For Immediate Release
For Immediate Release
Topics: NSK Team, Managed Services, IT Services
NSK Inc, a Boston-based IT consulting firm is now a channel partner with netBlazr Inc. netBlazr is an innovative new Internet Service Provider (ISP) with coverage in Downtown Boston. netBlazr uses next-generation directional radios to transmit broadband internet service directly to its customers’ via an office window. netBlazr’s radical business model enables it to deliver basic DSL or cable modem speeds for free and high-speed premium services for a small fraction of market rates.
Topics: NSK Team
Topics: Cloud Computing, Disaster Recovery, Managed Services
This morning NSK Inc. met with IT and Human Resources Staff from the ICA, The Museum of Science, The Boston Children's Museum, Isabella Stewart Gardner Museum and the New England Genealogical Society to discuss the new Privacy Law that goes into effect in Massachusetts on March 1, 2010 (MGL 93H 201CMR17.00). The meeting was sponsored by and held at the ICA. Ryan Hickey and Timothy Lasonde from NSK Inc showed a Power Point presentation to everyone and explained the new law and what is required by Massachusetts companies to be in compliance by March 1, 2010.
Topics: Disaster Recovery, Data Security
All current Microsoft operating systems come configured to perform automated updates. However, most of the applications that are installed on your computer do not. Keep in mind that every application you use poses a potential risk that could allow an attacker to gain access to your system or information. So, configure your software to check for updates frequently. If it can’t be automated, make sure you check for updates to your software. Whether it’s Adobe Reader, Apple iTunes, Sun Java, Mozilla Firefox, or the latest video game, new vulnerabilities are constantly being discovered and patches are routinely being released. Update everything and update frequently.
Every application you have on your computer represents a potential vulnerability, or a way for an attacker to gain access. Consider your computer to be like a house and every application is like a window. When an application is vulnerable, it’s as if the window is open, allowing attackers easy entrance. Even when the window is close, i.e., the application is patched, the attacker can clearly see the window and can work to find a vulnerability that will open it up. If you don’t need an application, you should uninstall it. This is like removing the window and walling it in; there’s nothing there through which an attacker can even try to gain access.
Written by:
Ben Howard - MCSE, Security+, CCNA Security, NSA 4011
Topics: Disaster Recovery, Data Security