IT Consultants' Insight on Business Technology | NSK Inc.

Legacy Systems Interfering With Government's Cyber Security

Posted by Steven Lai Fri, May 19, 2017

Lately, political parties and governments have been serious victims of cyber-attacks.  These cyber hacks have affected millions of federal employee’s productivity in their work and have affected many outcomes of governments, such as voting results.

What is the cause for this?  The problem lies in the systems; they were built decades ago and as a result they are obsolete. Legacy systems are troublesome because they are out of date. Some legacy systems go back a half a century and cannot implement network defenses as a basic as encryption.  

Read More

Topics: Data Security, cybersecurity

Company Exec Posers, Spread Spam

Posted by Steven Lai Fri, May 19, 2017

Disguised payment requests are the result of financial losses for companies whose employees have been targeted and spammed with fraudulent emails. These Company exec posers, got their recipients to process payments for non-existent goods or services. They did it with a fake wire and/or card transfers.

This is a great example of social engineering and the W-2 phishing scam that had happened earlier this year.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

3 BEST Ways to Protect your Cloud Accounts

Posted by Steven Lai Fri, May 12, 2017

There are quite a few cloud based applications,  such as iCloud, twitter, facebook, that are known to be easily hacked, especially with the wave of hacks against celebrity accounts.  So it is very important to take these three steps and measurements to ensure protection on all of your Cloud Accounts.

  

Read More

Topics: Data Security, Apple, Cloud Security, cybersecurity

Cybercrime Tweets

Posted by Steven Lai Thu, May 11, 2017

Scammers are now using Twitter as their new platform. They use Twitter to lure in individuals looking for customer support, by interjecting themselves into legitimate conversations the customers are having with their Financial Vendors, and offering friendly chatter and a link that directs the customer to a Phishing page designed to harvest their financial credentials.

Read More

Topics: Data Security, #BostonIntern, cybersecurity

Whose fault is that Data Breach?

Posted by Monica DeStefano Tue, May 09, 2017

Co Authored by:  Steven Lai

Being in a high position at a company is never easy, especially when you are the CEO and are responsible for both employee and client information. You are expected to be the visionary, the fearless leader, while bearing the burden of heavy management responsibilities.  All this, while maintaining the financial stability of the company and healthy relationships with both personnel and clientele.  

Putting out fires is a constant part of your C-level role.  You deal with the complexity of your business growth, while tackling, head on, the legality of keeping all your information secure and protected. 

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, data storage, BostonIT

What Data Discovery Tools do you need in 2017?

Posted by Robert Cordray Mon, May 01, 2017

 

Data has always been a driving force in the decision-making process for businesses. If you capture relevant information in the market, you can quickly make smart and strategic plans that can lead to growth and give you a competitive advantage.

There is high demand for more data, and this has significantly influenced the business landscape. As such, data discovering has emerged as the fastest-growing and changing trend of the business intelligence markets. Technology has enabled the manufacturing of tools that differ with the traditional systems of record in which the IT managed services provider was able to push reports out to the entire organization.

Read More

Topics: Data Security, data storage, data mapping

New Web Browser promises privacy

Posted by Steven Lai Mon, May 01, 2017

A brand new web broswer promises privacy for web searching! The web browser is called Brave. The browser promises to provide an option that leaves no trace of or history to the web sites that have been visit.

Read More

Topics: Data Security, cybersecurity

A new ransomware that deletes ALL of your backup files

Posted by Steven Lai Fri, Apr 21, 2017

You have a backup plan to store your files.. just in case your main device is hacked... You think you are safe.... Yet, now there is another type of attack, a cyber attack, called Samas Ransomware that can and will decimate all of your backup files, so are you truly safe?

 

Read More

Topics: Data Security, anti virus, cybersecurity

What is Data Mapping Software?

Posted by Robert Cordray Thu, Apr 06, 2017

Data mapping is typically the first step in integration of different data models. The process is used in data warehousing to link data sets according to specific data element definitions. The standards used depend on the domain values of the model used.

Read More

Topics: Data Security, data storage, data mapping

7 Tips on spotting social engineering in emails

Posted by Steven Lai Sat, Apr 01, 2017

Cyber crime is increasing every year, even though very smart tatics are made and applied by businesses. Companies rightfuly apply cyber security tactics in order to protect their employees and data.  But the real question is, are they doing enough?


 

Read More

Topics: Data Security