection you will see this worm is still living and trying to infect your network even to this day.  A virus called Storm, a follow-up to Code Red, reared its head in 2007 infecting between 1 and 50 million computers, where once infected, the computer would silently send spam email.  At one point it was believed to be responsible for 20% of the world's spam.  The main purpose of spam email is for monetary gain from unsuspecting users.

More recently viruses have not had the same impact as they did in the beginning of 2000.  This is due to people being more aware and preventative technology including Windows updates, firewalls, antivirus products and NAT (Network Address Translation) routers.  With the increase of awareness and security measures, the methods of infection have become much more cunning and required much more skill as a malware author.  As documented previously on this blog, Cryptolocker is the newest, most active and most lucrative piece of malware ever created.  Cryptolocker is a form of "Ransomware" that encrypts your critical data and provides you a means to pay for decryption.  A recent calculation shows Cryptolocker has netted its authors a total of $30 million dollars in 100 days.  As this threat has been so successful, many copycat viruses have shown up on the Internet.  So we are now faced with a threat that not only propagates automatically throughout the Internet but it is a program that is specifically designed to extort money from an end a user.

To summarise, we have seen viruses evolve from a simple nuisance through to an extortion tool.  Unfortunately, these attacks never get worse, they only get better.  Malware authors are always on the lookout for ways to gain access to your system.  The more applications you use, the larger the attack surface becomes.

Why do people write viruses?

These days, the motivation is money.  As described above, over the years viruses have evolved from being a mere nuisance for notoriety to an extremely profitable and damaging product.  With a windfall of $30 million in 100 days, is there any wonder why the virus industry is alive and well?

Types of viruses and malware?

When we talk about malware, there are many types of viruses and malware whose purpose can vary.  These also can vary from poorly written applications that tend to slow down or crash your computer to professionally written applications that perform in exactly the way the author intended and can stay hidden on your system for a long time.  There are two major classes of malware, malicious programs, and Ad/Porn/Riskware.  Within these classes are multiple sub-divisions.  With so many types of viruses and malware, finding an infection and eliminating it can be a difficult, especially if it jumps from computer to computer within a network.  The known malware types are documented below:

Malicious programs

Viruses and Worms:


Trojan programs:


Suspicious packers:


Malicious tools:


Adware, Pornware and Riskware






Display Advertising
Data collection


How do viruses get in my computer?

As technology becomes more complex, the software that runs on these systems becomes more complex.  It is very difficult to write a software product that is both functional and secure.  Most applications are written without a focus on security which can lead to sloppy programing which hackers can take advantage of.  Security is usually an afterthought as it is very costly to write a functional AND secure application.  The more applications you use on your PC and network, the greater the attack surface is.  The two things hackers looks for are attack surface and attack vectors.

Attack Surface:

The attack surface is increased by the number of applications you have installed on your computer.  The more applications, the more chance an attacker will have to exploit one of these programs.  The greater the install base of a program, the bigger the target.  For example, Windows XP is still being used by 45% of users worldwide, this is a very enticing product to exploit as the install base is so large.  Java (an application installed on Windows and Mac) is installed on over 4 billion devices worldwide.  Both Windows and Java are subject to new attacks almost on a daily basis.

You may remember a few years ago Apple Mac had the unique selling proposition of "we have zero viruses".  The reason they had no viruses was not great coding of their operating system, but it was the fact it had 1% of the worldwide PC market.  This install base was not tempting enough for hackers.  Over the years since then, Apple has increased its market share and as such has become a larger target for attackers.

Attack Vectors:

An attack vector is a path or means by which a hacker can gain access to a computer or network in order to install an application or malicious software.  Attack vectors enable hackers to exploit system or application vulnerabilities which can also include the human element.
Attack vectors include documents, e-mail attachments, Web pages, pop-up windows, instant messages, chat rooms, malformed images, website advertising, scripting, cracked/pirated software, USB or removable drives and deception.  All of these methods involve programming (or, in a few cases, hardware), except deception.  Recent cases of deception include phone calls from a person who claims to be from Microsoft and fools the user in to installing an application on their computer which compromises the security on the PC or network
To some extent, firewalls and anti-virus software can block attack vectors. But no protection method is completely attack-proof. A defence method that is effective today may not remain so for long, because hackers are constantly updating attack vectors, and seeking new ones, in their quest to gain unauthorised access to computers and servers.


The balancing act between usability and security

The main reason for lower security on computer is to provide the user with a better user experience.  The last thing most users want is the computer asking is it okay to perform this task? Or do you really want to access this part of the system?  Or the computer will ask the user for an administrative password to continue.  All of these are inconveniences that people do not have the time for and will increase calls to the helpdesk.  So, to shortcut this, the option is to turn off the warnings and give the user elevated privileges to the computer.  The problem with this scenario is that programs can run on the system without the user knowing.  This is the precise environment that allows viruses and malware to thrive.  So what is better for your business?  Happy users or locked down computer systems?  It seems you can't have both.

How can I protect myself?

The only 100% way to prevent yourself from getting a virus is going back to using pen and paper and not using a computer.  In most cases this is not an option.  So what else can be done to minimise your chances of contracting an infection?

Patch updating:

Every month (or often more frequently) Microsoft and other developers such as Java and Adobe will release patch updates for their software.  These are mostly security patches for their programs and are usually in response to known vulnerabilities in the software which are more than likely being used by hackers to compromise systems without the patch update.  Windows XP is 13 years old and is still having security patches updated each month.  Loyal I.T.'s Managed Services offering manages patch updating on all servers and workstations that it is installed on.

Use an antivirus product:

Installing an antivirus product is not a ticket to reckless on the Internet.  It is simply an extra layer of protection from the bad guys.  Antivirus products determine if a program is malicious by checking the program against its database of known viruses, this database is known as the Virus definitions.  Virus definitions are downloaded by antivirus programs almost once per day.  Whenever a program or file is accessed, the antivirus program scans it for infection, this is known as on-access scanning or real-time protection.  The system is also programmed to perform a full scan of the computer in case a virus has crept into the computer silently using a different/unknown attack vector.  The antivirus will also block suspicious activity which it may notice on your system such as a program trying to access certain files or make changes to the system, this type of detection is called heuristics.  Unfortunately, heuristics may lead to false positives and false negatives.  Depending on how the virus has been written it is possible for it to fool antivirus products into not detecting it, such as the always evolving Cryptolocker.  Loyal I.T. recommends Vipre Antivirus to protect your network, workstations, and servers.

Use an antimalware product:

As discussed above, antivirus products detect viruses by their signature or activity.  Malware that is not classified as a virus (commonly adware and spyware) will not get detected by antivirus products due to the program signature or activity not technically being viral activity (even though the outcome may look the same to an end user).  Whilst malware that is not a virus and is generally not openly malicious, it can invade your privacy by collecting data and sending data about you or leaving a door open (an additional attack vector) for a virus to infect your system.  As the water can sometimes be muddy between the definition of a virus and malware it is recommended to run both an antivirus and an antimalware scanner.  The most common free-for-use antimalware product is Malwarebytes.

Use a security firewall on your Internet connection:

One of the reasons why Code Red and Storm were so successful was that dial-up modems and routers would allow all traffic through them directly to the PC.  These days routers come with a low quality firewall NAT routing as standard which mitigates most unsolicited direct connections from the outside world to your PC.  This slows the propagation of worms.  It is recommended to install a higher quality firewall product on your internet connection.  Loyal I.T. recommends Draytek firewall appliances to protect your network from intrusion.

Disable scripting in your web browser:

99.9% of viruses and malware contracted via the Internet could be prevented by disabling scripting.  Unfortunately, most websites require scripting to display properly and as an unwanted side effect, viruses like to take advantage of scripting to deploy themselves on your PC or network.  Firefox has an add-on called "NoScript" and Google Chrome has "NotScript".  There is currently no comparative product for Internet Explorer.  These products are free however they become hard to manage as most websites will break and require you to manually allow scripting for these sites to work.  This comes back to usability vs security, you lose usability to gain security.

Add an advertising blocker to your web browser:

Surprisingly, even trusted websites can be the source of malware deployment by the way of scripting within advertising.  As many websites provide advertising via web advertising agencies, these agencies may not properly scrutinise the advertising they are providing and as such some advertising can contain malicious software.  The best way to minimise the risk of these advertisements infecting your computer is by using NoScript/NotScript or install an advertising blocker on your browser.  In Firefox and Chrome, the free add-on Ad Block Plus will block most advertising that may compromise your computer.  This however, raises an ethical question: if a website is providing a free service and is relying on revenue by serving you advertising then is it ethical to block the advertising and consume their content anyway?  This ethical conundrum can only be answered by the personal ethics of the end user.

Do not open emails or follow links provided by someone you do not know:

Email is the most common source for "clickbait" followed closely by social media on Facebook and Twitter.  With web services such as Bitly and other URL shortening systems it can be difficult (if not impossible) to know where the shortened URL will take you.  If it is sent to you by a source that you do not know or it is out of character for the person you know to send you a link, it will probably lead you to a website where you will get infected with a type of malware or virus.  It is best to ignore or delete these requests as soon as you get them.  It's akin to taking candy from a stranger don't do it!

Only visit websites you trust:

You can (mostly) get away with not having security on your computers if you enforce a policy of only visiting websites that you trust.  Web sites such as Google or banks will be okay but sites such as The Pirate Bay will not be.  As mentioned above, high-quality firewall products can enforce site filtering.  Blacklisting blocks known bad websites filtered by category such as social networking or advertising (the key is known there may be websites allowed that have malicious content i.e. a false negative).  There is also a filtering technology called Whitelisting (which is much more reliable) which blocks all websites unless they are specifically allowed.  Again, this will take quite a lot of time to properly manage but it again comes back to: do you want usability or security?

Do not allow administrative access to the PC being used:

To ensure a smooth user experience, users will ultimately be allowed to change configuration settings on their computer.  To do this, you need what's called local administrator rights or elevated privileges.  This allows the user to change various settings on the computer, access different sections of the computer and allow programs to be installed.  It is the allowing of programs to be installed that causes the most problem when talking about contracting an infection by malware or virus.  Installation of programs (including viruses and malware) contracted by surfing the web or following a malicious link often require elevated privileges.  If these privileges are turned off then the attack surface shrinks as some of the attack vectors become redundant.  Doing this however, will lead to a more restricted user experience and may result in more support calls in order to perform daily tasks.

Enable User Account Control on Windows Vista and above:

User Account Control is the pop-up message you will often see after you try to install a program or open a section of the computer that requires elevated privileges.  This is a warning to say something that will affect the system is about to occur.  If this message pops up and you have not started a program or do not know what could have caused it, press cancel to deny privileges to install on your system.  This is the final safeguard to prevent a virus getting in to your computer.  If you permit the unknown program to run then your system may become compromised by a virus or malware.

Now that you understand how viruses make their way on to your computer and the methods of virus prevention, please don't hesitate to contact us to help you develop a security strategy for your business.

More technical information


Attack vectors

Types of viruses

How antivirus products detect viruses

Why do people write viruses

Virus evolution

Posted in: Windows Security Networking Security  

Latest News

Phishing Emails - Don't Get Caught!

May 11 2020
Have you been a victim of phishing? Do you know how to recognise a phishing email?   ...

Email contact

for enquiries or log a job.

Just to let you know that Josh did a great job on Friday at St Leonards.

Tony Wilson
Read All
Bookmark SiteTell a FriendPrint