IT Consultants' Insight on Business Technology | NSK Inc.

Ransomware : 10 Steps to Avoid the Infection

Posted by Davide Palumbo on Tue, Oct 28, 2014

A few months ago, the devastating CryptoLocker malware that has locked the files of half a million PC users across the world was finally neutralized. The US government managed to seize the computers that were spreading the CryptoLocker malware with support from some security experts. Later, a security firm made public a tool so that people, whose PCs were infected, could decrypt and recover their files.

Read More

Topics: Antivirus Protection, boston disaster recovery

... And... It snapped again

Posted by Davide Palumbo on Wed, Oct 22, 2014

Unknown hackers are responsible for the leak of over 500MB images of Snapchat users. Videos and pictures of over 200,000 users were released on the Internet just a few days ago. Even if it has not been proven, it is suspected that the authors of the scam are somehow linked to those responsible for the posting in August of personal and often nude photos taken by hundreds of celebrities, including Jennifer Lawrence and Kim Kardashian.

Read More

Topics: Hacking

POODLE bytes

Posted by Davide Palumbo on Tue, Oct 21, 2014

Last Tuesday, a trio of Google researchers published news regarding the existence of an Internet-wide security vulnerability that has a cute name but unfortunately also potentially disastrous effects. POODLE, which stands for Padding Oracle On Downgraded Legacy Encryption, is a new security hole that targets Secure Socket Layer (SSL) 3.0. Since SSL protects data that are in transit between a website and the users, POODLE potentially allows hackers to decrypt the HTTP cookies, which can be used to store personal information, website preferences or even passwords, depending on the situation. For example, POODLE could allow an attacker to hijack and decrypt the session cookie that identifies you to a service like Twitter or Google, and then take over your accounts without needing your password.

Read More

Topics: Data Security, Google, data security and privacy, data security breach, Encryption, cyber attack, POODLE

What is SharePoint?

Posted by Davide Palumbo on Thu, Oct 16, 2014

In my previous blog entry, I introduced to you all SkyDrive and SkyDrive for Business, and I tried to illustrate the principle differences between them. I also highlighted how OneDrive for Business allows for more flexibility in what we can do thanks to SharePoint, which is the platform behind it. At this point, I believe that it is only fair to dedicate the present article to learn more about SharePoint and the advantages it can provide.

Read More

Topics: Development, Mircosoft, SharePoint, Intranet, Collaboration platform

Dropbox has been hacked... Or not

Posted by Davide Palumbo on Tue, Oct 14, 2014

An anonymous hacker has recently declared to have leaked a few hundred usernames and passwords for Dropbox accounts. A series of posts have been in fact made to Pastebin claiming to contain login credentials for hundreds of Dropbox accounts. The leak, which comes from an anonymous user taking Bitcoin donations for the full disclosure, contains accounts with email addresses starting with the letter "B". The hacker claims that more username/password pairs will be released as soon as they receive donations to their Bitcoin address. According to the hacker a total of 6,937,081 account credentials have so far been compromised.

Read More

Topics: Password Security, data security and privacy, changing passwords, Hacking, bitcoin, DropBox, Password Protection, Pastebin

Myles Gosmon: NSK Field Service team member

Posted by Davide Palumbo on Tue, Oct 07, 2014

In August 2014, Myles became an enthusiastic NSK Team member joining the Field Service group. As ambassador of NSK’s excellence in providing high quality IT assistance, Myles recognizes the importance of performing his duties at the top level of his job. More specifically, Myles’ job consists of direct communication including visiting clients, where he performs tasks such as keeping the network constantly updated to basic IT support, and configuring desktops according to the clients’ needs and specifications.

Read More

Topics: NSK Inc, NSK Team

The Evolution of Backup

Posted by Cathie Briggette on Mon, Oct 06, 2014

Read More

Topics: data storage, Cloud Computing, backup, IT security tips, data security policy, business continuity

Mike Moniz: NSK Financial Controller

Posted by Davide Palumbo on Thu, Oct 02, 2014

Since October 2013, Mike Moniz has taken on the role as NSK’s financial controller. As such, Mike manages cash flow, budgeting, reporting, and vendor relationships. More specifically, Mike’s job consists of overseeing meticulously all of the banking and finance activities, including negotiating lines of credit and vendor agreements, as well as reviewing all the financial contracts, financing agreements and insurance policies. Mike is responsible for providing accurate and comprehensive financial information to executive management for long-term financial strategizing. His excellent financial analysis skills are instrumental in helping NSK assess risks, analyze efficiency, and inform policy decisions made by executive management.

Read More

Topics: NSK Inc, NSK Team

OneDrive vs. OneDrive for Business

Posted by Davide Palumbo on Thu, Oct 02, 2014

What was once known as SkyDrive by Microsoft is now called OneDrive. However, the different name is not the only new feature introduced, and thanks to a few tricks and mobile apps, OneDrive is an efficient and updated version of its predecessor. Microsoft's online backup and syncing service is the most flexible and all-encompassing of its class, with syncing and access apps not only for PCs, but also for Macs, Androids, iOS, and Windows Phones. By comparison, Apple's competing iCloud is only available for Apple devices.

Read More

Topics: data storage, The Cloud, In the Cloud, DropBox, iOS 8, OneDrive, OneDrive for Business, SkyDrive, SharePoint

Oh No! I have been infected by CryptoWall - What should I do?

Posted by Cathie Briggette on Tue, Sep 30, 2014

The cybercriminals behind the CryptoWall ransomware have stepped up their game!

Read More

Topics: IT management, Spam, Pavis, Managed Services, boston disaster recovery, Encryption