HELP DESK
617.938.6200
Main Menu
ABOUT
FOCUS EXPERIENCE
LEADERSHIP TEAM
CAREERS
COMMUNITY
SERVICES & SOLUTIONS
NEXT GENERATION IT INFRASTRUCTURE
MANAGED SERVICES
IT PREMIER
IT ASSURE
IT FLEXSERV
CYBERSECURITY
CLOUD AND AUTOMATION
HELP DESK
PROFESSIONAL SERVICES
PARTNERS
BLOG & NEWS
AWARDS
RESOURCES
Expert Videos
In Focus Podcasts
CONTACT
Cybersecurity and the Hybrid Work Model
How to Choose a Managed Service Provider
Common IT Terms Every Business Owner Should Know
New Linux vulnerability is the worst in years and so simple to execute
The Cyber Insurance Problem
MSP Client Onboarding Checklist
Why Does IT Infrastructure Matter?
Focus Technology 2021 Year in Review
Cybersecurity: Focus Technology Achieves Cisco's Advanced Security Architecture Specialization in the US
Focus Technology Named a 2021 CRN Triple Crown Winner for Fifth Year
Avoid Zero Day Shelfware
NIST Cybersecurity: Why It’s Time to Pay Attention
3 Tips to Future Proofing Your Data Solution
An Uptick in Cybercrime: How to Prepare Against Malicious Hackers
Focus Technology Completes MSP Verify Certification with SOC 2
Defending Your Organization Against Security Breaches: A 10 Step Approach
Focus Technology Named a 2020 CRN Triple Crown Winner for Fourth Year
Helping our customers transform to data driven organizations
Focus Technology Acquires Data Engineering Firm IntegritD
Beware: Uptick in Ransomware Successful Attacks
10 Benefits of Using a Managed Services Provider
Focus Technology Boasts 73% Three-Year Revenue Growth to Earn Spot on 2020 Inc. 5000 List
Look for These Five Qualities in Your Next vCIO
Focus Technology Launches IT SecurManage to Meet Critical Market Need for Network Security
3 Steps You Can Take to Secure Your Network Infrastructure Post-COVID
Have you heard the term, “Social Engineering Hacking”?
Focus Technology Sees 27% Rise in 2020 CRN Solutions Provider 500 Ranking Over Last Three Years
VDI is Within Reach
Boston Business Journal names Focus Technology a 2020 Best Places to Work company
How to Simplify Your Security Landscape and Protect Against COVID-Related Threats
Webinar: Getting Back to Business as (Not) Usual
Focus Technology Sponsors American Heart Association’s Boston Heart Walk and Becomes Healthy for Good Champion
Top 5 Reasons Organizations Seek Outside Help with Technology
Tips to Maximize Security of Your System and Network at Home
Focus Technology Named a 2020 Fast 50 Company by Boston Business Journal
Focus Technology Achieves Titanium Tier in 2020 Dell Technologies Partner Program
Tips for Ensuring a Secure Employee Telework Environment
Need Help with Your Remote Workforce? 7 Ways the Focus Managed Services Work from Home Task Force Can Help
Practicing Preparedness in These Uncertain Times
Focus Technology Named to Boston Business Journal 2020 Book of Lists
Quick glance between Cisco’s 9500 and 4500X series fixed core switches
5 Ways CFOs are Reducing Costs with Managed IT Services
Get Cyber Risk Fit with our 3 Step Fitness Plan
5 Ways CFOs are Reducing Costs with Managed IT Services
IT Services and Support for Architecture and Engineering
Get Cyber Risk Fit with our 3 Step Fitness Plan
Are Remote Employees a Security Risk?
CyberSecurity Hygiene
Sleep Better Soon
The essential elements of a killer cloud strategy
Pushy Salespeople
Stop Changing Your Passwords
You may be better than you think!
IT's All About Timing
A Mix of Sun and Clouds
The (not-so) Secret Way To Be IT Heroes
Are Remote Employees a Security Risk
Choosing a managed services provider: Proactive vs. Reactive services
Choosing a managed services provider: Money matters
BitHawk - An example of finding Adware/Malware on an Android phone
How does net neutrality affect me?
Warning! Don't Click!
Protecting your company against ransomware attacks
What does it mean to be security aware?
E-manipulation: What is social engineering?
Chips in the armor: PEN or Vulnerability Testing?
The Evolution of Wireless in the Workplace
Legacy Systems Interfering With Government's Cyber Security
Company Exec Posers, Spread Spam
WannaCry Malware Attack 2017
3 BEST Ways to Protect your Cloud Accounts
Cybercrime Tweets
More on 201 CMR 17 - Get that WISP
Airline Phishing Attack
What Data Discovery Tools do you need in 2017?
New Web Browser promises privacy
Notorious Russian Hacker Caught & Arrested by FBI
A new ransomware that deletes ALL of your backup files
Singapore's Defense Ministry Hit With First Major Cyber Attack
What’s Your Ransomware Recovery Plan?
SecureWorks finds & exposes phishing Russian hacker group APT28
What!? Congress wants you to Pay for online privacy?!
What is Data Mapping Software?
The top ten features the Android O update has to offer
10 Tips On How To Avoid SMiShing (SMS Phishing)
Smishing? What is Smishing?
Sound waves can now be used to hack into mobile devices
7 Tips on spotting social engineering in emails
Tech Companies are not Immune to Cyber Fraud Either
Yahoo Servers were hacked by FSB Spies and others
W-2 Phishing Scam Happening Through Emails
Hard Evidence On The Benefits of Utilizing 5ghz Bands in The Wireless Workplace
5 reasons SMBs go with IT Managed Services
Keeping your Business Relevant in 2017
To Splunk or Not to Splunk
What is an IT Managed Services Provider?
Top 10 KnowBe4 IT Security Trends for 2017
Top 3 Tips to protect your business from ransomware
What is Ransomware?
Cyber Security and Cyber Monday: Top 7 Ways to Keep Safe this Holiday Shopping Season
Phishy Business - Protect Your Data
Adult Friend Finder and Penthouse Victims of Record Breaking Data Breach
5 Ways Your Cloud-Computing Security Could be at Risk
Newest Net Attack Sheds Light on the Dangers of IoT Devices
The 8 layers of cyber security needed to protect your business
Top 5 Tips for Storing and Strengthening Your Passwords
Top 6 Tricks to Secure Your IoT devices
IoT and Smart Home Devices: Is your home secure?
NSK Inc's Top 5 Security Threats of 2016
Cyber Security: Protecting Your Mobile Device
Cyber Security Best Practices – October is Cyber Security Month
Cyber Security and the Breach at Yahoo
Biggest Threats Facing Cyber Security
In-house IT vs. Outsourced IT.
Does it make sense to outsource your IT?
Top 5 Reasons SMBs Outsource IT
Outsourcing IT without Disrupting Business Continuity
Choosing the Right IT Services Firm in Boston
Why Avamar
Have you heard of Cloud
Top 4 Reasons Why SMBs Choose Office 365 over Google Apps for Work
Help Desk vs. Service Desk
What's The Hype on VxRail?
The Top 4 Security Apps to Protect Your Business
Microsoft Services Agreement and Privacy Statement made clearer
Why Apple's Sales are Continuing to Drop
How Technology is Helping People Get to the Polls
What I Learned at Cisco Live
What is a SOC 3 Compliance Report for Financial Services Companies
How Pokemon Go is Bringing Augmented Reality to the Masses
10 dos and don’ts of using Microsoft PowerPoint for a presentation
The Importance of Cybersecurity for Your Small Business
What to Expect at Cisco Live
The Business Case For Not Using a Managed Service Provider
Are We Entering a Post-App Era?
Top Tech Firms Partnering with EU to Monitor Posts on Social Media
Is Cisco Cloud Web Security Right For You?
Top 3 Questions Prospects and Clients ask about HIPPA
EMC VxRack
Operations/Purchasing Administrator Position Open
Business Continuity and Security DOs and DON'Ts
Unity Platform Announcement at EMC World 2016
What's New With Data Domain?
Understanding the Cyber Security Wizardry
Is Hyper-converged Right for Me?
Badlock the Crucial Security Vulnerability Bug
The New NSK IT Service Team Members
Moving your IT in Boston - White Paper
Why You Should Be Using Graphic Acceleration
What to Expect at EMC World 2016
Four (4) Social Media To Do's
Security Definitions for Beginners
Cyber Security Buzz Words
The Distinction Between Data Backup and Business Continuity
The Benefits of SSL Decryption
Can We Be More Informed Than Google?
Social Media in the Business World
Top 5 DataCenter Security Trends
Top 4 Advice Tips from the IT Experts on Computer Safety
Why Use Palo Alto as My Firewall Service?
The best headphones for less than $200 (new technology buys)
Social Engineering and Hacker Attacks
Simplify Your Security Data with the Splunk Enterprise App
Microsoft Surface Pro Safety Recall Notice
The Impact of VMware NSX
The Anatomy of A Next Generation Firewall
What's the Buzz on Splunk?
Office 365 vs. Hosted Exchange: Is there a right answer?
2015 Technology Recap
2015 Merry Christmas & Happy New Year from Your Boston IT Experts
Ransomware : 10 Steps to Avoid the Infection
Data Center Technology Trends to Watch Out for In 2016
Top 10 Holiday Tech Gift Ideas of 2015
IT Integration - What are the ingredients
October: National Cyber Security Month and What You Should Remember
Becoming a Sustainable Business
Is a Talent Shortage holding CIOs and Business Back?
Cisco FirePOWER- Prepare and Defend Your Network
The Head of the Charles and All of its Glory
XtremIO 4.0 Scale as You Grow Without Sacrificing any Performance
Dell Acquires EMC
A New Player in Backup? Why vSphere 6.0 Has People Talking
Technology Problems during a storm
5 Things your Employees should know about CyberSecurity
The New Microsoft Office 2016: Accessibility and Sharing at an Expert Level
Your Business May be Ready for Managed IT Services when…….
VMworld Announcement: Cross Cloud vMotion
NSK named in BBJ's Largest IT Services Firms in Massachusetts 2015
My Laptop Got Stolen -- How to Protect Your Device and Information
Databases: The Underlying IT Business Solution
Tech Fixes: How to Create a SPAM filter in Office 365
Windows 10 vs. Windows 8: What to Expect
Microsoft Azure: Opening Doors and Closing Windows
f.lux: Technology Accounting for Human Biology
Top 10 Questions to ask your managed services provider about Office 365
Virtual Desktop Implications Redefine the "Personal Computer"
How Secure is Office 365
The Meaning of Mobile
Windows 10 Upgrade - The 5 things businesses need to know
Business IT Meets IoT