Scam requests for W-2's
Education is still the best way to help your business avoid infection by ransomware or any other form of malware. Make your employees aware of pupular social engineering methods and tactics so they don't fall victim to phising emails or spoofed messages. It is particularly helpful to share examples of these kinds of emails and the types of attachments that are often associated with social engineering attempts so that end users know to avoid them. A managed services provider is well equipped to help you deliver this sort of training,
Ransomware is malicious software that encrypts files, locks the computer, and retains control until the user pays a certain amount of money. Ransomware can appear in two forms — either by locking your screen with a full-screen image or
webpage to prevent you from accessing your PC, or by encrypting your files so they can’t be opened. 1
While each ransomware variant has its own twist, there are a few key components that most ransomware types follow:
Black Friday and Cyber Monday are just around the corner, and that means consumers across America will soon be in a shopping frenzy. Scoring the best deals on holiday gifts is awesome and all, but don’t let the shopping mania distract you from retail cyber security.
The latest in massive data breaches: adult dating and entertainment company Adult Friend Finder Network has had the information of over 412 million accounts comprised in an attack on their database. The breach included “339 million accounts from AdultFriendFinder.com, which the company promotes as the ‘world's largest sex and swinger community.’”
Two weeks ago, we predicted that distributed denial-of-service (DDoS) attacks using Internet of Things Botnet armies would become more frequent and more severe. Unfortunately, these predications are quickly coming true. On October 21st, a massive DDoS attack was launched against New Hampshire-based DNS provider, Dyn. Hackers used a publicly available Mirai source code to create a Botnet army and infect an estimated 500,000 or more devices, overwhelming Dyn with enormous amounts of junk traffic. Major websites who use Dyn, like Amazon, Twitter, Spotify, and Netflix, were brought down for hours. What’s worse, these compromised devices remain accessible to hackers. An IoT device could be anything from a CCTV camera to a printer. The devices often have weak passwords, as most manufacturers and users are not concerned with securing their products. Many of the devices used in the attack were products of the Hangzhou Xiongmai Technology of China, and the company is now recalling some of its devices, and issuing patches for others.
An Interview with Ahmed Fadili at NSK Inc
As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support. In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.
With cyber security news dominating headlines, you’ve no doubt heard of the many security threats facing you and your business. Passwords are essential to protecting yourself from hackers, but it is difficult to keep your passwords varied and strong.