IT Consultants' Insight on Business Technology | NSK Inc.

Choosing a managed services provider: Proactive vs. Reactive services

Posted by Hannah Manning Mon, Jul 31, 2017

In our first post about choosing a managed services provider (MSP), we spoke about one of the major differences between several providers and suggested that you formulate a list of questions that will guide you through the selection process.

We also discussed, briefly, two business models that dominate the MSP field: reactive and proactive services.

While these two models do accomplish a common goal in helping a company with their IT needs, there is a world of difference between the two.

Read More

Topics: Managed Services, IT Services, BostonIT

Choosing a managed services provider: Money matters

Posted by Hannah Manning Wed, Jul 26, 2017

It’s hard to know which managed services provider (MSP) is best for your company when the pool to choose from is really more like an ocean.

If you find yourself, say, stranded on a flimsy raft in the middle of said ocean you may feel a considerable amount of confusion and even fatigue over how these MSPs are different from each other.

Sure, no wave in an ocean is the exact same as another – but they all look alike and they all do the same thing. Right?

Read More

Topics: Managed Services, IT Services, BostonIT

How does net neutrality affect me?

Posted by Hannah Manning Tue, Jul 18, 2017

If you’ve logged onto Reddit, Twitter, Tumblr or several other social media websites in the past week you may have noticed banners or splash pages urging you and other users to take action against something called “net neutrality.”

Sounds kind of serious, huh? You might be wondering why all hands seem to be on the digital deck this week.

Read More

Topics: Social Media, BostonIT

E-manipulation: What is social engineering?

Posted by Hannah Manning Thu, Jun 22, 2017

So you have a Nigerian prince in your emails who seems nice enough. He’s never been anything but polite, and from the looks of it, he has had a rough time lately. As it turns out, being a prince is not as lucrative as it sounds. He just needs $12,000 from you to make it all better.

You know how this story ends. You laugh it off because you know it’s a scam – you don’t know this guy, why would you ever give him money?

But what happens when someone you do know emails you out of the blue, needing some cash? Or if a coworker asks for access to a file? Or if someone you’re pretty sure you know sends you a link that you just have to click?

Read More

Topics: Data Security, cybersecurity, social engineering, email security, BostonIT

Chips in the armor: PEN or Vulnerability Testing?

Posted by Hannah Manning Mon, Jun 19, 2017

Reports of hacking bank information, dating websites and even the 2016 presidential campaign have not only contributed to high levels of paranoia for businesses but driven them to consider testing their own networks and firewalls for any possible security breaches.

The only problem is choosing between doing PEN testing, vulnerability testing or both.

Making the choice can be difficult for organizations unversed in the differences between the two tests. PEN testing and vulnerability testing have been mistakenly labeled as the same because of some conflicting reports and marketing missteps.

Read More

Topics: Data Security, Tech Fixes, BostonIT

Whose fault is that Data Breach?

Posted by Monica DeStefano Tue, May 09, 2017

Co Authored by:  Steven Lai

Being in a high position at a company is never easy, especially when you are the CEO and are responsible for both employee and client information. You are expected to be the visionary, the fearless leader, while bearing the burden of heavy management responsibilities.  All this, while maintaining the financial stability of the company and healthy relationships with both personnel and clientele.  

Putting out fires is a constant part of your C-level role.  You deal with the complexity of your business growth, while tackling, head on, the legality of keeping all your information secure and protected. 

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, data storage, BostonIT

Smishing?  What is Smishing?

Posted by Steven Lai Mon, Apr 03, 2017

 

 
Chinese hackers have set up a fake phone tower to send text messages to Android  mobile users. The text contains a brief text that states "Congratulations! you have won 100 GB internet pack". Along with the message within the text, includes an URL link that links mobile users to a virus.    

SMiShing

The title of this committed crime is called SMiShing. S M i S hing is all about tricking victims by sending out a malware app that links through text. The purpose of this crime is to trick individuals into giving out sensitive information by having them
Read More

Topics: cybersecurity, SmiShing, BostonIT