<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Phishy Business - Protect Your Data

Posted by Melissa Cocks on Sat, Nov 19, 2016

How to Prevent Phishing Scams

Online Security Tips

When it comes to your personal account information, you can never be too judicious to whom you provide such information.  Phishing scams are not new, but they are still effective.  This is because most people want to be helpful and phishing scams take advantage of this by masquerading as someone or some company that they are not. 

Read More

Topics: Disaster Recovery, Data Security, cybersecurity, email security

The 8 layers of cyber security needed to protect your business

Posted by Cathie Briggette on Tue, Oct 25, 2016

Ahmed Fadili Interview.png

An Interview with Ahmed Fadili at NSK Inc

As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support.  In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.

Question:  Do clients come to us regarding their security, or are we the ones that are bringing it to the forefront of their business? 

Read More

Topics: Disaster Recovery, Managed Services, Tech Fixes, IT Services, cybersecurity

Outsourcing IT without Disrupting Business Continuity

Posted by Cathie Briggette on Thu, Sep 15, 2016

Given the huge importance of technology, IT management is the cornerstone of any modern business, but not every organization possesses the resources to develop an in-house IT solution that caters to their business needs.

Read More

Topics: Disaster Recovery, 201CMR17.00, Managed Services

Badlock the Crucial Security Vulnerability Bug

Posted by Cathie Briggette on Wed, Apr 06, 2016

Badlock is the new security vulnerability bug of 2016.  Badlock was discovered by Stefan Metzmacher, who is a renowned member of the international Samba Core Developer Team and works at SerNet on Samba. He reported the bug to Microsoft and has been working closely with them (Microsoft) to fix the problem.  

Read More

Topics: Microsoft, Disaster Recovery, anti virus, cybersecurity

The Distinction Between Data Backup and Business Continuity

Posted by Cathie Briggette on Mon, Feb 29, 2016

Written by Brandon Garcin on Feb 29, 2016 6:00:00 AM on Continuum MSP Blog

Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the “technology” was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards was then further developed by IBM in the early days of data processing, where data input, storage and commands were captured using a series of hole punches.

IBM_350_Disk_Storage.jpgIBM Archives:   https://www-03.ibm.com/ibm/history/exhibits/storage/storage_350.html

Read More

Topics: Cloud Computing, Disaster Recovery, Business Continuity