<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

10 Reasons to Upgrade your Windows 2003 Right Now!

Posted by Cathie Briggette on Tue, Jun 23, 2015
windows_2003_the_end

Is your company still working on Windows Small Business Server 2003 (Windows 2003)?  If so you should be discussing with your IT provider or your IT Services group or they should definitely be talking to you about the approaching end of support (July 2015). If you aren’t already getting ready for the switch, your business is cutting it really really close.

Here are 10 reasons you should upgrade your 2003 Server today…. Or as soon as possible.

Read More

Topics: Data Security, IT Services, Windows Server

Tough Mudder and NSK Inc

Posted by Cathie Briggette on Thu, Jun 18, 2015

NSK_Touch_Mudder12NSK helped to sponsor a Tough Mudder event in June of 2015.  

NSK_Touch_Mudder11

Two of NSK Inc’s employees and one former, were involved in the Tough Mudder event held in New Hampshire.  The employees included on the Tough Mudder NSK Inc Team were: Mike Zappala, Senior IT Consultant in Field Services; Ahmed Fadili, NSK’s Field Services Manager; and past employee Chris McNair.  The 3 teamed with 6 other people including 1 woman.

Read More

Topics: NSK Team

Marketing Internship Available

Posted by Cathie Briggette on Tue, Jun 16, 2015

Field IT Consultant Wanted

Position Title:                       Field IT Consultant 

Position Type:                      Scheduled IT Tech

IT Field Tech (Full-Time) (Boston)

NSK Inc. is an IT consulting firm in Boston. We work closely with our various clients in order to create, maintain and support their networks. Our client list spans multiple industries thus exposing our employees to many technologies. This aspect of our business keeps our environment fast-paced, up-to-date and, most importantly, fun! 

This is a full-time salaried position with benefits.

Read More

Topics: NSK Team

Small Business Challenges and Mobile Solutions

Posted by Dillon MacInnis on Mon, Jun 15, 2015

As we encounter the limitless capabilities of the smartphones that continue to spend increasingly more time in our hands than our pockets, it is certain that consumers are not ignoring the value of mobile technology. Additionally, as mobile business applications increase in number and quality, the purpose of smartphones remains evidently dynamic. It is an anomaly why only about half of small and medium-sized businesses have truly began implementing the versatility of mobile technology into their model. Nonetheless, there is an upward trend in the number of businesses that are making this important stride, and it is certainly not too late for small businesses to become leaders in mobile technology utilization and integration. This is especially true given that new mobile solutions are continually developing therefore allowing some businesses to become the first to utilize a particular element of this technology.

Read More

Topics: Mobile Device Management, Technology Improvements

Mending a Bleeding Heart: Cognizance as an IT Security Solution

Posted by Dillon MacInnis on Mon, Jun 08, 2015

The nationally publicized security disaster of April 2014 known as the "Heartbleed" bug has certainly drawn attention to the developing need to prioritize security when dealing with information systems. A single, flawed line of code written into an extension of the widely used web encryption software called OpenSSL granted access to stored private and personal data to those who sought to illegally obtain it. While the software was built to maintain periodic open connections between servers in order to regulate operation, the mentioned line of code inadvertently allowed 64 kilobytes of information to be accessed by a web attacker when an open connection was established. Furthermore, given that the process was periodic, an individual extracting information illegally could accumulate valuable data over time by continuously exploiting each open connection. As a consequence, hackers were able to acquire usernames, passwords, credit card information, and each server’s private digital key, which made classified internal documents available to unauthorized parties. Although this vulnerability was ultimately patched, the event made an example of the problems that arise when software is not monitored for exploitable weaknesses.

Read More

Topics: Data Security, Technology Improvements, Cloud Security