<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Four (4) Social Media To Do's

Posted by Alyssa Steen on Wed, Mar 09, 2016

In this ever-expanding world of computers, internet connection has become an integral part of any business, big or small. Social media has allowed businesses, in many ways, to connect with more people around the world than traditional marketing techniques had ever made possible. However, knowing how to use social media effectively is something that requires time, patience, and ultimately a budget to maintain on a professional level. Some tools are better than others, some language is better suited for specific industries, and certain content is better for specific websites. When you add all of the different program options on top of discovering your actual audience out of the billions of people surfing the internet, social media can become quite the task. Thankfully, NSK is here to help.

Social_Media_Facts_Infographic.jpg

Read More

Topics: Social Media

Security Definitions for Beginners

Posted by Focus Solutions Engineer on Tue, Mar 08, 2016

Zero Day Exploit – A recent flaw discovered, that is leveraged by a hacker or “threat actor” before a patch or preventative measure can be made available by the manufacturer of the system or software. The bugs or flaws are unknown, go on undetected, and can continue to be exploited for many weeks, months or potentially years. Some security researchers will responsibly report such flaws to the company responsible, giving them enough lead time to pinpoint and resolve any such issues with software updates before going public with the information. Keep up with system patches, and make sure to look for network and traffic anomalies in your security management consoles.

Read More

Topics: Phishing, IPS, Next Generation Firewall, Security, Security Definitions, Threats, Zero Day Exploit

Cyber Security Buzz Words

Posted by Alyssa Steen on Tue, Mar 01, 2016
A few weeks ago, I published a post on here describing the top 4 tips to stay safe on your computer based on the advice from the IT professionals here at NSK Inc. However, knowing the basic tips doesn’t necessarily mean you are able to grasp all the concepts, and the jargon, involved with the IT world. When it comes to cyber security, there is an almost endless list of terms for things to look out for. At NSK, we know that it is our job to help make that endless list seem less daunting, while also ensuring that you feel well informed. Cyber security is one of the top priorities at NSK and with cyber crime becoming more mainstream as time goes on, it is incredibly important for both us as your IT professionals, and you as our customers, to understand the threats at hand. So without further ado, here are the terms you need to know in order to “speak cyber.”

Cyber Security Infographpic - Being safe online

Read More

Topics: Cloud Computing, Managed Services, cybersecurity, data storage

The Distinction Between Data Backup and Business Continuity

Posted by Cathie Briggette on Mon, Feb 29, 2016

Written by Brandon Garcin on Feb 29, 2016 6:00:00 AM on Continuum MSP Blog

Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the “technology” was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards was then further developed by IBM in the early days of data processing, where data input, storage and commands were captured using a series of hole punches.

IBM_350_Disk_Storage.jpgIBM Archives:   https://www-03.ibm.com/ibm/history/exhibits/storage/storage_350.html

Read More

Topics: Cloud Computing, Disaster Recovery, Business Continuity

The Benefits of SSL Decryption

Posted by Focus Solutions Engineer on Thu, Feb 25, 2016

More of the web is encrypted today than ever before. Use of SSL certificates is on the rise and with good reason. Concerns over user and data privacy are a large part of the push to an encrypted web. The good news is that encrypted web traffic does in fact make snooping a lot harder to do. The bad news is that writers of malicious software have also picked up on the trend, making malware detection and web usage compliance much harder for system and network admins alike.

Read More

Topics: Network Security, Security, SSL Decryption, SSLI