<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Phishy Business - Protect Your Data

Posted by Melissa Cocks on Sat, Nov 19, 2016

How to Prevent Phishing Scams

Online Security Tips

When it comes to your personal account information, you can never be too judicious to whom you provide such information.  Phishing scams are not new, but they are still effective.  This is because most people want to be helpful and phishing scams take advantage of this by masquerading as someone or some company that they are not. 

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, email security

Adult Friend Finder and Penthouse Victims of Record Breaking Data Breach

Posted by Molly Abrahamson on Thu, Nov 17, 2016

The latest in massive data breaches: adult dating and entertainment company Adult Friend Finder Network has had the information of over 412 million accounts comprised in an attack on their database. The breach included “339 million accounts from AdultFriendFinder.com, which the company promotes as the ‘world's largest sex and swinger community.’”

Read More

Topics: cybersecurity

5 Ways Your Cloud-Computing Security Could be at Risk

Posted by Molly Abrahamson on Tue, Nov 08, 2016

In a recent study, the Ponemon Institute interviewed 3,476 IT professionals and IT security practitioners from the US and around the globe. It was discovered that 73 percent of respondents find cloud-computing and cloud-based services vital to their organization’s operations. 54 percent however, said that their companies don’t have a proactive approach to security. As cloud-computing becomes more useful and popular, it is critical to pay attention to the security of these cloud services, especially when the customer data stored in the cloud is the data most vulnerable to hackers. According to the report, “protection of data in the cloud is important but not practiced.” Security breaches result in a lack of customer trust, which leads to a decline in revenue.

Read More

Topics: Cloud Security

Newest Net Attack Sheds Light on the Dangers of IoT Devices

Posted by Molly Abrahamson on Thu, Oct 27, 2016

ddosattack-1.jpg

Two weeks ago, we predicted that distributed denial-of-service (DDoS) attacks using Internet of Things Botnet armies would become more frequent and more severe. Unfortunately, these predications are quickly coming true. On October 21st, a massive DDoS attack was launched against New Hampshire-based DNS provider, Dyn. Hackers used a publicly available Mirai source code to create a Botnet army and infect an estimated 500,000 or more devices, overwhelming Dyn with enormous amounts of junk traffic. Major websites who use Dyn, like Amazon, Twitter, Spotify, and Netflix, were brought down for hours. What’s worse, these compromised devices remain accessible to hackers. An IoT device could be anything from a CCTV camera to a printer. The devices often have weak passwords, as most manufacturers and users are not concerned with securing their products. Many of the devices used in the attack were products of the Hangzhou Xiongmai Technology of China, and the company is now recalling some of its devices, and issuing patches for others.

Read More

Topics: Data Security, cybersecurity

The 8 layers of cyber security needed to protect your business

Posted by Cathie Briggette on Tue, Oct 25, 2016

Ahmed Fadili Interview.png

An Interview with Ahmed Fadili at NSK Inc

As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support.  In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.

Question:  Do clients come to us regarding their security, or are we the ones that are bringing it to the forefront of their business? 

Read More

Topics: Disaster Recovery, Managed Services, Tech Fixes, IT Services, cybersecurity