IT Consultants' Insight on Business Technology | NSK Inc.

Outsourcing IT without Disrupting Business Continuity

Posted by Cathie Briggette Thu, Sep 15, 2016

Given the huge importance of technology, IT management is the cornerstone of any modern business, but not every organization possesses the resources to develop an in-house IT solution that caters to their business needs.

Read More

Topics: Disaster Recovery, 201CMR17.00, Managed Services

Tech Fixes: Methods to Protect Yourself Against Identity Theft

Posted by Philip Tang Fri, Feb 20, 2015

Thanks to Massachusetts General Law 93H (MGL 93H) and 201 CMR 17, state businesses have been mandated to produce comprehensive data security programs to protect their customers' personal information since 2010.  

Read More

Topics: 201CMR17.00, Data Security, Tech Fixes

How to Protect Your Company From CyberCrime

Posted by Andrew Sullivan Fri, Jan 16, 2015

How secure are your small business assets from fraud, identity theft and cybercrime?

Sixty-five percent of surveyed businesses said they are not sufficiently budgeted for online security. The number increases to 71 percent for those with revenues under $10 million. Small businesses also have a higher fraud rate than larger companies and non-business owners. One of the most frequent sources of fraud is credit card abuse – largely due to the fact that few business owners actually take the time to go through every line item on their bill or choose to mingle business and personal accounts.

Read More

Topics: Disaster Recovery, 201CMR17.00, Data Security

The New World of BYOD

Posted by Nick Deluca Fri, May 18, 2012

The New World of BYOD (Bring Your Own Device) -- Good for Your Company?

BYOD is a concept that is rapidly gaining steam throughout the IT business industry. By “gaining steam” I mean two things. It could reference the cartoon-like explosion of hot gaseous vapor from a person’s ears due to incessant aggravation; or it could simply be defined as an increase in positive momentum. The notion is rudimentary and obvious, almost intuitive: Should employees utilize their personal devices (phones, tablets, laptops, etc.) to complete work-related tasks while on the clock? Though the idea may be basic, the answer is a bit more complicated.

Read More

Topics: Cloud Computing, Mobile Device Management, 201CMR17.00, Managed Services

A Security Breach of Personal Data is Costly For You And Your Clients

Posted by Nick Deluca Mon, Apr 30, 2012

According to a shocking new report from the Massachusetts Office of Consumer Affairs and Business Regulation, roughly half of Massachusetts residents (about 3.2 million) have had their personal information breached or compromised over the past four years. This staggering number is the result of nearly 1,800 acts of thievery including the theft of peoples’ credit card numbers and social security numbers. Often these criminal acts are the result of hacking personal accounts and websites, but in the case of one Massachusetts management firm, similar damage was incurred by simple negligence. After being slapped with a substantial monetary fine, this management firm reached out to NSK Inc in hopes of becoming compliant with Massachusetts data regulation, 201 CMR 17.00.

Read More

Topics: Disaster Recovery, 201CMR17.00, Data Security

Are Your Employees Surfing the Internet Safely?

Posted by Nick Deluca Wed, Apr 11, 2012


Higher costs, lower productivity, and legal issues are just some of the risks a company can be exposed to by simply surfing the web. Malware, formally known as malicious software, is the most omnipresent agent of chaos when it comes to web-based offensive content. Whether your company is a small, medium, or large sized business, it can be particularly helpful to install software that combats malicious content automatically.

Read More

Topics: Disaster Recovery, 201CMR17.00, Data Security, Business Continuity

201 CMR 17.00: Have You Secured Your Data With 3rd Party Vendors?

Posted by Nick Deluca Wed, Mar 07, 2012

On March 1, 2012, Massachusetts General Law Chapter 93H and its new regulations 201 CMR 17.00 final procedure went into effect – the provision of which included 3rd party vendors.

This law, at its most basic premise, protects Massachusetts residents against identity theft and fraud. While the ruling may seem almost obvious and even stir some déjà vu, it’s probably because the law was actually put into practice on March 1, 2010 and similar laws have already been perpetuated in California, Maryland, Nevada, Oregon, and Texas. This final step in the new law was for contracts entered into before the 2010 date that were grandfathered in. The March 1st, 2012 date completely nullified any grandfathered contracts.   Now, ALL companies or persons in Massachusetts who store or use personal information about Massachusetts residents must have created a written and regularly internally audited plan to protect a Massachusetts’s customer or user’s personal information that includes additional WISPs from third party vendors who also have the ability to see personal information.

Read More

Topics: Disaster Recovery, 201CMR17.00

Massachusetts Claims Its First Victim to 201 CMR 17

Posted by Cathie Briggette Mon, May 02, 2011

Massachusetts new regulation 201CMR17.00 has claimed its first victim - The Briar Group.  

Read More

Topics: Disaster Recovery, 201CMR17.00

Talking about Trends and IT Security in 2011

Posted by Cathie Briggette Wed, Jan 19, 2011

As you have probably noticed we have written a boat load of Security Articles for the past year.  We feel that because of all the legislation and regulations that are daily being created and updated by the government, they are seeing trends that will continue to target technology devices and small businesses.   

Read More

Topics: Disaster Recovery, 201CMR17.00

U.S. Department of Homeland Security Fails Security Audit

Posted by Michael Lupacchino Wed, Sep 22, 2010

The U.S. Government has been regulating Information Technology within the private sector for years. There are compliance laws such as Massachusetts’ 201 CMR 17 and the HIPPA Act of 1996 that outline how companies and organizations are supposed to store personal information of their employees and their customers/clients. However, our own government recently failed a security audit for failing to keep their systems updated in a timely manner.

Read More

Topics: Disaster Recovery, 201CMR17.00