<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Information Technology Buzzwords You Need to Know

Posted by Cathie Briggette on Fri, Mar 20, 2015
 1. Software Designed Networking (SDN) – “Software Defined Networking (SDN) is enabling organizations to accelerate application deployment and delivery, dramatically reducing IT costs through policy-enabled workflow automation. SDN technology enables cloud architectures by delivering automated, on-demand application delivery and mobility at scale. SDN enhances the benefits of data center virtualization, increasing resource flexibility and utilization and reducing infrastructure costs and overhead.

Software_Design_Networking

SDN accomplishes these business objectives by converging the management of network and application services into centralized, extensible orchestration platforms that can automate the provisioning and configuration of the entire infrastructure. Common centralized IT policies bring together disparate IT groups and workflows. The result is a modern infrastructure that can deliver new applications and services in minutes, rather than days or weeks required in the past.

Read More

Topics: New Technology

Protecting Client's Sensitive Data and Personal Information

Posted by Cathie Briggette on Tue, Mar 17, 2015

According to recent studies, phishing attacks increased by 59% in one year.  And Social Engineering and Hacker Attacks are increasing even more.

In 2014 Webroot and RSA, the security division of EMC, announced a new technology partnership.  The partnership created an integration with Webroot’s real time anti-phishing service and RSA’s FraudAction anti-phishing service.  This partnership created SecureAnywhere Antivirus.  Giving IT departments and managers the ability to detect phishing attacks in real time within their organizations. 

Phishing_Scams

SecureAnywhere Antivirus is more than an anti-phishing software. In addition to being excellent anti-phishing protection, it is antimalware protection, it includes firewall-style program control, and has powerful protection for your browser and secure connections.  It stops the viruses and worms that exist to infect other computers within your business infrastructure. It protects your employees while they are web surfing, by blocking harmful websites. And it takes down spyware that tries to deceive your employees or exploit vulnerabilities within your organization's operating systems.

Spyware steals information from computers and sends it to someone else. Some spyware is fairly benign. Adware, for example, watches you in order to tailor advertisements based on your habits. Adware can also happen with your consent if you opt to use a free service that involves accepting ads. Another less-lethal form of spyware is the tracking cookie. Advertising companies install cookies on your computer in response to you clicking on ads. Unless you delete it, the advertiser will know when you visit a site with its ads.

SpywareIf spyware was just adware and tracking cookies, it would just be annoying. But spyware has worse forms. Some spyware can change your computer settings, slowing down internet connections and slowing down your home page. Webroot SecureAnywhere Antivirus insulates you from these spyware attempts to infect your PCs.

Webroot SecureAnywhere works in a few different ways.

  • It scans data and blocks viruses that it detects.
  • It removes malware that already exists on a computer.
  • It can be programmed to scan PCs according to any schedule.
  • It looks at the Windows registry, operating system files and applications to give you a list of threats.
  • Unlike other antivirus programs that use the latest threat signatures to protect your PC, yet they cannot protect against a brand new, zero-day threat, Webroot uses other ways to detect threats based on the threats behaviors or by comparing with other known threat families.
  • The web protection includes warnings if you try to go to a malicious site that pops up in a search result
  • It protects you against phishing attempts and dangers that might arrive via Facebook or Twitter
  • It works on Windows PCs, Macs, Android Phones or Tablets, iPhones and iPads

The architecture of Webroot’s code uses a small footprint that gathers its information in the cloud. The actual signature database that is part of Webroot is housed in the cloud, so it does not take up space on your computers or servers.  This cloud based database relies on analyzing behaviors of suspected malware. It is compact and efficient.

NSK's IT Managed Services protects our client’s sensitive data and personal information with antivirus, internet security and identity protection.

Outsourced IT Services - Managed Services

 

Read More

Topics: Managed Services, Data Security

Boston Mayor's Implementation of New Technology

Posted by Philip Tang on Fri, Mar 13, 2015
Boston's 54th mayor, Martin J. Walsh, implements new technology to improve the city's day-to-day endeavors

Boston's Mayor Martin J. Walsh recently wrote for the Huffington Postsharing some ways the city has integrated new technology to boost its problem-solving capabilties.  The essence of a Mayor's job, according to Walsh, is "meeting people's challenges, solving problems and getting things done."  New technology is the engine by which these tasks can be accomplished.

Read More

Topics: New Technology

Back Up Disaster Recovery (BDR)

Posted by Cathie Briggette on Thu, Mar 12, 2015

Business Protection Checklist

checklistEvery business has critical data and applications they need to protect – personal work stored on laptops, business applications running on servers, or infrastructure systems like email and payroll.  All of this information is vital to the operation of any business.

If you are a small or medium-sized business, looking after all this data is a major challenge.  You have limited budgets and limited IT resources.  Let’s face it, sometimes things go wrong.  Laptops get stolen.  Email servers fail.  Someone accidentally deletes a file, or even worse, an entire folder of vital business information.  Systems get hacked, files get corrupted, and as we all know, disasters like fire, hurricanes and floods do happen.

BACK-UP DISASTER RECOVERY CHECKLIST
YES     NO     Are your laptops and desktops protected automatically?              

YES     NO     Is a copy of your data moved off site each day, safe from fire flood, or sabotage?                

YES     NO     Can you backup Microsoft, Linux and Mac?

YES     NO     Can you get your business back up and running in 15 minutes or less when a server fails?

Can you quickly viertualize your servers and work off the cloud
iof your business site is damaged?                                              

Can you do all of this without spending upfront costs
on new hardware or software?                                                      YES             NO

If you answered NO to any of these questions, your data IS AT RISK!


Read More

Topics: Disaster Recovery

Tech Fixes: Finding Your PC's Windows Product Key So You Can Reinstall Windows

Posted by Mauricio Cornejo on Tue, Mar 10, 2015

How To Find Your PC's Windows Product Key So You Can Reinstall Windows

Read More

Topics: Tech Fixes