IT Consultants' Insight on Business Technology | NSK Inc.

Legacy Systems Interfering With Government's Cyber Security

Posted by Steven Lai Fri, May 19, 2017

Lately, political parties and governments have been serious victims of cyber-attacks.  These cyber hacks have affected millions of federal employee’s productivity in their work and have affected many outcomes of governments, such as voting results.

What is the cause for this?  The problem lies in the systems; they were built decades ago and as a result they are obsolete. Legacy systems are troublesome because they are out of date. Some legacy systems go back a half a century and cannot implement network defenses as a basic as encryption.  

Read More

Topics: Data Security, cybersecurity

Company Exec Posers, Spread Spam

Posted by Steven Lai Fri, May 19, 2017

Disguised payment requests are the result of financial losses for companies whose employees have been targeted and spammed with fraudulent emails. These Company exec posers, got their recipients to process payments for non-existent goods or services. They did it with a fake wire and/or card transfers.

This is a great example of social engineering and the W-2 phishing scam that had happened earlier this year.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

WannaCry Malware Attack 2017

Posted by TImothy Lasonde Tue, May 16, 2017

 

WannaCry update from NSK

                WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over. This unprecedented malware attack began sweeping the globe late last week, and security researchers estimated that nearly 57,000 computers in more than 150 countries were infected by the end of the day on Friday. While the spread of this terrifying ransomware was slowed on Saturday, it was hardly stopped. As of Monday morning, more than 200,000 systems around the world are believed to have been infected.

Read More

Topics: cybersecurity, Malware

3 BEST Ways to Protect your Cloud Accounts

Posted by Steven Lai Fri, May 12, 2017

There are quite a few cloud based applications,  such as iCloud, twitter, facebook, that are known to be easily hacked, especially with the wave of hacks against celebrity accounts.  So it is very important to take these three steps and measurements to ensure protection on all of your Cloud Accounts.

  

Read More

Topics: Data Security, Apple, Cloud Security, cybersecurity

Cybercrime Tweets

Posted by Steven Lai Thu, May 11, 2017

Scammers are now using Twitter as their new platform. They use Twitter to lure in individuals looking for customer support, by interjecting themselves into legitimate conversations the customers are having with their Financial Vendors, and offering friendly chatter and a link that directs the customer to a Phishing page designed to harvest their financial credentials.

Read More

Topics: Data Security, #BostonIntern, cybersecurity

More on 201 CMR 17 - Get that WISP

Posted by Cathie Briggette Thu, May 11, 2017

 

In February 2010, Massachusetts raised the bar in security for businesses keeping it's residents’ information, by creating the most comprehensive data protection and privacy law in the United States – 201 C.M.R. 17;  also, known as the Standards for the Protection of Personal Information of Residents of the Commonwealth. This regulation issued by the Department of Consumer Affairs requires all businesses that license or own personal information of a Massachusetts resident to comply with the minimum-security standards set forth in the regulation.

Read More

Topics: 201CMR17.00, cybersecurity

Whose fault is that Data Breach?

Posted by Monica DeStefano Tue, May 09, 2017

Co Authored by:  Steven Lai

Being in a high position at a company is never easy, especially when you are the CEO and are responsible for both employee and client information. You are expected to be the visionary, the fearless leader, while bearing the burden of heavy management responsibilities.  All this, while maintaining the financial stability of the company and healthy relationships with both personnel and clientele.  

Putting out fires is a constant part of your C-level role.  You deal with the complexity of your business growth, while tackling, head on, the legality of keeping all your information secure and protected. 

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, data storage, BostonIT

Airline Phishing Attack

Posted by Steven Lai Tue, May 02, 2017

 

There is another cyber attack out there and it is toward airline clients and their employees. This new cyber campaign is attacking companies involved with shipping goods and employee traveling.

Read More

Topics: Disaster Recovery, cybersecurity

New Web Browser promises privacy

Posted by Steven Lai Mon, May 01, 2017

A brand new web broswer promises privacy for web searching! The web browser is called Brave. The browser promises to provide an option that leaves no trace of or history to the web sites that have been visit.

Read More

Topics: Data Security, cybersecurity

Notorious Russian Hacker Caught & Arrested by FBI

Posted by Steven Lai Sun, Apr 30, 2017

 

A Notorious Russian hacker on the run for years, has finally been caught by the FBI.  The arrest was made during a vacation with has family in Spain.
  What is this Russian hacker known for?
Russian hacker ( Peter Levashov) is known for his huge cyber criminal activity. All of Peter's cyber criminal activity included draining other people's bank accounts and stock fraud. Furthermore, Peter Levashov is known for running a spam campign that included continuously sending emails that would advertise convincing counterfeit pharmaceuticals and remedies for erectile dysfunction.
Read More

Topics: cybersecurity