<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

What To Do If Your Google Account Is Compromised

Posted by Michael Lupacchino on Mon, Nov 08, 2010

A couple of weeks ago I went to check my phone before heading off to bed and noticed something was wrong. My Droid was telling me that it couldn’t sync with my Gmail account.

Read More

Topics: Cloud Computing, Disaster Recovery, Data Security

The Importance of Anti Virus Software

Posted by Michael Lupacchino on Wed, Aug 11, 2010

Malware On The Rise

Reuters recently published an article claiming that malware has hit an all time high.  They state that McAfee, the number two security software provider, found that malware reached a new record in the first half of 2010. Malware is software code that, when introduced into a system, can hack the computer, steal passwords and identities, and reap havoc on system performance.

Read More

Topics: Disaster Recovery, Data Security, Business Continuity

The Importance of Antivirus

Posted by Cathie Briggette on Wed, Aug 11, 2010

antivirus_programsMalware On The Rise

Reuters recently published an article claiming that malware has hit an all time high. They state that McAfee, the number two security software provider, found that malware reached a new record in the first half of 2010. Malware is software code that, when introduced into a system, can hack the computer, steal passwords and identities, and reap havoc on system performance.

Read More

Topics: Data Security

The 5 Ways Hacker Malware Can Get Into Your Computer Systems and What You Can Do About It

Posted by Cathie Briggette on Thu, May 13, 2010

By: Ryan Hickey
IT Project Manager, NSK Inc

Here are five ways hackers can get into your computer system, and the steps you need to take to stay protected.

1. Peer to Peer networking sites

These include:

• Bit torrent - open source file sharing application
• Kazaa - free music and movie downloads
• Limewire - free music and videos
• Sharezaa - video sharing site.

Read More

Topics: Disaster Recovery, Managed Services, Data Security

NSK Inc Performs Compliance Assessment for Ziner & Murphy, PC

Posted by Cathie Briggette on Mon, Apr 12, 2010

NSK Inc, a leader in IT consulting for small to medium businesses, was contacted by Ziner & Murphy regarding their data storage needs. Ziner & Murphy, a Certified Public Accountant (CPA) firm in Stoneham, MA approached NSK about the new state regulations regarding data privacy. NSK Inc. was hired to perform a Massachusetts Personal Information Compliance Assessment (MPICA).

Read More

Topics: 201CMR17.00, Data Security