Scam requests for W-2's
Ransomware is malicious software that encrypts files, locks the computer, and retains control until the user pays a certain amount of money. Ransomware can appear in two forms — either by locking your screen with a full-screen image or
webpage to prevent you from accessing your PC, or by encrypting your files so they can’t be opened. 1
While each ransomware variant has its own twist, there are a few key components that most ransomware types follow:
Two weeks ago, we predicted that distributed denial-of-service (DDoS) attacks using Internet of Things Botnet armies would become more frequent and more severe. Unfortunately, these predications are quickly coming true. On October 21st, a massive DDoS attack was launched against New Hampshire-based DNS provider, Dyn. Hackers used a publicly available Mirai source code to create a Botnet army and infect an estimated 500,000 or more devices, overwhelming Dyn with enormous amounts of junk traffic. Major websites who use Dyn, like Amazon, Twitter, Spotify, and Netflix, were brought down for hours. What’s worse, these compromised devices remain accessible to hackers. An IoT device could be anything from a CCTV camera to a printer. The devices often have weak passwords, as most manufacturers and users are not concerned with securing their products. Many of the devices used in the attack were products of the Hangzhou Xiongmai Technology of China, and the company is now recalling some of its devices, and issuing patches for others.
Well October is Cyber Security Month, and we are going to try and write as many stories as we can to help celebrate this extremely important topic for Technology.
To start off the month our first story is about a program that one of our Help Desk Engineers created. For some background into the story NSK Inc helped a client get through a planned security audit to find better ways to keep their networks, employees and clients secure. As part of the follow up they asked NSK to create a patch that would lock down the user accounts and restrict them from running certain applications that were not deemed acceptable for work, or that could pose a security threat. NSK’s Help Desk Engineer Nick Seratt took to the challenge and created this specific patch for our client. Below is an interview with Nick on how he created this small patch for our client to help them with cyber security.
A SOC 3 report is designed to meet the needs of organizations that want assurance for their Clients on the controls the organization uses in relation to security, availability, processing integrity, confidentiality, or privacy. The Report is an easily publicly distributed report and is designed to attest to the Organization’s successful completion of a SOC 2.
Topics: Data Security
Mark Zuckerberg was back in the news recently when word got out that his Twitter, Facebook and Linked-In accounts had been hacked. While there is something ironic about the CEO of Facebook having his own Facebook profile hacked, there is also something very concerning. If one of the biggest names in tech can have their personal information stolen, what’s to stop it from happening to the rest of us?
HIPAA (Health Insurance Portability and Accountability Act) compliance is complex, very critical issue for many businesses that we manage. For many of these businesses who outsource their IT management needs to NSK Inc, the obligation for ensuring HIPAA compliance falls on their IT managed services providers, like NSK Inc. Our clients in the healthcare industry continuously pepper us with lots of questions and concerns around staying HIPAA compliant and avoiding the costly consequences of a HIPAA violation.
“Cybercrimes are becoming mainstream,” NSK Inc. IT Consultant Philip Abraham said, “the internet is full of predators.”
With cybercrime becoming more prevalent in our society, computer safety is something that must become an unfortunate priority. Thankfully, the experts here at NSK Inc. are more than prepared when it comes to this stressful aspect of the IT world. So instead of searching the internet for common sense fixes and confusing techniques, the NSK team has gotten together to create a list of precautions and steps to ensure your devices stay safe.