Photo for Kaspersky Lab Relocates Data Processing to Switzerland

Kaspersky Lab Relocates Data Processing to Switzerland

There has been a lot of buzz about Kaspersky in the last several years with concerns about their security. Though Kaspersky currently utilizes the highest industry standards in their data protection practices they are constantly improving procedures to ensure their customers’ data. With this continual effort to improve security Kaspersky has made the decision to open a data center in Switzerland. This relocation has already begun and will be completed next year. “Kaspersky Lab...



Photo for Traps™ Receives "Recommended" Rating From NSS Labs, Inc.

Traps™ Receives "Recommended" Rating From NSS Labs, Inc.

Palo Alto Networks® Traps™ solution has received a recommended rating from NSS Labs for Advanced Endpoint Protection. Palo Alto Networks is an automated security operating platform that prevents cyberattacks so that you can continue working without worry. They are a valued vendor of NTS. Recently Palo Alto Networks has received a “Recommended” rating, the highest award offered by NSS Labs, Inc. NSS Labs is “recognized globally as the most trusted source for independent,...



Photo for Ransomware

Ransomware

What is ransomware? Ransomware is a type of malicious virus that blocks your access to your own files or will threaten to distribute this information unless a ransom is paid. More advanced versions use cryptoviral extortion which will encrypt the user’s data and a ransom must be paid in order to unencrypt the information. In May 2017 the extremely high-profile “WannaCry Worm” was a Ransomware deployed which targeted Microsoft Windows OS and was able to travel between user...



Photo for Penetration Testing and Security Audits

Penetration Testing and Security Audits

NTS offers penetration testing and security audits for clients who undergo regular auditing. What is a penetration test? A penetration test is an authorized attack on a business’s network to assess the security flaws and vulnerabilities that could be exploited by malicious outsiders. During a penetration test our ceritified ethical hackers will attempt to attack and infiltrate your network and create a list of goals focusing on boosting your network’s security and eliminating...