IT Consultants' Insight on Business Technology | NSK Inc.

W-2 Phishing Scam Happening Through Emails

Posted by Steven Lai Fri, Mar 24, 2017

 Scam requests for W-2's

Read More

Topics: Data Security, cybersecurity, email security, Phishing

Top 10 KnowBe4 IT Security Trends for 2017

Posted by Cathie Briggette Tue, Jan 03, 2017

These trends are practical things that will help you keep your network safer with improved defense-in-depth.
  1. A move from being defensive to a more proactive approach to IT security, for instance application firewalls that actually work and are easy to deploy.

  2. Machine learning that *works* spreads out to legacy endpoint security tools, and is able to do real-time payload analysis to prevent ransomware attacks.
  3. You will finally get affordable and smart enough network traffic analysis tools that will show if your network has been penetrated, combined with:
  4. Platforms that will show you understandable threat intelligence with analytics and reporting that will dramatically shorten the "dwell time" of hackers in your network.
Read More

Topics: Data Security, Cloud Security, cybersecurity, ransomware attacks, social engineering

Top 3 Tips to protect your business from ransomware

Posted by Cathie Briggette Thu, Dec 15, 2016

Tip #1:  Educate users on best security practices

Education is still the best way to help your business avoid infection by ransomware or any other form of malware.  Make your employees aware of pupular social engineering methods and tactics so they don't fall victim to phising emails or spoofed messages.  It is particularly helpful to share examples of these kinds of emails and the types of attachments that are often associated with social engineering attempts so that end users know to avoid them.  A managed services provider is well equipped to help you deliver this sort of training,

Read More

Topics: cybersecurity, ransomeware

What is Ransomware?

Posted by Cathie Briggette Fri, Dec 09, 2016

Ransomware is malicious software that encrypts files, locks the computer, and retains control until the user pays a certain amount of money. Ransomware can appear in two forms — either by locking your screen with a full-screen image or
webpage to prevent you from accessing your PC, or by encrypting your files so they can’t be opened. 1

While each ransomware variant has its own twist, there are a few key components that most ransomware types follow:

Read More

Topics: Data Security, cybersecurity, ransomeware

Cyber Security and Cyber Monday: Top 7 Ways to Keep Safe this Holiday Shopping Season

Posted by Molly Abrahamson Wed, Nov 23, 2016

Black Friday and Cyber Monday are just around the corner, and that means consumers across America will soon be in a shopping frenzy. Scoring the best deals on holiday gifts is awesome and all, but don’t let the shopping mania distract you from retail cyber security.

Read More

Topics: cybersecurity

Adult Friend Finder and Penthouse Victims of Record Breaking Data Breach

Posted by Molly Abrahamson Thu, Nov 17, 2016

The latest in massive data breaches: adult dating and entertainment company Adult Friend Finder Network has had the information of over 412 million accounts comprised in an attack on their database. The breach included “339 million accounts from, which the company promotes as the ‘world's largest sex and swinger community.’”

Read More

Topics: cybersecurity

Newest Net Attack Sheds Light on the Dangers of IoT Devices

Posted by Molly Abrahamson Thu, Oct 27, 2016

Two weeks ago, we predicted that distributed denial-of-service (DDoS) attacks using Internet of Things Botnet armies would become more frequent and more severe. Unfortunately, these predications are quickly coming true. On October 21st, a massive DDoS attack was launched against New Hampshire-based DNS provider, Dyn. Hackers used a publicly available Mirai source code to create a Botnet army and infect an estimated 500,000 or more devices, overwhelming Dyn with enormous amounts of junk traffic. Major websites who use Dyn, like Amazon, Twitter, Spotify, and Netflix, were brought down for hours. What’s worse, these compromised devices remain accessible to hackers. An IoT device could be anything from a CCTV camera to a printer. The devices often have weak passwords, as most manufacturers and users are not concerned with securing their products. Many of the devices used in the attack were products of the Hangzhou Xiongmai Technology of China, and the company is now recalling some of its devices, and issuing patches for others.

Read More

Topics: Data Security, cybersecurity

The 8 layers of cyber security needed to protect your business

Posted by Cathie Briggette Tue, Oct 25, 2016

An Interview with Ahmed Fadili at NSK Inc

As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support.  In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.

Question:  Do clients come to us regarding their security, or are we the ones that are bringing it to the forefront of their business? 

Read More

Topics: Disaster Recovery, Managed Services, Tech Fixes, IT Services, cybersecurity

Top 5 Tips for Storing and Strengthening Your Passwords

Posted by Molly Abrahamson Tue, Oct 18, 2016

With cyber security news dominating headlines, you’ve no doubt heard of the many security threats facing you and your business. Passwords are essential to protecting yourself from hackers, but it is difficult to keep your passwords varied and strong.

Read More

Topics: cybersecurity

Top 6 Tricks to Secure Your IoT devices

Posted by Molly Abrahamson Fri, Oct 14, 2016

Our last blog discussed the security threats facing your smart home and IoT devices. Here are six ways to protect your home and business from those threats, while still enjoying the convenience of your IoT devices.

Read More

Topics: cybersecurity