Menu

Frequently Asked Questions

 

How do I connect to the NSM Wireless Network on my phone?​

  • IOS Instructions
    • Go to Settings on the device
    • Next chose the option “Wi-Fi”
    • A list of wireless networks should be visible, please select NSMGuest
    • The password for the NSMGuest network is NSM1guest
    • After entering the password press “Join”
    • Device should automatically connect whenever you are in the office
  • Android Instructions
    • Go to Settings on your Android device
    • Next chose the option “Wi-Fi”
    • A list of wireless networks should be visible, please select NSMGuest
    • The password for the NSMGuest network is NSM1guest
    • After entering the password press “Connect”
    • Device should automatically connect whenever you are in the office
 


How do I send an eFax from Outlook?

 
 

​What is Phishing and what can I do to be prepared?

  • Phishing is the most common type of cyber attack that affects organizations like NSM. Phishing attacks can take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit card information, or bank account details. Although we maintain controls to help protect our networks and computers from cyber threats, we rely on you to be our first line of defense. Below are some different types of phishing attacks to watch out for:
    • Phishing: In this type of attack, hackers impersonate a real company to obtain your login credentials. You may receive an e-mail asking you to verify your account details with a link that takes you to an imposter login screen that delivers your information directly to the attackers.
    • Spear Phishing: Spear phishing is a more sophisticated phishing attack that includes customized information that makes the attacker seem like a legitimate source. They may use your name and phone number and refer to NSM in the e-mail to trick you into thinking they have a connection to you, making you more likely to click a link or attachment that they provide.
    • Whaling: Whaling is a popular ploy aimed at getting you to transfer money or send sensitive information to an attacker via email by impersonating a real company executive. Using a fake domain that appears similar to ours (nsm-seating.com), they look like normal emails from a high-level official of the company, typically the CEO or CFO, and ask you for sensitive information (including usernames and passwords).
    • Shared Document Phishing: You may receive an e-mail that appears to come from file-sharing sites like Dropbox or Google Drive alerting you that a document has been shared with you. The link provided in these e-mails will take you to a fake login page that mimics the real login page and will steal your account credentials.

Tips to Identify a Suspicious Email

The following tips can help you identify suspicious emails. Please remember that malicious actors are always developing their tactics to bypass detection and suspicion.

Unfamiliar Tone or Greeting - If a correspondent suddenly changes their tone or greeting to you, it could be a sign that they are being spoofed or their email has been compromised. The email may feel like it was written by a different person who doesn’t know you very well.

Grammar and Spelling Errors - A common indicator of a phishing attempt is grammar and spelling errors in the email.

Inconsistencies in Email Addresses, Links, & Domains - An Attacker will often use look-alike domains in email addresses and links. Look for minor changes or swapped letters in the domain.

Sense of Urgency - If the message makes you feel like something bad will happen if you don’t respond or act quickly, this may be a phishing attempt.

Unusual Request - If the message is asking for something unusual (purchasing gift cards, bitcoin, etc.) it is probably a scam.

Suspicious Attachments - The bad guys often use phishing emails to send these attachments because they know many people are curious enough to open them and click on whatever links or buttons they contain.

You don’t know the sender - If you don’t know the sender, they are probably trying to sell you something or trick you.

 



How do I sign onto the VPN?

 
 

What is the NSM Password Policy?

All NSM Employees will be required to follow the new password policy the next time your password expires. We know that 80% of company data breaches are due to poor passwords.  As our IT Team continues to implement ways to protect employees and clients against cyber-security attacks, all employees will now be required to use a 15-character password. 

New Password Policy
  • Minimum of 15 characters in length.
  • Requires only letters and numbers. (we encourage special characters and spaces)
  • Requires only 1 password change a year.
Remembering your Password
To help you remember your password, think of a passphrase instead of a password.  A passphrase is a sequence of words or other text used to control access to a computer system, program or data. A passphrase is similar to a password in usage, but is generally longer for added security.

Passphrase Examples
  • “TheLastDance 23!”
  • “Listen,Children!”
  • “Mymom#isbetter.”
Do NOT use common phrases or repeats such as:
  • “Lets Get Moving”
  • “Passwordpassword”
Credential Changes
Recent studies on password policies indicate that routinely changing your password actually results in bad habits and poor password techniques.  Going forward, you will only need to change your NSM password once a year, unless you have been compromised by a security incident. If you forget your password, utilize the Self-Service Password Reset tool to update your password.
 
 

How do I find my IP address?

 
 

How do I use the mobile hotspot on my iPhone?

 
 

How do I use the UltiPro mobile app?