IT Consultants' Insight on Business Technology | NSK Inc.

Samas Ransomware Can Delete All of Your Back Up Files

Posted by Steven Lai Fri, Apr 21, 2017

 

 

You have a backup plan to store your files, just in case your main device is hacked. However, there is a deadly cyber attack called Samas Ransomware that can and will decimate all of your backup files, so are you truly safe?
 

Read More

Topics: Data Security, anti virus, cybersecurity

SecureWorks finds & exposes phishing Russian hacker group APT28

Posted by Steven Lai Sat, Apr 08, 2017

 

Read More

Topics: Disaster Recovery, cybersecurity

What!? Congress wants you to Pay for online privacy?!

Posted by Steven Lai Fri, Apr 07, 2017

 

Read More

Topics: cybersecurity

10 tips on how to avoid SMishing (SMS phishing)

Posted by Steven Lai Tue, Apr 04, 2017

Mobile devices are used thousands of times every day by billions of people. Everyone now socializes through apps and text messages. Mobile devices are a great tool to connect with one or another, however privacy and cyber hackers  can be a risk factor to consider when thinking about Cyber Security.

Read More

Topics: cybersecurity, email security, SmiShing

Smishing?  What is Smishing?

Posted by Steven Lai Mon, Apr 03, 2017

 

 
Chinese hackers have set up a fake phone tower to send text messages to Android  mobile users. The text contains a brief text that states "Congratulations! you have won 100 GB internet pack". Along with the message within the text, includes an URL link that would linked mobile users to the virus.
Read More

Topics: cybersecurity, SmiShing, BostonIT

Two Tech Companies & Cyber Fraud

Posted by Steven Lai Fri, Mar 31, 2017

Two multinational technology companies have fallen victim to a massive fraud spear phishing attack!  A cyber criminal has been charged with breaking and entering into these two companies. The outcome of this criminal activity included a large amount of bank accounts hacked and controlled by a scammer.

Read More

Topics: anti virus, cybersecurity, email security

Yahoo Servers were hacked by FSB Spies and others

Posted by Steven Lai Mon, Mar 27, 2017

Huge chunks of information from Yahoo's networking service and information was stolen by just four individuals. Personal messages from Yahoo user's were also stolen and have been included in the criminal activity. Out of the group of 4 hackers, two were FSB members (Russian's Federal Security Services), and the other two were previously known hackers that had no relation to the FSB.

Read More

Topics: anti virus, cybersecurity, email security

W-2 Phishing Scam Happening Through Emails

Posted by Steven Lai Fri, Mar 24, 2017

 Scam requests for W-2's

Read More

Topics: Data Security, cybersecurity, email security, Phishing

Top 10 KnowBe4 IT Security Trends for 2017

Posted by Cathie Briggette Tue, Jan 03, 2017

These trends are practical things that will help you keep your network safer with improved defense-in-depth.
  1. A move from being defensive to a more proactive approach to IT security, for instance application firewalls that actually work and are easy to deploy.

  2. Machine learning that *works* spreads out to legacy endpoint security tools, and is able to do real-time payload analysis to prevent ransomware attacks.
  3. You will finally get affordable and smart enough network traffic analysis tools that will show if your network has been penetrated, combined with:
  4. Platforms that will show you understandable threat intelligence with analytics and reporting that will dramatically shorten the "dwell time" of hackers in your network.
Read More

Topics: Data Security, Cloud Security, cybersecurity, ransomware attacks, social engineering

Top 3 Tips to protect your business from ransomware

Posted by Cathie Briggette Thu, Dec 15, 2016

Tip #1:  Educate users on best security practices

Education is still the best way to help your business avoid infection by ransomware or any other form of malware.  Make your employees aware of pupular social engineering methods and tactics so they don't fall victim to phising emails or spoofed messages.  It is particularly helpful to share examples of these kinds of emails and the types of attachments that are often associated with social engineering attempts so that end users know to avoid them.  A managed services provider is well equipped to help you deliver this sort of training,

Read More

Topics: cybersecurity, ransomeware