<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Cyber Security and Cyber Monday: Top 7 Ways to Keep Safe this Holiday Shopping Season

Posted by Molly Abrahamson on Wed, Nov 23, 2016

Black Friday and Cyber Monday are just around the corner, and that means consumers across America will soon be in a shopping frenzy. Scoring the best deals on holiday gifts is awesome and all, but don’t let the shopping mania distract you from retail cyber security.

Read More

Topics: cybersecurity

Phishy Business - Protect Your Data

Posted by Melissa Cocks on Sat, Nov 19, 2016

How to Prevent Phishing Scams

Online Security Tips

When it comes to your personal account information, you can never be too judicious to whom you provide such information.  Phishing scams are not new, but they are still effective.  This is because most people want to be helpful and phishing scams take advantage of this by masquerading as someone or some company that they are not. 

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, email security

Adult Friend Finder and Penthouse Victims of Record Breaking Data Breach

Posted by Molly Abrahamson on Thu, Nov 17, 2016

The latest in massive data breaches: adult dating and entertainment company Adult Friend Finder Network has had the information of over 412 million accounts comprised in an attack on their database. The breach included “339 million accounts from AdultFriendFinder.com, which the company promotes as the ‘world's largest sex and swinger community.’”

Read More

Topics: cybersecurity

Newest Net Attack Sheds Light on the Dangers of IoT Devices

Posted by Molly Abrahamson on Thu, Oct 27, 2016

ddosattack-1.jpg

Two weeks ago, we predicted that distributed denial-of-service (DDoS) attacks using Internet of Things Botnet armies would become more frequent and more severe. Unfortunately, these predications are quickly coming true. On October 21st, a massive DDoS attack was launched against New Hampshire-based DNS provider, Dyn. Hackers used a publicly available Mirai source code to create a Botnet army and infect an estimated 500,000 or more devices, overwhelming Dyn with enormous amounts of junk traffic. Major websites who use Dyn, like Amazon, Twitter, Spotify, and Netflix, were brought down for hours. What’s worse, these compromised devices remain accessible to hackers. An IoT device could be anything from a CCTV camera to a printer. The devices often have weak passwords, as most manufacturers and users are not concerned with securing their products. Many of the devices used in the attack were products of the Hangzhou Xiongmai Technology of China, and the company is now recalling some of its devices, and issuing patches for others.

Read More

Topics: Data Security, cybersecurity

The 8 layers of cyber security needed to protect your business

Posted by Cathie Briggette on Tue, Oct 25, 2016

Ahmed Fadili Interview.png

An Interview with Ahmed Fadili at NSK Inc

As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support.  In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.

Question:  Do clients come to us regarding their security, or are we the ones that are bringing it to the forefront of their business? 

Read More

Topics: Disaster Recovery, Managed Services, Tech Fixes, IT Services, cybersecurity