IT Consultants' Insight on Business Technology | NSK Inc.

Operations/Purchasing Administrator Position Open

Posted by Cathie Briggette Wed, May 18, 2016

Position Description

Read More

Topics: NSK Team, Careers

Business Continuity and Security DOs and DON'Ts

Posted by Cathie Briggette Tue, May 17, 2016

By:  The IT Associates at NSK Inc.

Read More

Topics: Data Security, Apple, anti virus, cybersecurity

PAID Marketing Intern wanted for Summer 2016

Posted by Cathie Briggette Wed, Apr 20, 2016


NSK Inc. is looking for a marketing intern to work over the Summer on a part-time basis (15-20 hrs per week) in our Marketing Department.  


Read More

Topics: Careers

Understanding the Cyber Security Wizardry

Posted by Alyssa Steen Tue, Apr 12, 2016

The world of cyber security is constantly changing. New viruses, malware, bots, and phishing scams are being developed every day to steal both business and individual user information. To counter this online battle, new security products are also being developed, all promising to be the best on the market and the best for you and your business. With all these options to sift through, the seemingly endless streams of data supporting this device and that supporting system, how do you choose this right one? Who has the time to sort through the products and companies while also having their own lives and business to deal with? Thankfully, there is a source available to everyone that’s entirely free to use that does that leg work for you.

Read More

Topics: cybersecurity

Badlock the Crucial Security Vulnerability Bug

Posted by Cathie Briggette Wed, Apr 06, 2016

Badlock is the new security vulnerability bug of 2016.  Badlock was discovered by Stefan Metzmacher, who is a renowned member of the international Samba Core Developer Team and works at SerNet on Samba. He reported the bug to Microsoft and has been working closely with them (Microsoft) to fix the problem.  

Read More

Topics: Microsoft, Disaster Recovery, anti virus, cybersecurity

The New NSK IT Service Team Members

Posted by Alyssa Steen Fri, Apr 01, 2016

One of the things that NSK Inc. is most proud of are its employees. As with any field, it takes a certain type of person to handle the kind of work that we do. The IT field not only requires an immense amount of patients, a logical mind, and a good level of social skills for customer service, but also the ability to act completely in the moment based on very limited information. Finding people with this combination of skills can be challenging, but when we do find them, they become an invaluable member of our team within their first week. Recently, NSK had the pleasure of introducing three new members to this team: Monica, Joe, and Darren.

Read More

Topics: NSK Team, IT Services

Moving your IT in Boston - White Paper

Posted by Alyssa Steen Fri, Mar 25, 2016


Relocation can be one of the most exciting, and at the same time one of the most stressful, events for any business. Whether it is an expansion of office space, a cost-efficiency move, relocating to gain a new market, finding a new location to suit your upgraded materials, or even more simply, to improve the quality of life for your company, there are many factors that contribute to the motive behind moving. In an article written on they mention, “The U.S. Census Bureau reports that approximately 40 million Americans relocate each year, and the U.S. Postal Service processes about 38 million change-of-address forms annually.” Done correctly however, moving doesn’t have to be a negative experience.

Read More

Topics: NSK Team, IT Project Management, relocating your IT

Four (4) Social Media To Do's

Posted by Alyssa Steen Wed, Mar 09, 2016

In this ever-expanding world of computers, internet connection has become an integral part of any business, big or small. Social media has allowed businesses, in many ways, to connect with more people around the world than traditional marketing techniques had ever made possible. However, knowing how to use social media effectively is something that requires time, patience, and ultimately a budget to maintain on a professional level. Some tools are better than others, some language is better suited for specific industries, and certain content is better for specific websites. When you add all of the different program options on top of discovering your actual audience out of the billions of people surfing the internet, social media can become quite the task. Thankfully, NSK is here to help.

Read More

Topics: Social Media

Cyber Security Buzz Words

Posted by Alyssa Steen Tue, Mar 01, 2016

A few weeks ago, I published a post on here describing the top 4 tips to stay safe on your computer based on the advice from the IT professionals here at NSK Inc. . However, knowing the basic tips doesn’t necessarily mean you are able to grasp all the concepts, and especially the jargon, involved with the IT world. When it comes to cyber security, there is an almost endless list of terms for things to look out for. At NSK, we know that it is our job to help make that endless list seem well, less daunting, while also ensuring that you feel well informed. Cyber security is one of the top priorities at NSK and with cyber crime becoming all the more mainstream as time goes on, it is incredibly important for both us as your IT professionals, and you as our customers, to understand the threats at hand So without further ado, here are the terms you need to know in order to “speak cyber.”

Read More

Topics: Cloud Computing, Managed Services, cybersecurity, data storage

The Distinction Between Data Backup and Business Continuity

Posted by Cathie Briggette Mon, Feb 29, 2016

Written by Brandon Garcin on Feb 29, 2016 6:00:00 AM on Continuum MSP Blog

Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the “technology” was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards was then further developed by IBM in the early days of data processing, where data input, storage and commands were captured using a series of hole punches.

IBM Archives:

Read More

Topics: Cloud Computing, Disaster Recovery, Business Continuity

Pavis Disaster Recovery and Backup

Contact Us

Subscribe to Email Updates

Focus on your Business - Technology Help