IT Consultants' Insight on Business Technology | NSK Inc.

Chips in the armor: PEN or Vulnerability Testing?

Posted by Hannah Manning Mon, Jun 19, 2017

Reports of hacking bank information, dating websites and even the 2016 presidential campaign have not only contributed to high levels of paranoia for businesses but driven them to consider testing their own networks and firewalls for any possible security breaches.

The only problem is choosing between doing PEN testing, vulnerability testing or both.

Making the choice can be difficult for organizations unversed in the differences between the two tests. PEN testing and vulnerability testing have been mistakenly labeled as the same because of some conflicting reports and marketing missteps.

Read More

Topics: Data Security, Tech Fixes, BostonIT

What is an IT Managed Services Provider

Posted by Cathie Briggette Fri, Jan 13, 2017

There are quite a few definitions of what a managed IT service provider does, but the best one is:   a company that is the proactive manager that maintains & monitors an organization's IT systems on a regular basis while having the expertise to do so. The company here is known as Managed IT Service Provider or MSP. This company charges a monthly fee to handle these tasks at an Organization.

Read More

Topics: Managed Services, Help Desk, Tech Fixes, IT Services

The 8 layers of cyber security needed to protect your business

Posted by Cathie Briggette Tue, Oct 25, 2016

An Interview with Ahmed Fadili at NSK Inc

As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support.  In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.

Question:  Do clients come to us regarding their security, or are we the ones that are bringing it to the forefront of their business? 

Read More

Topics: Disaster Recovery, Managed Services, Tech Fixes, IT Services, cybersecurity

Tech Fixes: How to Create a SPAM filter in Office 365

Posted by Mauricio Cornejo Wed, Aug 19, 2015

It took me a few minutes to figure it out so I thought I’d share how it’s done.

    • Open a web browser to
    • Log in to your Office 365 with an account that has the necessary administrative credentials.
    • After logging in, click the Admin dropdown in the upper right corner and select Exchange.  (See  Fig. 1 below).
Read More

Topics: Tech Fixes, Office 365

Tech Fixes:  This weekend I gutted a network  redesigned it physically & logically

Posted by Cathie Briggette Wed, Jun 03, 2015

By Tim Dooher

This past weekend I gutted the network at a client and redesigned it physically and logically. We physically separated the Voice and Data networks and moved the LAN and WLAN onto separate subnets.

Read More

Topics: Tech Fixes

Tech Fixes: How to tell if a URL link or hyperlink is safe without clicking on it

Posted by Mauricio Cornejo Fri, Mar 13, 2015

Even the best security software can’t protect you from the headaches you’ll encounter if you click an unsafe link. Unsafe links appear to be shortcuts to funny videos, shocking news stories, awesome deals, or “Like” buttons, but are really designed to steal your personal information or hijack your computer. Your friends can unknowingly pass on unsafe links in emails, Facebook posts, and instant messages. You’ll also encounter unsafe links in website ads and search results. Use these link-scanning tips to check suspicious links. All of these solutions are free, fast, and don’t require you to download anything.

Read More

Topics: Data Security, Tech Fixes

Tech Fixes: Finding your PC's Windows Product Key so you can re install Windows

Posted by Mauricio Cornejo Tue, Mar 10, 2015

How to find your PC's Windows Product Key so you can Re-Install Windows

Read More

Topics: Tech Fixes

Tech Fixes: How to Avoid Ransomware Exploitation

Posted by Philip Tang Fri, Mar 06, 2015

What is Ransomware?

Ransomware is the tool by which cyber criminals exploit unwary computer users, particularly users of Windows XP, Vista, 7 or 8. Whereas a robber stealing from physical banks may hold innocents hostage with a gun to their heads, a cyber criminal uses malicious software to lock down your files.  Just as a teller may be pressured to stuff money into the robber's brown burlap sack in this situation, you may be forced to pay the cyber criminal's ransom to regain access your precious files. 

Read More

Topics: Data Security, Tech Fixes

Tech Fixes: Seven Steps to Creating Layers of IT Security For Your Data

Posted by Cathie Briggette Mon, Feb 23, 2015

Protecting your data is like any other IT security challenge, it is about creating layers of protection.  The idea of layering security is very simple:  You CANNOT and SHOULD NOT rely on just one security mechanism, such as a password to protect something that is very sensitive to your business.  If that security mechanism fails, you have nothing left to protect your information.

Read More

Topics: Data Security, Tech Fixes, IT Services

Tech Fixes: Methods to Protect Yourself Against Identity Theft

Posted by Philip Tang Fri, Feb 20, 2015

Thanks to Massachusetts General Law 93H (MGL 93H) and 201 CMR 17, state businesses have been mandated to produce comprehensive data security programs to protect their customers' personal information since 2010.  

Read More

Topics: 201CMR17.00, Data Security, Tech Fixes