<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Protecting Client's Sensitive Data and Personal Information

Posted by Cathie Briggette on Tue, Mar 17, 2015

According to recent studies, phishing attacks increased by 59% in one year.  And Social Engineering and Hacker Attacks are increasing even more.

In 2014 Webroot and RSA, the security division of EMC, announced a new technology partnership.  The partnership created an integration with Webroot’s real time anti-phishing service and RSA’s FraudAction anti-phishing service.  This partnership created SecureAnywhere Antivirus.  Giving IT departments and managers the ability to detect phishing attacks in real time within their organizations. 

Phishing_Scams

SecureAnywhere Antivirus is more than an anti-phishing software. In addition to being excellent anti-phishing protection, it is antimalware protection, it includes firewall-style program control, and has powerful protection for your browser and secure connections.  It stops the viruses and worms that exist to infect other computers within your business infrastructure. It protects your employees while they are web surfing, by blocking harmful websites. And it takes down spyware that tries to deceive your employees or exploit vulnerabilities within your organization's operating systems.

Spyware steals information from computers and sends it to someone else. Some spyware is fairly benign. Adware, for example, watches you in order to tailor advertisements based on your habits. Adware can also happen with your consent if you opt to use a free service that involves accepting ads. Another less-lethal form of spyware is the tracking cookie. Advertising companies install cookies on your computer in response to you clicking on ads. Unless you delete it, the advertiser will know when you visit a site with its ads.

SpywareIf spyware was just adware and tracking cookies, it would just be annoying. But spyware has worse forms. Some spyware can change your computer settings, slowing down internet connections and slowing down your home page. Webroot SecureAnywhere Antivirus insulates you from these spyware attempts to infect your PCs.

Webroot SecureAnywhere works in a few different ways.

  • It scans data and blocks viruses that it detects.
  • It removes malware that already exists on a computer.
  • It can be programmed to scan PCs according to any schedule.
  • It looks at the Windows registry, operating system files and applications to give you a list of threats.
  • Unlike other antivirus programs that use the latest threat signatures to protect your PC, yet they cannot protect against a brand new, zero-day threat, Webroot uses other ways to detect threats based on the threats behaviors or by comparing with other known threat families.
  • The web protection includes warnings if you try to go to a malicious site that pops up in a search result
  • It protects you against phishing attempts and dangers that might arrive via Facebook or Twitter
  • It works on Windows PCs, Macs, Android Phones or Tablets, iPhones and iPads

The architecture of Webroot’s code uses a small footprint that gathers its information in the cloud. The actual signature database that is part of Webroot is housed in the cloud, so it does not take up space on your computers or servers.  This cloud based database relies on analyzing behaviors of suspected malware. It is compact and efficient.

NSK's IT Managed Services protects our client’s sensitive data and personal information with antivirus, internet security and identity protection.

Outsourced IT Services - Managed Services

 

Read More

Topics: Managed Services, Data Security

Moving your Business from Break-Fix to Managed IT Services

Posted by Cathie Briggette on Wed, Mar 04, 2015

managed_it_servicesINTRODUCTION:

The majority of IT services companies now seem to be moving in the direction of Managed IT Services, rather than operating on a break/fix or per hour basis for your business.

Signing up for monthly managed IT services gives your company a fixed budget on what will be spent for your IT costs, along with having services that are available as they are needed and when they are needed and not having to worry about additional costs.

So let's assume for the purpose of this article that you're using a break fix module, and are deciding on moving over to a monthly managed IT Services offering.

Key to your success is now having an impressive list of services that are all included in the monthly fee you agree to in your new contract.

Read More

Topics: Managed Services

NSK Inc Named to IT Managed Service Provider 500 List by CRN.

Posted by Cathie Briggette on Wed, Feb 18, 2015

NSK Inc Named to Managed Service Provider 500 List by CRN

Company Recognized for Exemplary Approach to Delivery of Managed IT Services 

Boston, MA, February 18, 2015 – NSK Inc, We Make IT Work, today announced it has earned recognition on The Channel Company’s 2015 CRN Managed Service Provider (MSP) 500 list as one of the 250 Progressive Service Providers. This annual list distinguishes the top technology providers and consultants in North America whose leading approach to managed services enables their customers to improve operational efficiencies, elicit greater value from their IT investments, and successfully leverage technology to achieve greater competitive advantage.

Read More

Topics: NSK Team, Managed Services

The Importance of Having a Business Continuity Plan

Posted by Melissa Cocks on Tue, Feb 17, 2015
Disaster-Recovery-Plan
What would happen if your data was lost or you lost internet for the day? If a hurricane hit and your information was gone, would you be able to continue performing your everyday business tasks? If not, how long would it take to recover your business? These questions are overwhelming, but important to ask yourself when it comes to threats to your business and having a disaster recovery plan. 

Whether you are the CEO or the CIO of your company, it is important to acknowledge the value of having an established business continuity plan. It is difficult to believe that something drastic enough to disrupt your everyday business activities could take place, but it is often when we assume things could never happen to us that they do.

According to the University of Texas, 87% of U.S. companies encounter computer system failures annually. Many of these failures last for over a day, which can significantly affect profit and customer relationship management (CRM). Also, it has been found that many businesses do not have a plan in place in case a disaster was to occur. That being said, there could be an even greater impact if disaster struck because many businesses depend on each other to operate efficiently and profitably. The potential domino effect that businesses would experience in the worst case scenario would be devastating.

On a lighter note, let's just say that your email server was down for a day for whatever the reason may be. You might say, "But we could use the phone." That is true, but consider how heavily businesses depend on databases, and rightfully so. Using them is easier and faster than going through a Rolodex of contacts, and they organize every piece of information regarding a single contact. You are going to want to make sure you have a plan in place and also seek help from IT professionals or an IT team in order to lessen the impact of disruption.

Assessing how vulnerable you are to being impacted by disaster or data loss is an important step in planning for business continuity. Here are a couple of questions that may make you think about how important a continuity plan is to your specific business:

-What activities are most important to your business?
-Can you survive without them or do you have an alternative?
-How much of your business' productivity depends on computers/databases/internet?

Chances are that you feel concerned if you have not already established a plan, which isn't surprising since most of America's businesses rely on computers. Here are some steps you can take to make sure you are prepared in the case of disruption:

-Identify important roles in your company (who plays a crucial role in everyday business? If a certain person in your company was to no longer be there, would you have a backup?) Include solutions in your plan.

-Identify places for equipment rental and back-up supplies

-Implement off-site data backup or seek IT support/IT consulting

-Map out an alternate location (where would you move offices to temporarily if needed?)

-Have this plan set in stone

Additionally, you need to be sure every employee is informed of the plan, so it would be a good idea to conduct information sessions or send out newsletters regarding the business continuity plan.


Prepare for a Disaster  5 Steps
Read More

Topics: Disaster Recovery, Managed Services

What is Desktop Monitoring?

Posted by Cathie Briggette on Thu, Feb 05, 2015

NSK Inclusive IT Services

Desktop Agent

Pro-Active Support for your Company’s Technology

While desktop problems are not normally as complex as servers, they can be time-consuming to resolve and troubleshoot. NSK Inc’s Desktop Agent Monitoring provides proactive maintenance and regular desktop monitoring checks, so that many desktop problems can be identified and avoided.

Desktop Agent Monitoring includes:

  • CPU Monitoring (% Utilization) - This function monitors the percentage of time the processor is busy by measuring the percentage of time the thread of the idle process is running and then subtracting that from 100 percent. This measurement is the amount of processor utilization. The monitoring script collects CPU utilization samples every 5 minutes and averages it for an hour. If any CPU threshold usage is violated, it is reported to NSK’s Help Desk Staff. .
Read More

Topics: Managed Services