IT Consultants' Insight on Business Technology | NSK Inc.

Samas Ransomware Can Delete All of Your Back Up Files

Posted by Steven Lai Fri, Apr 21, 2017



You have a backup plan to store your files, just in case your main device is hacked. However, there is a deadly cyber attack called Samas Ransomware that can and will decimate all of your backup files, so are you truly safe?

Read More

Topics: Data Security, anti virus, cybersecurity

What is Data Mapping Software?

Posted by Robert Cordray Thu, Apr 06, 2017

Data mapping is typically the first step in integration of different data models. The process is used in data warehousing to link data sets according to specific data element definitions. The standards used depend on the domain values of the model used.

Read More

Topics: Data Security, data storage, data mapping

7 Tips on spotting social engineering in emails

Posted by Steven Lai Sat, Apr 01, 2017

Cyber crime is increasing every year, even though very smart tatics are made and applied by businesses. Companies rightfuly apply cyber security tactics in order to protect their employees and data.  But the real question is, are they doing enough?


Read More

Topics: Data Security

W-2 Phishing Scam Happening Through Emails

Posted by Steven Lai Fri, Mar 24, 2017

 Scam requests for W-2's

Read More

Topics: Data Security, cybersecurity, email security, Phishing

Top 10 KnowBe4 IT Security Trends for 2017

Posted by Cathie Briggette Tue, Jan 03, 2017

These trends are practical things that will help you keep your network safer with improved defense-in-depth.
  1. A move from being defensive to a more proactive approach to IT security, for instance application firewalls that actually work and are easy to deploy.

  2. Machine learning that *works* spreads out to legacy endpoint security tools, and is able to do real-time payload analysis to prevent ransomware attacks.
  3. You will finally get affordable and smart enough network traffic analysis tools that will show if your network has been penetrated, combined with:
  4. Platforms that will show you understandable threat intelligence with analytics and reporting that will dramatically shorten the "dwell time" of hackers in your network.
Read More

Topics: Data Security, Cloud Security, cybersecurity, ransomware attacks, social engineering

What is Ransomware?

Posted by Cathie Briggette Fri, Dec 09, 2016

Ransomware is malicious software that encrypts files, locks the computer, and retains control until the user pays a certain amount of money. Ransomware can appear in two forms — either by locking your screen with a full-screen image or
webpage to prevent you from accessing your PC, or by encrypting your files so they can’t be opened. 1

While each ransomware variant has its own twist, there are a few key components that most ransomware types follow:

Read More

Topics: Data Security, cybersecurity, ransomeware

Newest Net Attack Sheds Light on the Dangers of IoT Devices

Posted by Molly Abrahamson Thu, Oct 27, 2016

Two weeks ago, we predicted that distributed denial-of-service (DDoS) attacks using Internet of Things Botnet armies would become more frequent and more severe. Unfortunately, these predications are quickly coming true. On October 21st, a massive DDoS attack was launched against New Hampshire-based DNS provider, Dyn. Hackers used a publicly available Mirai source code to create a Botnet army and infect an estimated 500,000 or more devices, overwhelming Dyn with enormous amounts of junk traffic. Major websites who use Dyn, like Amazon, Twitter, Spotify, and Netflix, were brought down for hours. What’s worse, these compromised devices remain accessible to hackers. An IoT device could be anything from a CCTV camera to a printer. The devices often have weak passwords, as most manufacturers and users are not concerned with securing their products. Many of the devices used in the attack were products of the Hangzhou Xiongmai Technology of China, and the company is now recalling some of its devices, and issuing patches for others.

Read More

Topics: Data Security, cybersecurity

Cyber Security Best Practices – October is Cyber Security Month

Posted by Cathie Briggette Mon, Oct 03, 2016

Windows 10 and MORE Security

Well October is Cyber Security Month, and we are going to try and write as many stories as we can to help celebrate this extremely important topic for Technology.


To start off the month our first story is about a program that one of our Help Desk Engineers created.  For some background into the story  NSK Inc helped a client get through a planned security audit to find better ways to keep their networks, employees and clients secure.  As part of the follow up they asked NSK to create a patch that would lock down the user accounts and restrict them from running certain applications that were not deemed acceptable for work, or that could pose a security threat.  NSK’s Help Desk Engineer Nick Seratt took to the challenge and created this specific patch for our client.  Below is an interview with Nick on how he created this small patch for our client to help them with cyber security.

Read More

Topics: Data Security, cybersecurity

What is a SOC 3 Compliance Report for Financial Services Companies

Posted by Cathie Briggette Tue, Jul 19, 2016

A SOC 3 report is designed to meet the needs of organizations that want assurance for their Clients on the controls the organization uses in relation to security, availability, processing integrity, confidentiality, or privacy. The Report is an easily publicly distributed report and is designed to attest to the Organization’s successful completion of a SOC 2.

Read More

Topics: Data Security

The Importance of Cybersecurity for Your Small Business

Posted by Caroline Witts Mon, Jul 11, 2016

Mark Zuckerberg was back in the news recently when word got out that his Twitter, Facebook and Linked-In accounts had been hacked. While there is something ironic about the CEO of Facebook having his own Facebook profile hacked, there is also something very concerning. If one of the biggest names in tech can have their personal information stolen, what’s to stop it from happening to the rest of us?

Read More

Topics: Data Security, cybersecurity