oUR sPECIALTIES

Business Phone Systems Unified Communications

Why use our phone systems? Cloud-based phone services make your business more efficient and easier to manage. We replace existing phone equipment with a cloud hosted PBX, which means your desk and smart phones work together and can be managed from your web browser and a mobile app. Cloud phone systems make it easier for your customer to contact your teams, turn any location into a workplace and reduce your current expenses.

It Security

Comprehensive Security

Authentication & Access

Intrusion Detection & Prevention

Security Audit

Industry Specific Best Practices

Managed Service Provider

Managed IT Help Desk

Managed Security

Managed Backup

Cloud Services

Managed Internet Access

Drop US a line

UX Design

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonumm.

UX Design

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonumm.

UX Design

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonumm.

UX Design

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonumm.

UX Design

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonumm.

our Profile

Name TroubadourLTD.com

Location Katy, Texas

Email info@troubadourltd.com

Website www.troubadourltd.com

 

If you or your company are a victim of a security threat or scam, please contact us on the form below.

 

 

cyber

Current Global Security Threats

Botnets

If you’ve never heard of a botnet, it’s likely because they go largely undetected.

What they are:

A collection of software robots, or ‘bots’, that creates an army of infected computers (known as ‘zombies’) that are remotely controlled by the originator. Yours may be one of them and you may not even know it.

What they can do:

 

  • Send spam emails with viruses attached.
  • Spread all types of malware.
  • Can use your computer as part of a denial of service attack against other systems.

 

Distributed denial-of-service (DDoS) attack

What it is:

A distributed denial-of-service (DDoS) attack — or DDoS attack — is when a malicious user gets a network of zombie computers to sabotage a specific website or server. The attack happens when the malicious user tells all the zombie computers to contact a specific website or server over and over again. That increase in the volume of traffic overloads the website or server causing it to be slow for legitimate users, sometimes to the point that the website or server shuts down completely.

It could be possible for malicious users to use your computer in one of these attacks. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a website or send spam to particular email addresses. The attacks are “distributed” because the attacker is using multiple computers, including yours, to launch the denial-of-service attacks.

What it can do:

The most common and obvious type of DDoS attack occurs when an attacker “floods” a network with useless information. When you type a URL into your browser, you are sending a request to that site’s computer server to view the page. The server can only process a certain number of requests at once. If an attacker overloads the server with requests, it can’t process yours. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying access to legitimate users.

Wi-Fi Eavesdropping

WiFi eavesdropping is another method used by cyber criminals to capture personal information.

What it is:

Virtual “listening in” on information that’s shared over an unsecure (not encrypted) WiFi network.

What it can do:

 

  • Potentially access your computer with the right equipment.
  • Steal your personal information including logins and passwords.

 

WPA2 Handshake Vulnerabilities

The Key reinstallation attack (or Krack) vulnerability allows a malicious actor to read encrypted network traffic on a Wi-Fi Protected Access II (WPA2) router and send traffic back to the network.

What it can do:

Krack can affect both personal (home users, and small businesses) and enterprise networks. Any devices that are connected to the network, such as laptops, smartphones, smart devices, even an installed USB key, can be read by the attacker. A malicious actor could use this vulnerability to steal sensitive information, and also insert malware or ransomware that would make a website unsafe to visit.

 

Krack does not divulge Wi-Fi passwords to attackers, nor does it permit a malicious device to be connected to the network. Krack is unable to compromise Virtual Private Networks (VPN) or HTTPS protocols used by online shopping and banking sites.

Source: https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx

This is us

IT Managed Services at our best

With over 50 years of combined experience in technology services, let us be your first stop for IT security management.