The NI Blog

 

Is the Dark Web all bad?

Dark Web: (noun)  Part of the world wide web that is only accessible by utilizing special software, allowing users and websites to remain anonymous or untraceable. It exists on an encrypted network that uses masked IP addresses to maintain anonymity for users and site owners. This way, people who use the Dark Web for illegal purposes can’t be traced.  As you […]

Read More

Passwords – Outdated and Dangerous, But Necessary?

Here’s a quick test – what do these seemingly random alphanumerical groupings have in common?  1. 123456  2. password  3. 123456789  4. 12345678  12345  5. 111111  6. 1234567  7. sunshine  8. qwerty  9. iloveyou  That is a list of the Top Ten Passwords used in 2018. Recognize any of these? If you don’t, you’re not necessarily in the clear, […]

Read More

What is the Dark Web and Why Should We Care

You’re happily humming along on the Internet thinking you’ve got a pretty good understanding. You can navigate your way around Google, Facebook, Amazon, and news sites. You’re actually only visiting four percent of the Internet. There’s a whole world (96% of the Internet) hiding beyond these safe surface-level sites, known as the Dark Web. It’s […]

Read More

Are you protecting the right data?

You’re ready to purchase a BDR. You’ve done all of the research, found a company you’re confident in and are excited to finally have peace of mind. Now, you start thinking about exactly what you need to back up. Is all of your data necessary or should you salvage a little server room? Most businesses want to back up everything – you never know […]

Read More

Should’ve seen it coming…

You’ve invested in a BDR and now sleep more soundly at night, but the hardware itself is really only part of the solution. You want to ensure your provider does preventative maintenance, periodic testing, multi-location storage, and staff training. Having these things in place will help avoid downtime if the worst happens.   Preventative Maintenance: In addition to the hardware itself, a […]

Read More

What Could Happen Without a Plan

Backup Disaster Recovery is one of those things that all businesses need to have in case of disaster. Whether it’s a natural disaster such as a tornado, a hardware failure, or even an attack from a hacker. Anyone of these could permanently disable your business if you aren’t prepared or have a proper backup plan. For […]

Read More

3 Ways Cybercriminals Use Social Engineering to Steal Your Info

Cybercriminals use social engineering every day to attempt to hack into people’s personal information.  Social engineering preys on the human condition to gain trust, manipulate people and get people to willingly give out personal information. In general, there are three major ways that cybercriminals use social engineering to steal your info. Email This is one […]

Read More

Why are you so popular?

You’ve heard about many of the scams that exist on the internet now. It’s tough to simply look at your emails without noticing several phishing emails sitting in your inbox. Lately, the largest influx of social engineering scams has come from social media.  As of right now, worldwide social media users total 2.34 billion according […]

Read More

Breaking Down Social Engineering

Most people are aware of terms like phishing and malware, but did you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud. In fact, it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or their workplace. A prime example of social engineering goes back to Greek mythology […]

Read More

What is the Dark Web?

What is the dark web?  Have you heard of the ‘dark web’? You probably picture a guy in a hoodie, slumped over a keyboard peering at a screen of numbers with an evil smile upon his face. Oddly enough, it’s really not as dark and creepy as the media portrays. However, the scary part is […]

Read More