IT Consultants' Insight on Business Technology | NSK Inc.

Cathie Briggette

Recent Posts

The essential elements of a killer cloud strategy

Posted by Cathie Briggette Wed, Nov 01, 2017

Blog Written by: Danish Wadhwa from www.flydot.biz

Read More

Topics: Cloud Computing, Cloud Security

PAID Marketing Intern WANTED

Posted by Cathie Briggette Fri, Sep 01, 2017

 

NSK Inc. is always looking for a marketing interns to work on a part-time basis (10-15 hrs per week) in our Marketing Department.  

 

Read More

Topics: Careers

Are Remote Employees a Security Risk

Posted by Cathie Briggette Fri, Aug 18, 2017

Written By Guest Blogger:  Caroline Black

We have entered the world of the flexible workforce. More and more companies, and people, are turning their backs on the way we used to work. There are great benefits in working from home or allowing employees to do so, for both the employer and employee. These include reduced overhead costs, increased engagement and improved productivity, to name a few. However, having even just one remote worker can expose a company to a wide variety of previously unknown security risks.

Read More

Topics: Mobile Device Management, cybersecurity

BitHawk - An example of finding Adware/Malware on an Android phone

Posted by Cathie Briggette Wed, Jul 19, 2017

 

NSK’s new product BitHawk is a new cyber defense application that picks up where your antivirus solutions leave off.  It provides our customers with powerful, efficient protection and system clean-up capabilities. 

Below is an example of how it found an app on one of our Clients phone’s that was connected to Chinese adware/spyware servers and collecting data from the person’s phone. 

Read More

Topics: cybersecurity

Warning!  Don't Click!

Posted by Cathie Briggette Thu, Jul 13, 2017

The internet has become an indispensable tool for everyday life, both personal and business. Its global use and familiarity have also opened the doors for cyber criminals to take every opportunity to exploit vulnerable people through disturbing online attacks. Online scams and malware are also becoming increasingly sophisticated, and while many of us are aware of what to look for and what to do when they arise, there are some that may still be confused by the latest scams discussed in the media.

Read More

Topics: cybersecurity

More on 201 CMR 17 - Get that WISP

Posted by Cathie Briggette Thu, May 11, 2017

 

In February 2010, Massachusetts raised the bar in security for businesses keeping it's residents’ information, by creating the most comprehensive data protection and privacy law in the United States – 201 C.M.R. 17;  also, known as the Standards for the Protection of Personal Information of Residents of the Commonwealth. This regulation issued by the Department of Consumer Affairs requires all businesses that license or own personal information of a Massachusetts resident to comply with the minimum-security standards set forth in the regulation.

Read More

Topics: 201CMR17.00, cybersecurity

5 reasons SMBs go with IT Managed Services

Posted by Cathie Briggette Fri, Feb 03, 2017

Read More

Topics: Managed Services

What is an IT Managed Services Provider

Posted by Cathie Briggette Fri, Jan 13, 2017

There are quite a few definitions of what a managed IT service provider does, but the best one is:   a company that is the proactive manager that maintains & monitors an organization's IT systems on a regular basis while having the expertise to do so. The company here is known as Managed IT Service Provider or MSP. This company charges a monthly fee to handle these tasks at an Organization.

Read More

Topics: Managed Services, Help Desk, Tech Fixes, IT Services

Top 10 KnowBe4 IT Security Trends for 2017

Posted by Cathie Briggette Tue, Jan 03, 2017

These trends are practical things that will help you keep your network safer with improved defense-in-depth.
  1. A move from being defensive to a more proactive approach to IT security, for instance application firewalls that actually work and are easy to deploy.

  2. Machine learning that *works* spreads out to legacy endpoint security tools, and is able to do real-time payload analysis to prevent ransomware attacks.
  3. You will finally get affordable and smart enough network traffic analysis tools that will show if your network has been penetrated, combined with:
  4. Platforms that will show you understandable threat intelligence with analytics and reporting that will dramatically shorten the "dwell time" of hackers in your network.
Read More

Topics: Data Security, Cloud Security, cybersecurity, ransomware attacks, social engineering

Top 3 Tips to protect your business from ransomware

Posted by Cathie Briggette Thu, Dec 15, 2016

Tip #1:  Educate users on best security practices

Education is still the best way to help your business avoid infection by ransomware or any other form of malware.  Make your employees aware of pupular social engineering methods and tactics so they don't fall victim to phising emails or spoofed messages.  It is particularly helpful to share examples of these kinds of emails and the types of attachments that are often associated with social engineering attempts so that end users know to avoid them.  A managed services provider is well equipped to help you deliver this sort of training,

Read More

Topics: cybersecurity, ransomware attacks