Security is at the Top of Healthcare Providers’ “Must-Do” Lists—Or It Should Be

“Houston, we have a problem.” This is not news to healthcare organizations, whether they are in Houston, Boston, St. Louis or San Francisco. 2015 was a banner year in healthcare, for all the wrong reasons. The increasing number of attacks on healthcare systems exposed security shortcomings: many unsecured attack vectors, compromised sensitive data and the possibility of catastrophic consequences.

2016 will bring more of the same. Healthcare organizations must speed up their security efforts to avoid putting their patients, and themselves, at risk. There were multiple data breaches in 2015—Anthem and Premera among them—as well as a well-publicized ransomware attack on Hollywood Presbyterian Medical Center. 2016 will continue those trends. In fact, the Hollywood Presbyterian attack could have been the proving ground forthat ransomware, which may be put into larger, more costly attacks in 2016.

Fortunately, there is growing recognition among healthcare leaders that security needs to be at the top of their “must do” list. Firewalls are no longer enough to protect patient information. The expansion of the Internet of Medical Things has resulted in a borderless network perimeter. There are devices in use in multiple locations that must be secured, including: Continue Reading This Article


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

Understanding Consumer Behaviour from Wi-fi Insights

We have all embraced online searching and shopping. The days of driving around town to compare costs or referring to the most current newspaper advertisement for a bargain have long gone. Today’s consumer reaches out via the Internet on a variety of devices to check product reviews, find discount coupons, locate attractions, and read email sales notices from their favorite companies. Click Here To Continue Reading


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

Nemucod Adds Ransomware Routine

It came to our attention that a new, rather peculiar version of Nemucod has been recently landing on users. Nemucod is a well-known JavaScript malware family that arrives via spam email and downloads additional malware to PCs. Most recently, Nemucod has been known to download TeslaCrypt ransomware variants.

However, the last few weeks saw a shift in Nemucod variants–it now has a code to drop ransomware from its body. The sample arrives via a typical Nemucod spam with encrypted JavaScript attachment.

Upon decrypting the JavaScript, we can see that it attempts to download a file on the user’s temporary directory from compromised websites. The downloaded file is an executable file that is later on used to encrypt the user’s files: Click Here To Read The Rest of The Article


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

Enable date and time voicemail was recorded

Question: Is it possible to configure time stamps for voicemail when they are recorded enabling you to know when a user left the message?

Answer: Absolutely, in fact, it comes on by default. The only real thing you need to do is ensure that the date and time are properly set on your system. Below is a list of means to access the time stamps.

Timestamp for voice messages can be viewed in three different ways:
1)  voicemail to email will include timestamp info, i.e.
      Voice Mailbox 451 – Sales
New message from XXX XXX XXXX  IRON OAK IT INC
Received: Friday, March 20 at 11:52am
Length: 40 seconds
Total un-reviewed messages: 1
Total saved messages: 6

2) When listening to messages on a local or remote phone, press 5 to listen to message info including date and timestamp

3) You can open the Voicemail Manager option in the management console.
From there you can download all the messages from a mailbox, and the filenames will include date and time info, i.e.:
– [NEW][PRO LINK MORTG][1403xxxxxxx]~150401084901.wav
the number at the end shows 2015 april 1st at 8:49:01 AM


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

Site to Site VPN Performance issues

Question: Was asked this a while back and while surfing the net it jogged my memory. A user was experiencing pretty poor performance when using site to site VPN’s. This is going to show the age of the question as they were using FortiOS 5.0.5. Normally, this is because of a bug relating to NPU acceleration on the tunnel experiencing the degraded performance. You can disable NPU acceleration for said tunnel and you will usually resolve the issue. Use the commands below.

config vpn ipsec phase1-interface
edit <tunnel name>
set npu-offload disable
end


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

Replacing hardware that is logging to a FortiAnalyzer

I am sure you have all come across this issue. You are logging your FortiGates (or other devices) to the FortiAnalyzer and you experience a failure of said hardware. You have a backup of the config so you move the config over to the replacement device but now your new firewall or device is listed as an unregistered device in the FortiAnalyzer. This is actually a pretty easy issue to fix as you only have to replace the serial number of the original device with the serial of the new device. Below is the config steps to perform this via CLI of the FortiAnalyzer:

execute device replace <old serial number> <name> <new serial number>


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

FortiAuthenticator SCAP Auto-Enroll

It is possible to use SCEP for the auto enrollment of devices in the FortiAuthenticator. You can even retrieve CRLs using this method. All you have to do when configuring this on firewall or any other device just use the following URL:
http://<fortiauthenticator IP>/cert/scep

Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

Connecting To The Web Based Manager – FortiAnalyzer 5.2

Connecting to the Web-based Manager

The FortiAnalyzer unit can be configured and managed using the Web-based Manager or the CLI. This section will step you through connecting to the unit via the Web-based Manager.

For more information on connecting your specific FortiAnalyzer unit, read that device’s QuickStart guide.

To connect to the Web-based Manager:

  1. Connect the unit to a management computer using an Ethernet cable.
  2. Configure the management computer to be on the same subnet as the internal interface of the FortiAnalyzer unit:
    • IP address: 192.168.1.2
    • Netmask: 255.255.255.0.
  3. On the management computer, start a supported web browser and browse to https://192.168.1.99.
  4. Type admin in the User Name field, leave the Password field blank, and select Login.

You should now be able to use the FortiAnalyzer Web-based Manager.


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!