IT Consultants' Insight on Business Technology | NSK Inc.

Samas Ransomware Can Delete All of Your Back Up Files

Posted by Steven Lai Fri, Apr 21, 2017

 

 

You have a backup plan to store your files, just in case your main device is hacked. However, there is a deadly cyber attack called Samas Ransomware that can and will decimate all of your backup files, so are you truly safe?
 

Read More

Topics: Data Security, anti virus, cybersecurity

Singapore's Defense Ministry Hit With First Major Cyber Attack

Posted by Steven Lai Wed, Apr 19, 2017

 Singapore's government has been the latest victim of a cyber crime. There has been a hack in the internet access (I-net) of the agency which has led to the access of personal data.  Investigations revealed that basic personal data, comprised of NRIC numbers, telephone numbers, and dates of birth of around 850 servicemen and employees was stolen from I-net.

 

The I-net system is an internet access system used by national servicemen and MINDEFF employees to send emails communication and for their internet surfing. The system allows their employees to use terminals within the ministry premises and SAF's (Singapore's Armed Forces) camps.   

Read More

Topics: anti virus

SecureWorks finds & exposes phishing Russian hacker group APT28

Posted by Steven Lai Sat, Apr 08, 2017

 

Read More

Topics: Disaster Recovery, cybersecurity

What!? Congress wants you to Pay for online privacy?!

Posted by Steven Lai Fri, Apr 07, 2017

 

Read More

Topics: cybersecurity

What is Data Mapping Software?

Posted by Robert Cordray Thu, Apr 06, 2017

Data mapping is typically the first step in integration of different data models. The process is used in data warehousing to link data sets according to specific data element definitions. The standards used depend on the domain values of the model used.

Read More

Topics: Data Security, data storage, data mapping

The top ten features the Android O update has to offer

Posted by Steven Lai Wed, Apr 05, 2017

On March, 21st, Google announced and released a preview version of the Android O.

Read More

Topics: New Technology

10 tips on how to avoid SMishing (SMS phishing)

Posted by Steven Lai Tue, Apr 04, 2017

Mobile devices are used thousands of times every day by billions of people. Everyone now socializes through apps and text messages. Mobile devices are a great tool to connect with one or another, however privacy and cyber hackers  can be a risk factor to consider when thinking about Cyber Security.

Read More

Topics: cybersecurity, email security, SmiShing

Smishing?  What is Smishing?

Posted by Steven Lai Mon, Apr 03, 2017

 

 
Chinese hackers have set up a fake phone tower to send text messages to Android  mobile users. The text contains a brief text that states "Congratulations! you have won 100 GB internet pack". Along with the message within the text, includes an URL link that would linked mobile users to the virus.
Read More

Topics: cybersecurity, SmiShing, BostonIT

Sound waves can now be used to hack into mobile devices

Posted by Steven Lai Sun, Apr 02, 2017

 

Read More

Topics: Disaster Recovery

7 Tips on spotting social engineering in emails

Posted by Steven Lai Sat, Apr 01, 2017

Cyber crime is increasing every year, even though very smart tatics are made and applied by businesses. Companies rightfuly apply cyber security tactics in order to protect their employees and data.  But the real question is, are they doing enough?


 

Read More

Topics: Data Security