IT Consultants' Insight on Business Technology | NSK Inc.

Top 10 KnowBe4 IT Security Trends for 2017

Posted by Cathie Briggette Tue, Jan 03, 2017

These trends are practical things that will help you keep your network safer with improved defense-in-depth.
  1. A move from being defensive to a more proactive approach to IT security, for instance application firewalls that actually work and are easy to deploy.

  2. Machine learning that *works* spreads out to legacy endpoint security tools, and is able to do real-time payload analysis to prevent ransomware attacks.
  3. You will finally get affordable and smart enough network traffic analysis tools that will show if your network has been penetrated, combined with:
  4. Platforms that will show you understandable threat intelligence with analytics and reporting that will dramatically shorten the "dwell time" of hackers in your network.
Read More

Topics: Data Security, Cloud Security, cybersecurity, ransomware attacks, social engineering

What is Ransomware?

Posted by Cathie Briggette Fri, Dec 09, 2016

Ransomware is malicious software that encrypts files, locks the computer, and retains control until the user pays a certain amount of money. Ransomware can appear in two forms — either by locking your screen with a full-screen image or
webpage to prevent you from accessing your PC, or by encrypting your files so they can’t be opened. 1

While each ransomware variant has its own twist, there are a few key components that most ransomware types follow:

Read More

Topics: Data Security, cybersecurity, ransomeware

Newest Net Attack Sheds Light on the Dangers of IoT Devices

Posted by Molly Abrahamson Thu, Oct 27, 2016

Two weeks ago, we predicted that distributed denial-of-service (DDoS) attacks using Internet of Things Botnet armies would become more frequent and more severe. Unfortunately, these predications are quickly coming true. On October 21st, a massive DDoS attack was launched against New Hampshire-based DNS provider, Dyn. Hackers used a publicly available Mirai source code to create a Botnet army and infect an estimated 500,000 or more devices, overwhelming Dyn with enormous amounts of junk traffic. Major websites who use Dyn, like Amazon, Twitter, Spotify, and Netflix, were brought down for hours. What’s worse, these compromised devices remain accessible to hackers. An IoT device could be anything from a CCTV camera to a printer. The devices often have weak passwords, as most manufacturers and users are not concerned with securing their products. Many of the devices used in the attack were products of the Hangzhou Xiongmai Technology of China, and the company is now recalling some of its devices, and issuing patches for others.

Read More

Topics: Data Security, cybersecurity

Cyber Security Best Practices – October is Cyber Security Month

Posted by Cathie Briggette Mon, Oct 03, 2016

Windows 10 and MORE Security

Well October is Cyber Security Month, and we are going to try and write as many stories as we can to help celebrate this extremely important topic for Technology.

 

To start off the month our first story is about a program that one of our Help Desk Engineers created.  For some background into the story  NSK Inc helped a client get through a planned security audit to find better ways to keep their networks, employees and clients secure.  As part of the follow up they asked NSK to create a patch that would lock down the user accounts and restrict them from running certain applications that were not deemed acceptable for work, or that could pose a security threat.  NSK’s Help Desk Engineer Nick Seratt took to the challenge and created this specific patch for our client.  Below is an interview with Nick on how he created this small patch for our client to help them with cyber security.

Read More

Topics: Data Security, cybersecurity

What is a SOC 3 Compliance Report for Financial Services Companies

Posted by Cathie Briggette Tue, Jul 19, 2016

A SOC 3 report is designed to meet the needs of organizations that want assurance for their Clients on the controls the organization uses in relation to security, availability, processing integrity, confidentiality, or privacy. The Report is an easily publicly distributed report and is designed to attest to the Organization’s successful completion of a SOC 2.

Read More

Topics: Data Security

The Importance of Cybersecurity for Your Small Business

Posted by Caroline Witts Mon, Jul 11, 2016

Mark Zuckerberg was back in the news recently when word got out that his Twitter, Facebook and Linked-In accounts had been hacked. While there is something ironic about the CEO of Facebook having his own Facebook profile hacked, there is also something very concerning. If one of the biggest names in tech can have their personal information stolen, what’s to stop it from happening to the rest of us?

Read More

Topics: Data Security, cybersecurity

Top 3 Questions Prospects and Clients ask about HIPPA

Posted by Cathie Briggette Tue, Jun 07, 2016

HIPAA (Health Insurance Portability and Accountability Act) compliance is complex, very critical issue for many businesses that we manage. For many of these businesses who outsource their IT management needs to NSK Inc, the obligation for ensuring HIPAA compliance falls on their IT managed services providers, like NSK Inc. Our clients in the healthcare industry continuously pepper us with lots of questions and concerns around staying HIPAA compliant and avoiding the costly consequences of a HIPAA violation.

Read More

Topics: Data Security, IT Services, HIPPA Compliance

Business Continuity and Security DOs and DON'Ts

Posted by Cathie Briggette Tue, May 17, 2016

By:  The IT Associates at NSK Inc.

Read More

Topics: Data Security, Apple, anti virus, cybersecurity

Top 4 Advice Tips from the IT Experts on Computer Safety

Posted by Alyssa Steen Mon, Feb 01, 2016

“Cybercrimes are becoming mainstream,” NSK Inc. IT Consultant Philip Abraham said, “the internet is full of predators.”

With cybercrime becoming more prevalent in our society, computer safety is something that must become an unfortunate priority. Thankfully, the experts here at NSK Inc. are more than prepared when it comes to this stressful aspect of the IT world. So instead of searching the internet for common sense fixes and confusing techniques, the NSK team has gotten together to create a list of precautions and steps to ensure your devices stay safe.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

Social Engineering and Hacker Attacks

Posted by Cathie Briggette Wed, Jan 27, 2016

Last week we received 2 phone calls from consumers in Missouri and Tennessee asking about our Techs calling them on the phone and trying to charge them from $250 to $350 to reset their passwords and fix their IP addresses, because they were unable to connect to Netflix.  Our receptionist, talked to the first person, who thank goodness hadn’t given the scammers her credit card, and explained that we did not work in Missouri, nor did our techs call consumers about broken computers.  The woman was relieved that she did not share her credit card information.  The receptionist shared this information with me and I asked her if anyone else called, please route the call to me.

Read More

Topics: Data Security