<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

NSK Inc Makes Boston Business Journal Book Of Lists

Posted by Michael Lupacchino on Fri, Feb 05, 2010

For Immediate Release

Read More

Topics: NSK Team, Managed Services, IT Services

NSK Inc Joins Forces With netBlazr Broadband Internet

Posted by Cathie Briggette on Thu, Feb 04, 2010

NSK Inc, a Boston-based IT consulting firm is now a channel partner with netBlazr Inc. netBlazr is an innovative new Internet Service Provider (ISP) with coverage in Downtown Boston. netBlazr uses next-generation directional radios to transmit broadband internet service directly to its customers’ via an office window. netBlazr’s radical business model enables it to deliver basic DSL or cable modem speeds for free and high-speed premium services for a small fraction of market rates.

Read More

Topics: NSK Team

IT Associate at NSK Inc. Receives VMWare Certification

Posted by Cathie Briggette on Mon, Feb 01, 2010

IT Associate at NSK Inc. Receives VMWare Certification 

Read More

Topics: Cloud Computing, Disaster Recovery, Managed Services

MPICA Seminar Presentation of MGL 93H 201CMR17.00 at the ICA

Posted by Cathie Briggette on Tue, Jan 12, 2010

 MPICA Seminar Presentation of MGL 93H 201CMR17.00 at the ICA

MPICA MGL93H Compliant  This morning NSK Inc. met with IT and Human Resources Staff from the ICA, The Museum of Science, The Boston Children's Museum, Isabella Stewart Gardner Museum and the New England Genealogical Society to discuss the new Privacy Law that goes into effect in Massachusetts on March 1, 2010 (MGL 93H 201CMR17.00).  The meeting was sponsored by and held at the ICA.  Ryan Hickey and Timothy Lasonde from NSK Inc showed a Power Point presentation to everyone and explained the new law and what is required by Massachusetts companies to be in compliance by March 1, 2010.

Read More

Topics: Disaster Recovery, Data Security

IT Security Tips for Computer Applications

Posted by Melissa Cocks on Fri, Dec 11, 2009

IT Security Tips for Computer Applications

Update your software:ComputerSecurity

All current Microsoft operating systems come configured to perform automated updates.  However, most of the applications that are installed on your computer do not.  Keep in mind that every application you use poses a potential risk that could allow an attacker to gain access to your system or information.  So, configure your software to check for updates frequently.  If it can’t be automated, make sure you check for updates to your software.  Whether it’s Adobe Reader, Apple iTunes, Sun Java, Mozilla Firefox, or the latest video game, new vulnerabilities are constantly being discovered and patches are routinely being released.  Update everything and update frequently.

If you don’t need it, uninstall it:

 Every application you have on your computer represents a potential vulnerability, or a way for an attacker to gain access.  Consider your computer to be like a house and every application is like a window.  When an application is vulnerable, it’s as if the window is open, allowing attackers easy entrance.  Even when the window is close, i.e., the application is patched, the attacker can clearly see the window and can work to find a vulnerability that will open it up.  If you don’t need an application, you should uninstall it.  This is like removing the window and walling it in; there’s nothing there through which an attacker can even try to gain access.

 

Written by:

 

Ben Howard - MCSE, Security+, CCNA Security, NSA 4011
Senior IT Associate
NSK Inc. 

 

Read More

Topics: Disaster Recovery, Data Security