IT Consultants' Insight on Business Technology | NSK Inc.

Company Exec Posers, Spread Spam

Posted by Steven Lai Fri, May 19, 2017

Disguised payment requests are the result of financial losses for companies whose employees have been targeted and spammed with fraudulent emails. These Company exec posers, got their recipients to process payments for non-existent goods or services. They did it with a fake wire and/or card transfers.

This is a great example of social engineering and the W-2 phishing scam that had happened earlier this year.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

Whose fault is that Data Breach?

Posted by Monica DeStefano Tue, May 09, 2017

Co Authored by:  Steven Lai

Being in a high position at a company is never easy, especially when you are the CEO and are responsible for both employee and client information. You are expected to be the visionary, the fearless leader, while bearing the burden of heavy management responsibilities.  All this, while maintaining the financial stability of the company and healthy relationships with both personnel and clientele.  

Putting out fires is a constant part of your C-level role.  You deal with the complexity of your business growth, while tackling, head on, the legality of keeping all your information secure and protected. 

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, data storage, BostonIT

Airline Phishing Attack

Posted by Steven Lai Tue, May 02, 2017

 

There is another cyber attack out there and it is toward airline clients and their employees. This new cyber campaign is attacking companies involved with shipping goods and employee traveling.

Read More

Topics: Disaster Recovery, cybersecurity

SecureWorks finds & exposes phishing Russian hacker group APT28

Posted by Steven Lai Sat, Apr 08, 2017

 

A department from SecureWorks; a protective service unit that protects individual's or businesses digital information, has been closely watching a well known group of Russian hackers. 

Read More

Topics: Disaster Recovery, cybersecurity

Sound waves can now be used to hack into mobile devices

Posted by Steven Lai Sun, Apr 02, 2017

 

Read More

Topics: Disaster Recovery

Phishy Business - Protect Your Data

Posted by Melissa Cocks Sat, Nov 19, 2016

How to Prevent Phishing Scams

Online Security Tips

When it comes to your personal account information, you can never be too judicious to whom you provide such information.  Phishing scams are not new, but they are still effective.  This is because most people want to be helpful and phishing scams take advantage of this by masquerading as someone or some company that they are not. 

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, email security

The 8 layers of cyber security needed to protect your business

Posted by Cathie Briggette Tue, Oct 25, 2016

An Interview with Ahmed Fadili at NSK Inc

As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support.  In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.

Question:  Do clients come to us regarding their security, or are we the ones that are bringing it to the forefront of their business? 

Read More

Topics: Disaster Recovery, Managed Services, Tech Fixes, IT Services, cybersecurity

Outsourcing IT without Disrupting Business Continuity

Posted by Cathie Briggette Thu, Sep 15, 2016

Given the huge importance of technology, IT management is the cornerstone of any modern business, but not every organization possesses the resources to develop an in-house IT solution that caters to their business needs.

Read More

Topics: Disaster Recovery, 201CMR17.00, Managed Services

Badlock the Crucial Security Vulnerability Bug

Posted by Cathie Briggette Wed, Apr 06, 2016

Badlock is the new security vulnerability bug of 2016.  Badlock was discovered by Stefan Metzmacher, who is a renowned member of the international Samba Core Developer Team and works at SerNet on Samba. He reported the bug to Microsoft and has been working closely with them (Microsoft) to fix the problem.  

Read More

Topics: Microsoft, Disaster Recovery, anti virus, cybersecurity

The Distinction Between Data Backup and Business Continuity

Posted by Cathie Briggette Mon, Feb 29, 2016

Written by Brandon Garcin on Feb 29, 2016 6:00:00 AM on Continuum MSP Blog

Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the “technology” was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards was then further developed by IBM in the early days of data processing, where data input, storage and commands were captured using a series of hole punches.

IBM Archives:   https://www-03.ibm.com/ibm/history/exhibits/storage/storage_350.html

Read More

Topics: Cloud Computing, Disaster Recovery, Business Continuity