An Interview with Ahmed Fadili at NSK Inc
As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support. In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.
Given the huge importance of technology, IT management is the cornerstone of any modern business, but not every organization possesses the resources to develop an in-house IT solution that caters to their business needs.
Badlock is the new security vulnerability bug of 2016. Badlock was discovered by Stefan Metzmacher, who is a renowned member of the international Samba Core Developer Team and works at SerNet on Samba. He reported the bug to Microsoft and has been working closely with them (Microsoft) to fix the problem.
Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the “technology” was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards was then further developed by IBM in the early days of data processing, where data input, storage and commands were captured using a series of hole punches.
“Cybercrimes are becoming mainstream,” NSK Inc. IT Consultant Philip Abraham said, “the internet is full of predators.”
With cybercrime becoming more prevalent in our society, computer safety is something that must become an unfortunate priority. Thankfully, the experts here at NSK Inc. are more than prepared when it comes to this stressful aspect of the IT world. So instead of searching the internet for common sense fixes and confusing techniques, the NSK team has gotten together to create a list of precautions and steps to ensure your devices stay safe.
A few months ago, the devastating CryptoLocker malware that has locked the files of half a million PC users across the world was finally neutralized. The US government managed to seize the computers that were spreading the CryptoLocker malware with support from some security experts. Later, a security firm made public a tool so that people, whose PCs were infected, could decrypt and recover their files.
Topics: Disaster Recovery
"Someone strolled into our four-story, Class-A professional building, then into our second-floor office suite and stole my primary business computer -- an Apple MacBook Air -- right off my desk."