IT Consultants' Insight on Business Technology | NSK Inc.

NSA Planned to Exploit Google App Store, Slip Malware into Smartphones

Posted by Philip Tang Fri, May 22, 2015

NSA whistleblower Edward Snowden is at it again. A top-secret document obtained by him has been jointly published by CBC news and The Intercept.  The document details surveillance strategies that the NSA and its allies were working on. One of these strategies involved exploiting the Google App store to inject malware into smartphones of people they wished to spy on.

Read More

Topics: Data Security

Top 4 Security Practices for Backup and Disaster Recovery

Posted by Cathie Briggette Thu, May 21, 2015

I am sure most of you are well aware  that all data systems are vulnerable to data loss.  These instances can be sparked by:

  • Hardware failure
  • Human Error
  • Fire
  • Electrical surge
  • Physical theft
  • IT Security breaches

Knowing these best backup and disaster recovery practices can help you avoid data loss and downtime, save you time, money, and most likely your job.

Read More

Topics: Disaster Recovery

Google Investigates Security-threatening Ad Injectors

Posted by Philip Tang Fri, May 15, 2015

Online advertisements are annoying enough as they are in their natural state. Gaudy pop-ups, incessant flashing and obnoxiously loud auto-playing videos are only the tip of the iceberg. 

Read More

Topics: Data Security

Disaster Recovery vs. Backup. Which is right for you?

Posted by Andrew Sullivan Fri, May 15, 2015

Datacenter downtime means an organization can’t serve its customers and it can’t execute transactions, leading, potentially, to thousands of dollars of lost revenue. Recent data shows that 76 percent of companies experienced an outage in the last year and only 13 percent of those outages were the result of natural disasters. Most “disasters” are related to human error and minor power outages, and the expectation is that data recovery should be fast without flooding, torrential rain, or other factors to address. However, using a backup solution to meet business continuity needs will not work. Data backup is simply not a comprehensive information and application recovery solution.

Read More

Topics: Disaster Recovery, Managed Services

The right cloud technology for all stages of your company's growth

Posted by Cathie Briggette Tue, May 12, 2015

You’ve got big plans.  You need technology that can grow right along with your business. You can have it all:

  • power
  • agility.
  • freedom to work the way you and your team work best.


The only constant is change, especially when it comes to the technology we use to help run our businesses. And the pace of that change is constantly accelerating, whether as a result of major innovations like cloud computing or the impact of economic events. 

Read More

Topics: Cloud Computing

Webroot Provides Powerful Internet Security and Malware Removal

Posted by Philip Tang Fri, May 08, 2015

NSK Inc. has recently switched to Webroot for handling client internet security. The data security software, which works across PC, Mac, Android and iOS, minimizes the risks incurred when roaming the internet, a place both wondrous and hazardous.  Of course, this is in addition to its antivirus and malware removal features.

Read More

Topics: Managed Services, Data Security

What to expect in a managed IT services contract

Posted by Cathie Briggette Tue, May 05, 2015

The seven things you should expect when signing a Managed IT Services Contract.

So, let’s assume for the purpose of this article that you’re planning on moving your IT infrastructure over to a Managed IT Services Provider.  The key to your company’s success is establishing a cost effective list of services that will be included in the monthly fee you agree to with your IT Company.

Read More

Topics: Managed Services

The Cloud - What it is.. What it does.. Should I get it?

Posted by Cathie Briggette Mon, May 04, 2015

The Cloud – What it is…. What it does… Should I get it?

Cloud computing, by definition, refers to the on-demand delivery of IT resources and applications via the internet with a pay-as-you-go pricing model.  There are many reasons why businesses are investing in the cloud, some of the reasons are financially motivated, while others address technical concerns. 

Read More

Topics: Cloud Computing, Disaster Recovery, Data Security

Spiceworks Surveys IT Experts, Outputs 2015 Budget Report

Posted by Philip Tang Fri, May 01, 2015

Spiceworks, a professional network linking together over 6 million IT experts and 3,000 tech vendors, recently released their 2015 IT Budget Report.  The report is comprised of survey results obtained from over 600 IT experts in Spiceworks community. Heeding the collected data could serve as excellent background knowledge for future IT project management going forward.  

Read More

Topics: IT Project Management, IT Services

Lunch and a Discussion

Posted by Cathie Briggette Wed, Apr 29, 2015


Read More
Windows Server 2003 Support ends 7-14-2015

Subscribe to Email Updates

Contact Us