From technical highlights to giving back in the community, we wanted you to know our perspective.

Ransomware Attacks Increasing

November 11, 2021. Charlotte, NC.

Ransomware attacks have been on the rise over the past several months. All evidence indicates that these attacks will continue to rise. What can you do to protect yourself?

Here are four tips to keep your data and systems safe.

  1. Do not share your passwords. The Colonial Pipeline attack used a compromised VPN account password. The first step is to educate yourself and your employees to NEVER share your passwords.
  2. Make reliable backups and periodically test them.
  3. Avoid clicking on unfamiliar links in emails and texts.
  4. Select a reputable antivirus or endpoint detection software solution and keep your software updated.

Watch Out For These Malware Types

October 15, 2021. Charlotte, NC.

Malware, which is a term used for malicious software, is defined as software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems. Below are some common forms of Malware to avoid.

Adware — Adware automatically delivers advertisements to generate revenue for its creator or a third party. It is often used in conjunction with spyware.

Backdoor (trapdoor) — A backdoor allows cybercriminals to access a computer without the user’s knowledge. Backdoors are meant for future use and can remain in a system for years without being noticed.

Rogueware — Rogueware misleads users into believing their device is infected so they will click on a fake warning, which promptly installs malware.

Ransomware — Ransomware restricts users from accessing a system or its data, and often threatens to publish or delete data, until ransom is paid. Locker ransomware restricts access to the infected device, while crypto ransomware restricts access to stored data and files.

Spyware — Spyware is designed to gather information about a user or business. Once installed, it can log keystrokes and extract sensitive information. Spyware can also enable hackers to watch and listen through cameras and microphones.

Trojan horse — A Trojan horse imitates legitimate software to deceive users into installing other malware.

Virus — The oldest type of malware, viruses alters the way a computer operates. A virus can replicate itself and spread to other devices, but it must be attached to another program or executed by a user action.

Worm — Worms are the most common type of malware and one of the most dangerous, because they can replicate themselves without being attached to a program or run by a user.

Breast Cancer Awareness Month - A Time of Reflection for LisiProta Services, LLC

October 10, 2021. Charlotte, NC.

The month of October is Breast Cancer Awareness month. Many of our lives have been touched by cancer. Early detection is essential to conquering the battle.

LisiProta hopes to do its part in helping to raise awareness about breast cancer and breast cancer screening. One of our clients, Phenogen Sciences, Inc has developed a comprehensive cancer screening test named geneType. Take a look at their site when you have a moment, as this may be an option for you.

Ric Dillahunt, COO
Ric Dillahunt, COO

Due to injury, Ric didn't participate in the Susan G. Komen Walk this year, but in years past he has always been a supporter. "Breast cancer has been something that has touched my life." says Ric. "We are definitely hopeful that increased research and technology will help to combat and potentially cure this disease in the future. Until then, we'll do all we can to provide our support to women battling this disease."