IT Consultants' Insight on Business Technology | NSK Inc.

The essential elements of a killer cloud strategy

Posted by Cathie Briggette Wed, Nov 01, 2017

Blog Written by: Danish Wadhwa from

Read More

Topics: Cloud Computing, Cloud Security

What does it mean to be security aware?

Posted by Hannah Manning Tue, Jun 27, 2017

In previous blog posts, we’ve talked a lot about how important it is to be aware of how secure your firewall really is. But you may be wondering one thing: what does it even mean to be “security aware?”

Read More

Topics: Data Security, Cloud Security, anti virus, cybersecurity

3 BEST Ways to Protect your Cloud Accounts

Posted by Steven Lai Fri, May 12, 2017

There are quite a few cloud based applications,  such as iCloud, twitter, facebook, that are known to be easily hacked, especially with the wave of hacks against celebrity accounts.  So it is very important to take these three steps and measurements to ensure protection on all of your Cloud Accounts.


Read More

Topics: Data Security, Apple, Cloud Security, cybersecurity

Top 10 KnowBe4 IT Security Trends for 2017

Posted by Cathie Briggette Tue, Jan 03, 2017

These trends are practical things that will help you keep your network safer with improved defense-in-depth.
  1. A move from being defensive to a more proactive approach to IT security, for instance application firewalls that actually work and are easy to deploy.

  2. Machine learning that *works* spreads out to legacy endpoint security tools, and is able to do real-time payload analysis to prevent ransomware attacks.
  3. You will finally get affordable and smart enough network traffic analysis tools that will show if your network has been penetrated, combined with:
  4. Platforms that will show you understandable threat intelligence with analytics and reporting that will dramatically shorten the "dwell time" of hackers in your network.
Read More

Topics: Data Security, Cloud Security, cybersecurity, ransomware attacks, social engineering

5 Ways Your Cloud-Computing Security Could be at Risk

Posted by Molly Abrahamson Tue, Nov 08, 2016

In a recent study, the Ponemon Institute interviewed 3,476 IT professionals and IT security practitioners from the US and around the globe. It was discovered that 73 percent of respondents find cloud-computing and cloud-based services vital to their organization’s operations. 54 percent however, said that their companies don’t have a proactive approach to security. As cloud-computing becomes more useful and popular, it is critical to pay attention to the security of these cloud services, especially when the customer data stored in the cloud is the data most vulnerable to hackers. According to the report, “protection of data in the cloud is important but not practiced.” Security breaches result in a lack of customer trust, which leads to a decline in revenue.

Read More

Topics: Cloud Security

Top 10 Questions to ask your managed services provider about Office 365

Posted by Cathie Briggette Thu, Aug 06, 2015

These are the Top 10 questions you should ask your IT department or IT Managed Services provider when you are considering Office 365 and the cloud for your business.

1. Who owns the data we store as part of Office 365, and will Microsoft use our data to build advertising products?

As a customer of Office 365, you own and control your own data. Microsoft does not use your data for anything other than providing you with the service that you have subscribed for. Microsoft does not scan your email or documents for advertising purposes. 

The following table explains how Microsoft uses your Office 365 Data:

Read More

Topics: Cloud Security

The Beginner's Guide to Amazon Web Services

Posted by Cathie Briggette Thu, Jul 02, 2015


Read More

Topics: Cloud Computing, Managed Services, Technology Improvements, Cloud Security

Mending a Bleeding Heart: Cognizance as an IT Security Solution

Posted by Dillon MacInnis Mon, Jun 08, 2015

The nationally publicized security disaster of April 2014 known as the "Heartbleed" bug has certainly drawn attention to the developing need to prioritize security when dealing with information systems. A single, flawed line of code written into an extension of the widely used web encryption software called OpenSSL granted access to stored private and personal data to those who sought to illegally obtain it. While the software was built to maintain periodic open connections between servers in order to regulate operation, the mentioned line of code inadvertently allowed 64 kilobytes of information to be accessed by a web attacker when an open connection was established. Furthermore, given that the process was periodic, an individual extracting information illegally could accumulate valuable data over time by continuously exploiting each open connection. As a consequence, hackers were able to acquire usernames, passwords, credit card information, and each server’s private digital key, which made classified internal documents available to unauthorized parties. Although this vulnerability was ultimately patched, the event made an example of the problems that arise when software is not monitored for exploitable weaknesses.

Read More

Topics: Data Security, Technology Improvements, Cloud Security

Series 1 - The Cloud Lingo and What it all Means

Posted by Cathie Briggette Tue, Jul 15, 2014

Companies today have a confusing array of choices when it comes to IT services, from public to hybrid to private clouds and all different types of virtual environments.  With all these choices, how can you understand if the cloud is for you?  This series of articles will try to explain some of the lingo used for cloud services and give you an idea on whether or not you or your company is ready to move to the cloud.

Read More

Topics: Cloud Computing, Cloud Security

Become SAS 70 Type II, SSAE 16 Compliant in the Cloud

Posted by Nick Deluca Fri, Mar 16, 2012

When it comes to cloud security, one of the most popular features offered by providers is security auditing.  Security audits are what a provider uses as a method of inspecting and maintaining a company’s internal controls, which consist of policies, procedures, and safeguards. The renowned audit, SAS 70 type II, was conceived in 1992 and has since evolved to form SSAE 16. Though both of these audits are commonplace in the security realm, like most other features they do not come without disadvantages that need to be addressed and weighed against advantages by the person or company utilizing the audits.

Read More

Topics: Cloud Computing, Disaster Recovery, Cloud Security