IT Consultants' Insight on Business Technology | NSK Inc.

The essential elements of a killer cloud strategy

Posted by Cathie Briggette Wed, Nov 01, 2017

Blog Written by: Danish Wadhwa from www.flydot.biz

Read More

Topics: Cloud Computing, Cloud Security

PAID Marketing Intern WANTED

Posted by Cathie Briggette Fri, Sep 01, 2017

 

NSK Inc. is always looking for a marketing interns to work on a part-time basis (10-15 hrs per week) in our Marketing Department.  

 

Read More

Topics: Careers

Are Remote Employees a Security Risk

Posted by Cathie Briggette Fri, Aug 18, 2017

Written By Guest Blogger:  Caroline Black

We have entered the world of the flexible workforce. More and more companies, and people, are turning their backs on the way we used to work. There are great benefits in working from home or allowing employees to do so, for both the employer and employee. These include reduced overhead costs, increased engagement and improved productivity, to name a few. However, having even just one remote worker can expose a company to a wide variety of previously unknown security risks.

Read More

Topics: Mobile Device Management, cybersecurity

Choosing a managed services provider: Proactive vs. Reactive services

Posted by Hannah Manning Mon, Jul 31, 2017

In our first post about choosing a managed services provider (MSP), we spoke about one of the major differences between several providers and suggested that you formulate a list of questions that will guide you through the selection process.

We also discussed, briefly, two business models that dominate the MSP field: reactive and proactive services.

While these two models do accomplish a common goal in helping a company with their IT needs, there is a world of difference between the two.

Read More

Topics: Managed Services, IT Services, BostonIT

Choosing a managed services provider: Money matters

Posted by Hannah Manning Wed, Jul 26, 2017

It’s hard to know which managed services provider (MSP) is best for your company when the pool to choose from is really more like an ocean.

If you find yourself, say, stranded on a flimsy raft in the middle of said ocean you may feel a considerable amount of confusion and even fatigue over how these MSPs are different from each other.

Sure, no wave in an ocean is the exact same as another – but they all look alike and they all do the same thing. Right?

Read More

Topics: Managed Services, IT Services, BostonIT

BitHawk - An example of finding Adware/Malware on an Android phone

Posted by Cathie Briggette Wed, Jul 19, 2017

 

NSK’s new product BitHawk is a new cyber defense application that picks up where your antivirus solutions leave off.  It provides our customers with powerful, efficient protection and system clean-up capabilities. 

Below is an example of how it found an app on one of our Clients phone’s that was connected to Chinese adware/spyware servers and collecting data from the person’s phone. 

Read More

Topics: cybersecurity

How does net neutrality affect me?

Posted by Hannah Manning Tue, Jul 18, 2017

If you’ve logged onto Reddit, Twitter, Tumblr or several other social media websites in the past week you may have noticed banners or splash pages urging you and other users to take action against something called “net neutrality.”

Sounds kind of serious, huh? You might be wondering why all hands seem to be on the digital deck this week.

Read More

Topics: Social Media, BostonIT

Warning!  Don't Click!

Posted by Cathie Briggette Thu, Jul 13, 2017

The internet has become an indispensable tool for everyday life, both personal and business. Its global use and familiarity have also opened the doors for cyber criminals to take every opportunity to exploit vulnerable people through disturbing online attacks. Online scams and malware are also becoming increasingly sophisticated, and while many of us are aware of what to look for and what to do when they arise, there are some that may still be confused by the latest scams discussed in the media.

Read More

Topics: cybersecurity

Protecting your company against ransomware attacks

Posted by Hannah Manning Wed, Jun 28, 2017

One of a company’s worst nightmares goes a little something like this.

An employee boots up their computer at the beginning of the work day. A couple of minutes into work they get an email from someone who seems to be a coworker. They click the link without thinking, and a message flashes onto their screen:

“Your files have been encrypted. You have 24 hours to pay a fine of $500. If you do not pay the fine, your files will be permanently encrypted.”

Yesterday, for several companies across Europe and Asia and even in the United States, that nightmare became a reality.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, ransomware attacks, Malware

What does it mean to be security aware?

Posted by Hannah Manning Tue, Jun 27, 2017

In previous blog posts, we’ve talked a lot about how important it is to be aware of how secure your firewall really is. But you may be wondering one thing: what does it even mean to be “security aware?”

Read More

Topics: Data Security, Cloud Security, anti virus, cybersecurity