ConnecT Now Follow us on TwitterFacebook
Call 866-IT-TECHS


Make sure you are protected from vulnerabilities that can be exploited by Viruses, Spyware and now Ransomware

Get Protected Now!!!
Ransomware cryptolocker removal

The FBI is aware of a file encrypting Ransomware known as CryptoLocker. Businesses are receiving e-mails with alleged customer complaints containing an attachment that when opened, appears as a window and is in fact a malware downloader. This downloader then downloads and installs the actual CryptoLocker malware. The verbiage in the window states that important files have been encrypted using a unique public key generated for the computer. To decrypt the files, you need to obtain the private key. A copy of the private key is located on a remote server that will destroy the key after the specified time shown in the window. The attackers demand a ransom of $300 to be paid in order to decrypt the files. Unfortunately, once the encryption of the files is complete, decryption is not feasible. .... The recommended solution is to scrub your hard drive and restore encrypted files from a backup...
10/31/2013 FBI.GOV

The best Defense is Prevention:  The FBI.GOV recommends only going to safe sites but you cannot control the behavior of all your employees and accidents do happen.  What you can do is make sure your systems are protected in the four ways that we recommend. (Firewall, AV, MS Updates and off-site backups)

FirewallWith a current Sonicwall firewalls an organization can block SPAM, SPyWare, Viruses and in appropriate content from coming into their organization.   You can also block Facebook and EBay to help prevent your employees from wasting time online.

Workstation /Server MS UpdatesYour organization should have a SUS server to apply and report the status of MS updates on all workstations and servers in your institution.  Or use a monitoring / managed services, service that applies updates and patches to your systems.

AntiVirus / SpywareYour institution should have a managed AntiVirus Solution that can generate reports about viruses updates, scans and infections.  We commonly use Symantec EndPoint protection for this

Online BackupsYour vital data should be backed up at least once a day and then stored off-site.  There are various products out there that will do this for you but we use Crash Plan Pro, ibackup and Sugarsync.  You can always access your data from a remote location, so if there was a disaster you still have access to your data

Already infected?
    We can help - Call 215-701-8152 Option 1

    Help yourself -
Boot to safe mode with networking.
Press Ctrl , Alt, Dlt and end task anything that is not standard.
combofix and malware bytes and let them update
        Run combo fix
        Reboot to safe mode again
        Run Malware twice

Feel Free to call and talk to someone in sales at 866-IT-TECHS begin_of_the_skype_highlighting              866-IT-TECHS      end_of_the_skype_highlighting 215-701-8152 extension 2


Proven Solutions

Contact info

Feel free to contact us or please fill out form and we will be back to you shortly.


 111 Presidential Blvd, Suite 165, Bala Cynwyd, PA., 19004
Telephone: +1215-701-8152
FAX: +888-729-7709

Frequently Asked Questions


ConnecTechs has compiled a list of questions that some of our new clients have had during the conversion process.  Click below to read more about what to expect if you were a ConnecTechs client.  


Internet Service Options


Are End-Users complaining about slow speeds, need redundancy, or just looking for a lower price.  ConnecTechs has partnered ISPs with whom we think are the best ISP providers to offer our clients solutions to meet their needs.


Backup Solutions


ConnecTechs Backup Solutions range from  business continuity appliances with virtualization,  disaster recovery, bare metal restore and overnighting new appliance with data  to economical solutions offering off-site storage solutions.