<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Protecting Client's Sensitive Data and Personal Information

Posted by Cathie Briggette on Tue, Mar 17, 2015

According to recent studies, phishing attacks increased by 59% in one year.  And Social Engineering and Hacker Attacks are increasing even more.

In 2014 Webroot and RSA, the security division of EMC, announced a new technology partnership.  The partnership created an integration with Webroot’s real time anti-phishing service and RSA’s FraudAction anti-phishing service.  This partnership created SecureAnywhere Antivirus.  Giving IT departments and managers the ability to detect phishing attacks in real time within their organizations. 

Phishing_Scams

SecureAnywhere Antivirus is more than an anti-phishing software. In addition to being excellent anti-phishing protection, it is antimalware protection, it includes firewall-style program control, and has powerful protection for your browser and secure connections.  It stops the viruses and worms that exist to infect other computers within your business infrastructure. It protects your employees while they are web surfing, by blocking harmful websites. And it takes down spyware that tries to deceive your employees or exploit vulnerabilities within your organization's operating systems.

Spyware steals information from computers and sends it to someone else. Some spyware is fairly benign. Adware, for example, watches you in order to tailor advertisements based on your habits. Adware can also happen with your consent if you opt to use a free service that involves accepting ads. Another less-lethal form of spyware is the tracking cookie. Advertising companies install cookies on your computer in response to you clicking on ads. Unless you delete it, the advertiser will know when you visit a site with its ads.

SpywareIf spyware was just adware and tracking cookies, it would just be annoying. But spyware has worse forms. Some spyware can change your computer settings, slowing down internet connections and slowing down your home page. Webroot SecureAnywhere Antivirus insulates you from these spyware attempts to infect your PCs.

Webroot SecureAnywhere works in a few different ways.

  • It scans data and blocks viruses that it detects.
  • It removes malware that already exists on a computer.
  • It can be programmed to scan PCs according to any schedule.
  • It looks at the Windows registry, operating system files and applications to give you a list of threats.
  • Unlike other antivirus programs that use the latest threat signatures to protect your PC, yet they cannot protect against a brand new, zero-day threat, Webroot uses other ways to detect threats based on the threats behaviors or by comparing with other known threat families.
  • The web protection includes warnings if you try to go to a malicious site that pops up in a search result
  • It protects you against phishing attempts and dangers that might arrive via Facebook or Twitter
  • It works on Windows PCs, Macs, Android Phones or Tablets, iPhones and iPads

The architecture of Webroot’s code uses a small footprint that gathers its information in the cloud. The actual signature database that is part of Webroot is housed in the cloud, so it does not take up space on your computers or servers.  This cloud based database relies on analyzing behaviors of suspected malware. It is compact and efficient.

NSK's IT Managed Services protects our client’s sensitive data and personal information with antivirus, internet security and identity protection.

Outsourced IT Services - Managed Services

 

Read More

Topics: Managed Services, Data Security

Tech Fixes: How to Avoid Ransomware Exploitation

Posted by Philip Tang on Fri, Mar 06, 2015

Ransomware infects a victim's computer, encrypting a majority of important files and essentially holding them hostage

A bank robber and a cyber criminal both take hostages in an attempt to steal money - the former uses people as hostages, the latter your personal computer files

What is Ransomware?

Ransomware is the tool by which cyber criminals exploit unwary computer users, particularly users of Windows XP, Vista, 7 or 8. Whereas a robber stealing from physical banks may hold innocents hostage with a gun to their heads, a cyber criminal uses malicious software to lock down your files.  Just as a teller may be pressured to stuff money into the robber's brown burlap sack in this situation, you may be forced to pay the cyber criminal's ransom to regain access your precious files. 

Read More

Topics: Data Security, Tech Fixes

Tech Fixes: Seven Steps to Creating Layers of IT Security For Your Data

Posted by Cathie Briggette on Mon, Feb 23, 2015

Is_my_data_safeProtecting your data is like any other IT security challenge, it is about creating layers of protection.  The idea of layering security is very simple:  You CANNOT and SHOULD NOT rely on just one security mechanism, such as a password to protect something that is very sensitive to your business.  If that security mechanism fails, you have nothing left to protect your information.

Read More

Topics: Data Security, Tech Fixes, IT Services

Tech Fixes: Methods to Protect Yourself Against Identity Theft

Posted by Philip Tang on Fri, Feb 20, 2015

The 201 CMR 17 demands companies to safeguard personal information, but taking action on your own will make you even safer.Identity_Theft

Thanks to Massachusetts General Law 93H (MGL 93H) and 201 CMR 17, state businesses have been mandated to produce comprehensive data security programs to protect their customers' personal information since 2010.  

Read More

Topics: 201CMR17.00, Data Security, Tech Fixes

White House Recommends 6 Policy Changes to Improve Big Data

Posted by Philip Tang on Fri, Feb 06, 2015

bigdata

Big data has become ubiquitous, an intangible shadow looming over our lives even if we're not always aware of that fact.  The cost of data collection, storage and processing has declined, facilitating the advent of big data.  Companies treat it as a currency, a tool to further their aspirations.  But some, such as Target, Sony, and Anthem, have paid a high cost for this tool.

Read More

Topics: New Technology, Data Security