<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Is it time to re-evaluate my IT?

Posted by Cathie Briggette on Thu, Jan 22, 2015

business_Continuity-resized-600

It is important for you to make sure the right IT processes are being implemented on your network.  You may want to re-evaluate your IT network and infrastructure to make sure it is working for your company.  Being informed of IT processes within your organization, as well as outside your organization is always better than being uninformed.

Below are key questions to ask yourself in order to make sure the IT Network at your organization is being sufficiently supported.


Read More

Topics: Disaster Recovery, Managed Services, Data Security

New Phishing Scam Targeted at Microsoft Users

Posted by Cathie Briggette on Wed, Jan 21, 2015
cyber-security - data security

Please be advised that NSK Inc has been made aware of a Phishing Scam that is targeting Microsoft customers.The scam is sent through email.

The email Subject Heading is as follows: 

Subject: Welcome to the Microsoft Volume Licensing Service Center (VLSC)

Read More

Topics: Data Security

How to Protect Your Company From CyberCrime

Posted by Andrew Sullivan on Fri, Jan 16, 2015

How secure are your small business assets from fraud, identity theft and cybercrime?

Sixty-five percent of surveyed businesses said they are not sufficiently budgeted for online security. The number increases to 71 percent for those with revenues under $10 million. Small businesses also have a higher fraud rate than larger companies and non-business owners. One of the most frequent sources of fraud is credit card abuse – largely due to the fact that few business owners actually take the time to go through every line item on their bill or choose to mingle business and personal accounts.

Read More

Topics: Disaster Recovery, 201CMR17.00, Data Security

Legal Advice For IT Professionals

Posted by

Even though it may be your job to handle sensitive information, how you handle the data is just as important as how well it is secured.

Read More

Topics: Data Security, IT Project Management

Data Breach Resources

Posted by Melissa Cocks on Wed, Dec 31, 2014

List of Data Breach Resources

Compilation of External Links

Read More

Topics: Disaster Recovery, Data Security, Business Continuity