IT Consultants' Insight on Business Technology | NSK Inc.

Are Remote Employees a Security Risk

Posted by Cathie Briggette Fri, Aug 18, 2017

Written By Guest Blogger:  Caroline Black

We have entered the world of the flexible workforce. More and more companies, and people, are turning their backs on the way we used to work. There are great benefits in working from home or allowing employees to do so, for both the employer and employee. These include reduced overhead costs, increased engagement and improved productivity, to name a few. However, having even just one remote worker can expose a company to a wide variety of previously unknown security risks.

Read More

Topics: Mobile Device Management, cybersecurity

BitHawk - An example of finding Adware/Malware on an Android phone

Posted by Cathie Briggette Wed, Jul 19, 2017

 

NSK’s new product BitHawk is a new cyber defense application that picks up where your antivirus solutions leave off.  It provides our customers with powerful, efficient protection and system clean-up capabilities. 

Below is an example of how it found an app on one of our Clients phone’s that was connected to Chinese adware/spyware servers and collecting data from the person’s phone. 

Read More

Topics: cybersecurity

Warning!  Don't Click!

Posted by Cathie Briggette Thu, Jul 13, 2017

The internet has become an indispensable tool for everyday life, both personal and business. Its global use and familiarity have also opened the doors for cyber criminals to take every opportunity to exploit vulnerable people through disturbing online attacks. Online scams and malware are also becoming increasingly sophisticated, and while many of us are aware of what to look for and what to do when they arise, there are some that may still be confused by the latest scams discussed in the media.

Read More

Topics: cybersecurity

Protecting your company against ransomware attacks

Posted by Hannah Manning Wed, Jun 28, 2017

One of a company’s worst nightmares goes a little something like this.

An employee boots up their computer at the beginning of the work day. A couple of minutes into work they get an email from someone who seems to be a coworker. They click the link without thinking, and a message flashes onto their screen:

“Your files have been encrypted. You have 24 hours to pay a fine of $500. If you do not pay the fine, your files will be permanently encrypted.”

Yesterday, for several companies across Europe and Asia and even in the United States, that nightmare became a reality.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, ransomware attacks, Malware

What does it mean to be security aware?

Posted by Hannah Manning Tue, Jun 27, 2017

In previous blog posts, we’ve talked a lot about how important it is to be aware of how secure your firewall really is. But you may be wondering one thing: what does it even mean to be “security aware?”

Read More

Topics: Data Security, Cloud Security, anti virus, cybersecurity

E-manipulation: What is social engineering?

Posted by Hannah Manning Thu, Jun 22, 2017

So you have a Nigerian prince in your emails who seems nice enough. He’s never been anything but polite, and from the looks of it, he has had a rough time lately. As it turns out, being a prince is not as lucrative as it sounds. He just needs $12,000 from you to make it all better.

You know how this story ends. You laugh it off because you know it’s a scam – you don’t know this guy, why would you ever give him money?

But what happens when someone you do know emails you out of the blue, needing some cash? Or if a coworker asks for access to a file? Or if someone you’re pretty sure you know sends you a link that you just have to click?

Read More

Topics: Data Security, cybersecurity, social engineering, email security, BostonIT

Legacy Systems Interfering With Government's Cyber Security

Posted by Steven Lai Fri, May 19, 2017

Lately, political parties and governments have been serious victims of cyber-attacks.  These cyber hacks have affected millions of federal employee’s productivity in their work and have affected many outcomes of governments, such as voting results.

What is the cause for this?  The problem lies in the systems; they were built decades ago and as a result they are obsolete. Legacy systems are troublesome because they are out of date. Some legacy systems go back a half a century and cannot implement network defenses as a basic as encryption.  

Read More

Topics: Data Security, cybersecurity

Company Exec Posers, Spread Spam

Posted by Steven Lai Fri, May 19, 2017

Disguised payment requests are the result of financial losses for companies whose employees have been targeted and spammed with fraudulent emails. These Company exec posers, got their recipients to process payments for non-existent goods or services. They did it with a fake wire and/or card transfers.

This is a great example of social engineering and the W-2 phishing scam that had happened earlier this year.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

WannaCry Malware Attack 2017

Posted by TImothy Lasonde Tue, May 16, 2017

 

WannaCry update from NSK

                WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over. This unprecedented malware attack began sweeping the globe late last week, and security researchers estimated that nearly 57,000 computers in more than 150 countries were infected by the end of the day on Friday. While the spread of this terrifying ransomware was slowed on Saturday, it was hardly stopped. As of Monday morning, more than 200,000 systems around the world are believed to have been infected.

Read More

Topics: cybersecurity, Malware

3 BEST Ways to Protect your Cloud Accounts

Posted by Steven Lai Fri, May 12, 2017

There are quite a few cloud based applications,  such as iCloud, twitter, facebook, that are known to be easily hacked, especially with the wave of hacks against celebrity accounts.  So it is very important to take these three steps and measurements to ensure protection on all of your Cloud Accounts.

  

Read More

Topics: Data Security, Apple, Cloud Security, cybersecurity