IT Consultants' Insight on Business Technology | NSK Inc.

The 8 layers of cyber security needed to protect your business

Posted by Cathie Briggette Tue, Oct 25, 2016

An Interview with Ahmed Fadili at NSK Inc

As a company that is dedicated to supporting our client's technology needs, obviously cyber security is a big part of this support.  In an interview with Ahmed Fadili, Vice President of IT Managed Services, Ahmed discusses what NSK does for our clients to keep them safe, cyber security wise.

Question:  Do clients come to us regarding their security, or are we the ones that are bringing it to the forefront of their business? 

Read More

Topics: Disaster Recovery, Managed Services, Tech Fixes, IT Services, cybersecurity

Outsourcing IT without Disrupting Business Continuity

Posted by Cathie Briggette Thu, Sep 15, 2016

Given the huge importance of technology, IT management is the cornerstone of any modern business, but not every organization possesses the resources to develop an in-house IT solution that caters to their business needs.

Read More

Topics: Disaster Recovery, 201CMR17.00, Managed Services

Badlock the Crucial Security Vulnerability Bug

Posted by Cathie Briggette Wed, Apr 06, 2016

Badlock is the new security vulnerability bug of 2016.  Badlock was discovered by Stefan Metzmacher, who is a renowned member of the international Samba Core Developer Team and works at SerNet on Samba. He reported the bug to Microsoft and has been working closely with them (Microsoft) to fix the problem.  

Read More

Topics: Microsoft, Disaster Recovery, anti virus, cybersecurity

The Distinction Between Data Backup and Business Continuity

Posted by Cathie Briggette Mon, Feb 29, 2016

Written by Brandon Garcin on Feb 29, 2016 6:00:00 AM on Continuum MSP Blog

Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the “technology” was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards was then further developed by IBM in the early days of data processing, where data input, storage and commands were captured using a series of hole punches.

IBM Archives:   https://www-03.ibm.com/ibm/history/exhibits/storage/storage_350.html

Read More

Topics: Cloud Computing, Disaster Recovery, Business Continuity

Top 4 Advice Tips from the IT Experts on Computer Safety

Posted by Alyssa Steen Mon, Feb 01, 2016

“Cybercrimes are becoming mainstream,” NSK Inc. IT Consultant Philip Abraham said, “the internet is full of predators.”

With cybercrime becoming more prevalent in our society, computer safety is something that must become an unfortunate priority. Thankfully, the experts here at NSK Inc. are more than prepared when it comes to this stressful aspect of the IT world. So instead of searching the internet for common sense fixes and confusing techniques, the NSK team has gotten together to create a list of precautions and steps to ensure your devices stay safe.

Read More

Topics: Disaster Recovery, Data Security, cybersecurity

Ransomware : 10 Steps to Avoid the Infection

Posted by Davide Palumbo Wed, Dec 16, 2015

A few months ago, the devastating CryptoLocker malware that has locked the files of half a million PC users across the world was finally neutralized. The US government managed to seize the computers that were spreading the CryptoLocker malware with support from some security experts. Later, a security firm made public a tool so that people, whose PCs were infected, could decrypt and recover their files.

Read More

Topics: Disaster Recovery

Technology Problems during a storm

Posted by Cathie Briggette Sun, Oct 04, 2015

Here comes....  There goes Joaquin

Hurrican Preparedness for your Business - Computer Helpful Hints Be Ready!

Read More

Topics: NSK Team, Disaster Recovery

My Laptop Got Stolen -- How to Protect Your Device and Information

Posted by Andrew Sullivan Wed, Aug 26, 2015

"Someone strolled into our four-story, Class-A professional building, then into our second-floor office suite and stole my primary business computer -- an Apple MacBook Air -- right off my desk."

Read More

Topics: Cloud Computing, Disaster Recovery, Apple

Top 4 Security Practices for Backup and Disaster Recovery

Posted by Cathie Briggette Thu, May 21, 2015

I am sure most of you are well aware  that all data systems are vulnerable to data loss.  These instances can be sparked by:

  • Hardware failure
  • Human Error
  • Fire
  • Electrical surge
  • Physical theft
  • IT Security breaches

Knowing these best backup and disaster recovery practices can help you avoid data loss and downtime, save you time, money, and most likely your job.

Read More

Topics: Disaster Recovery

Disaster Recovery vs. Backup. Which is right for you?

Posted by Andrew Sullivan Fri, May 15, 2015

Datacenter downtime means an organization can’t serve its customers and it can’t execute transactions, leading, potentially, to thousands of dollars of lost revenue. Recent data shows that 76 percent of companies experienced an outage in the last year and only 13 percent of those outages were the result of natural disasters. Most “disasters” are related to human error and minor power outages, and the expectation is that data recovery should be fast without flooding, torrential rain, or other factors to address. However, using a backup solution to meet business continuity needs will not work. Data backup is simply not a comprehensive information and application recovery solution.

Read More

Topics: Disaster Recovery, Managed Services