Thursday, October 5, 2017

Technology Update for 2017

Seeing high CPU utilization? It may not be a fault with your computer.

Does your computer stutter when browsing certain websites? Does Windows Resource Monitor show high CPU utilization? Does your Mac's Activity Monitor show your CPU being overutilized? Usually, these symptoms would indicate a computer issue that would need troubleshooting but that may no longer be the case.

Your computer could be being hijacked to mine cryptocurrency. This is referred to as cryptojacking.

An increasing number of websites are including currency mining threads that use your processor to mine for their gain. More advertising networks are being hacked to include cryptocurrency miners and more malware than ever before is now using your computer to generate revenue rather than destroy or impact your data.

Forget Bitcoin, Monero, Litecoins, Dogecoins and Feathercoin are the new kids on the block and everyone wants a piece of them.

How does cryptocurrency mining work?

Bitcoin and other digital currencies are purely theoretical. Nothing exists, no paper money, no coins, no accounts, nothing. Everything is controlled by ledgers. Those ledgers are maintained by the companies that run the currency. To protect the currency, every transaction is encrypted and as you know, encryption is very resource intensive.

To help the system work, the processing of ledgers and transactions is farmed out to other machines, such as your PC to process. Your CPU will be given an encrypted transaction to process and the tools with which to do it. Your processor completes the calculation and sends the result to the central ledger.

In consensual cryptocurrency mining, you are then paid a fixed amount per transaction. You can run these transactions persistently to mine cryptocurrency.

The trouble is, websites and malicious code are using our computers to mine cryptocurrency without our knowledge. We pay for the electricity and contend with a slow computer but get none of the benefit from it. According to the piece from Adguard linked above, 500 million computers are being used to mine cryptocurrency without their owners even being aware.

Some of the websites that feature cryptojacking code profess no knowledge of it. Given the anonymous nature of cryptocurrency, we have to take their word for it.

How to tell us a website uses cryptojacking code

There is a quick and easy way to tell if a particular website uses cryptojacking code. If your CPU utilization spikes on a particular website or page, go to a different page. If utilization drops, it is a good indication that it is cryptojacking you. You could also shut down your browser as a double check.

How to prevent cryptojacking

While not as dangerous as malware or a virus, cryptojacking is still using your computer for someone else's gain. That is not acceptable and we need to do something about that.

Your first line of defense is an adblocker. As many types of cryptojacking code are served through infected ads, a good adblocker can stop them.

Next is a good quality malware scanner. Some types of cryptojacking code are delivered through malware and will not be detectable by an adblocker. If you see CPU utilization spike, run your scanner and remove anything it finds. If you still see high utilization, run your antivirus too, just in case.

Finally, there are some browser extensions emerging designed to block all manner of cryptojacking code. Extensions such as AntiMiner, NoCoin and MinerBlock are being tested to see if they can protect your computer.

Some websites are being up front about using cryptocurrency mining to help pay the bills. These sites we have no problem with and would suggest letting them use your computer to help keep the lights on. As more of us block ads to protect ourselves, this trend is likely to continue. If the website is honest, I see no issue with it. If they try to hide it, they deserve to be blocked.

Tuesday, October 3, 2017

8 Things to Cover in Your Managed Services Agreements

Outsourcing your IT processes to a Managed Service Provider (MSP) is a great idea. But to benefit the most from an MSP, it is essential that both the parties are on the same page regarding requirements and deliverables.

With an accurate Managed Services Agreement outlining the services provided by MSP, clients can build realistic expectations while covering the MSPs against liabilities.

While creating a Managed Services Agreement, there are certain things which you shouldn't miss out; let's go through them in detail.

1. Services

The first and foremost thing to be included in your agreement is the kind of services you are going to provide to the client. Whether it is just management, cloud, support services or a package of all of them; everything should be clearly outlined. It is also important to mention which services are excluded to avoid future complications.

2. Response time

The agreement should clearly define the duration of which you will be responding to an issue brought up by your client. Make sure to specify your business hours and if you will be providing services in addition to those business hours. If yes, then whether extra charges would be applicable for that or not.

3. Responsibilities

Your Managed Services Agreement should clearly account for all the things you will be responsible for during your association with the clients. It should state what responsibilities will be taken up by you in cases of system, hardware or network failures or glitches.

All such scenarios should be pointed out in detail so that the client doesn't form any misconception about your services.

4. Availability

Your client can build unrealistic expectations regarding the services they will be getting from you. To avoid this, it is very important that you define the realistic services which you will be able to provide them. For example, how fast will you be fixing any system failure or disasters? How often will backups be carried out? It will provide them with a real assurance of your services.

5. Client demands

To avoid getting called for unreasonable client demands, it is important for you to define your system requirements. What that means is, there must be some standards defined in the agreement on the basis of which the client will be able to avail your services. If these set standards are not met, you are not liable to offer your services.

6. Guarantee

Don't promise more than you can deliver. While confirming your alliance with any of your clients, be sure about your deliverables and abilities. It is best to avoid making false guarantees in order to acquire a prospective client.

7. Performance

Your agreement should document expectations concerning system performance with clarity. It is especially helpful if you are dealing with services related to hardware, workstations and third-party systems.

8. Priorities

It is possible that your clients might trouble you with petty issues and make them seem as urgent. To avoid this scenario, you must define your priorities without any confusion. It gives your client a clear idea of what problems can be stated as urgent and which of them can wait a little longer for solutions.

So the next time when you are getting that agreement ready, make sure to tick these points off your list for a smooth alliance.