<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

The (not-so) Secret Way To Be IT Heroes

Posted by Jason Gilbert on Mon, Aug 21, 2017

I don’t think I’ve heard the term used since the last economics class I took in college. It’s oft-relegated as neigh irrelevant - one of those ethereal, difficult to measure items, that’s left out of the equation for so many business decisions, especially in IT. Not that you can really blame the operational managers in IT – they’re typically so busy fighting fires and pushing projects forward that they’re happy if they can get any kind of metrics together into a report to get upper management off their backs. Trying to put a dollar value on intangibles isn’t even on the radar.

Read More

Topics: Managed Services, Opportunity Cost

Are Remote Employees a Security Risk

Posted by Cathie Briggette on Fri, Aug 18, 2017

Written By Guest Blogger:  Caroline Black

We have entered the world of the flexible workforce. More and more companies, and people, are turning their backs on the way we used to work. There are great benefits in working from home or allowing employees to do so, for both the employer and employee. These include reduced overhead costs, increased engagement and improved productivity, to name a few. However, having even just one remote worker can expose a company to a wide variety of previously unknown security risks.

Read More

Topics: Mobile Device Management, cybersecurity

Choosing a managed services provider: Proactive vs. Reactive services

Posted by Hannah Manning on Mon, Jul 31, 2017

In our first post about choosing a managed services provider (MSP), we spoke about one of the major differences between several providers and suggested that you formulate a list of questions that will guide you through the selection process.

We also discussed, briefly, two business models that dominate the MSP field: reactive and proactive services.

While these two models do accomplish a common goal in helping a company with their IT needs, there is a world of difference between the two.

Read More

Topics: Managed Services, IT Services, BostonIT

Choosing a managed services provider: Money matters

Posted by Hannah Manning on Wed, Jul 26, 2017

It’s hard to know which managed services provider (MSP) is best for your company when the pool to choose from is really more like an ocean.

If you find yourself, say, stranded on a flimsy raft in the middle of said ocean you may feel a considerable amount of confusion and even fatigue over how these MSPs are different from each other.

Sure, no wave in an ocean is the exact same as another – but they all look alike and they all do the same thing. Right?

Read More

Topics: Managed Services, IT Services, BostonIT

BitHawk - An example of finding Adware/Malware on an Android phone

Posted by Cathie Briggette on Wed, Jul 19, 2017

 

NSK’s new product BitHawk is a new cyber defense application that picks up where your antivirus solutions leave off.  It provides our customers with powerful, efficient protection and system clean-up capabilities. 

Below is an example of how it found an app on one of our Clients phone’s that was connected to Chinese adware/spyware servers and collecting data from the person’s phone. 

Read More

Topics: cybersecurity