<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

The 5 Ways Hacker Malware Can Get Into Your Computer Systems and What You Can Do About It

Posted by Cathie Briggette on Thu, May 13, 2010

By: Ryan Hickey
IT Project Manager, NSK Inc

Here are five ways hackers can get into your computer system, and the steps you need to take to stay protected.

1. Peer to Peer networking sites

These include:

• Bit torrent - open source file sharing application
• Kazaa - free music and movie downloads
• Limewire - free music and videos
• Sharezaa - video sharing site.

Read More

Topics: Disaster Recovery, Managed Services, Data Security

NSK Inc Performs Compliance Assessment for Ziner & Murphy, PC

Posted by Michael Lupacchino on Mon, Apr 12, 2010

Read More

Topics: Disaster Recovery, 201CMR17.00

Electronic Medical Records (EMR) and Security

Posted by Michael Lupacchino on Mon, Mar 29, 2010

EMR and Security: What You Need To Know 

Read More

Topics: Disaster Recovery, Managed Services

NSK Inc. IT Associate Receives CCENT Certification

Posted by Michael Lupacchino on Wed, Mar 17, 2010

For Immediate Release

Read More

Topics: Disaster Recovery, Managed Services, IT Project Management

Cloud Computing 101: Private Vs. Public

Posted by Michael Lupacchino on Tue, Mar 09, 2010

The Benefits of Public Cloud Computing

Simplicity and efficiency are the overarching benefits of having a public cloud. Public clouds are offered as a service, usually over an Internet connection. An off-site third party provider hosts and manages the system. Users connect to the system via web applications or services. Public clouds usually charge a monthly usage fee per gigabyte and bandwidth transfer charges.

Read More

Topics: Cloud Computing, Disaster Recovery, Managed Services