<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Cathie Briggette

Recent Posts

Tape Backup or Cloud Backup... Which One To Choose?

Posted by Cathie Briggette on Thu, Apr 23, 2015

With perpetual increased proficiency in cloud services (storage, file sharing, etc) I find it peculiar that, when it comes to backup recovery, some people and businesses alike are still hesitant to exploit one of the cloud’s greatest assets. Remember that ancient method of data backup and recovery, the one involving those rectangular pieces of plastic with that delicate magnetic strip? What were those things called again? Oh right, floppy disks. Do they even still make those? One of the longstanding debates when it comes to backup recovery is whether to use tape or disk backup; but the question I’m asking is, “Why use either?”

Read More

Topics: Cloud Computing, Disaster Recovery

All the different kinds of viruses and the antivirus protection against them

Posted by Cathie Briggette on Wed, Apr 22, 2015

People often consider the only threat against their computers to be a virus. This is a common misconception that often leads to detrimental system damage. A virus, in fact, is a specific threat that falls into the broad category of malicious software, or malware. Malware is used to disrupt computer operations, gather privileged information, and gain unauthorized access by hackers and frauds. Here are a few items that you might not know, but should learn to differentiate when it comes to malware.

Read More

Topics: Disaster Recovery

Windows Server 2003 Microsoft support ends soon

Posted by Cathie Briggette on Tue, Mar 31, 2015

Windows Server 2003 Operating System Support Ends July 14, 2015

Windows 2003 Small Business ServerAs of July 2014, there were 12 million physical servers worldwide still running Windows Server 2003.  According to Redmond Magazine.  And 9.4 million of those instances are in North America. 

Read More

Topics: Microsoft, Data Security, Windows Server

Information Technology Buzzwords You Need to Know

Posted by Cathie Briggette on Fri, Mar 20, 2015
 1. Software Designed Networking (SDN) – “Software Defined Networking (SDN) is enabling organizations to accelerate application deployment and delivery, dramatically reducing IT costs through policy-enabled workflow automation. SDN technology enables cloud architectures by delivering automated, on-demand application delivery and mobility at scale. SDN enhances the benefits of data center virtualization, increasing resource flexibility and utilization and reducing infrastructure costs and overhead.

Software_Design_Networking

SDN accomplishes these business objectives by converging the management of network and application services into centralized, extensible orchestration platforms that can automate the provisioning and configuration of the entire infrastructure. Common centralized IT policies bring together disparate IT groups and workflows. The result is a modern infrastructure that can deliver new applications and services in minutes, rather than days or weeks required in the past.

Read More

Topics: New Technology

Protecting Client's Sensitive Data and Personal Information

Posted by Cathie Briggette on Tue, Mar 17, 2015

According to recent studies, phishing attacks increased by 59% in one year.  And Social Engineering and Hacker Attacks are increasing even more.

In 2014 Webroot and RSA, the security division of EMC, announced a new technology partnership.  The partnership created an integration with Webroot’s real time anti-phishing service and RSA’s FraudAction anti-phishing service.  This partnership created SecureAnywhere Antivirus.  Giving IT departments and managers the ability to detect phishing attacks in real time within their organizations. 

Phishing_Scams

SecureAnywhere Antivirus is more than an anti-phishing software. In addition to being excellent anti-phishing protection, it is antimalware protection, it includes firewall-style program control, and has powerful protection for your browser and secure connections.  It stops the viruses and worms that exist to infect other computers within your business infrastructure. It protects your employees while they are web surfing, by blocking harmful websites. And it takes down spyware that tries to deceive your employees or exploit vulnerabilities within your organization's operating systems.

Spyware steals information from computers and sends it to someone else. Some spyware is fairly benign. Adware, for example, watches you in order to tailor advertisements based on your habits. Adware can also happen with your consent if you opt to use a free service that involves accepting ads. Another less-lethal form of spyware is the tracking cookie. Advertising companies install cookies on your computer in response to you clicking on ads. Unless you delete it, the advertiser will know when you visit a site with its ads.

SpywareIf spyware was just adware and tracking cookies, it would just be annoying. But spyware has worse forms. Some spyware can change your computer settings, slowing down internet connections and slowing down your home page. Webroot SecureAnywhere Antivirus insulates you from these spyware attempts to infect your PCs.

Webroot SecureAnywhere works in a few different ways.

  • It scans data and blocks viruses that it detects.
  • It removes malware that already exists on a computer.
  • It can be programmed to scan PCs according to any schedule.
  • It looks at the Windows registry, operating system files and applications to give you a list of threats.
  • Unlike other antivirus programs that use the latest threat signatures to protect your PC, yet they cannot protect against a brand new, zero-day threat, Webroot uses other ways to detect threats based on the threats behaviors or by comparing with other known threat families.
  • The web protection includes warnings if you try to go to a malicious site that pops up in a search result
  • It protects you against phishing attempts and dangers that might arrive via Facebook or Twitter
  • It works on Windows PCs, Macs, Android Phones or Tablets, iPhones and iPads

The architecture of Webroot’s code uses a small footprint that gathers its information in the cloud. The actual signature database that is part of Webroot is housed in the cloud, so it does not take up space on your computers or servers.  This cloud based database relies on analyzing behaviors of suspected malware. It is compact and efficient.

NSK's IT Managed Services protects our client’s sensitive data and personal information with antivirus, internet security and identity protection.

Outsourced IT Services - Managed Services

 

Read More

Topics: Managed Services, Data Security