The Tulsa IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At NSN Management, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

What Our Clients Say

  • NSN Management’s response time is impeccable!

    NSN Management’s response time is impeccable! They’re here whenever we need them to be here, and they have the ability to remotely solve small problems immediately. They come up with great solutions for our IT problems and requirements, giving us multiple choices when we have decisions that need to be made.”

  • Sean helps us navigate the sometimes turbulent waters of techno-change

    Sean helps us navigate the sometimes turbulent waters of techno-change. As a small company, we need to be able to rely on NSN for critcal IT support as well as ongoing training and planning for the next round of changes in the computer world.

  • High level of integrity

    Sean is an extremely hard-working guy, with a high level of integrity. He never met a challenge that he couldn’t solve. He is constantly learning new things, and staying on top of technology (as well as many other topics too many to count). He thinks big, and is able to wrap his mind around his big plans. He is never short of new ideas. I have been a business partner, employee, and client of Sean, but also consider Sean a close personal friend.

Latest Blogs

How We Know that Mark Zuckerberg Has Never Seen Spaceballs

Security company LeakedSource was able to obtain and analyze the stolen passwords from an online black market. They found that the most commonly used password (connected to more than 120,000 accounts) is also the easiest to guess: “123456.”

This despite (or perhaps because of) the famous password scene from the 1987 film “Spaceballs.” If you recall, the joke was regarding King Roland being blackmailed by Dark Helmet to turn over the password securing Druidia’s planetary force field. The super-secret password in question, “12345.”

The revelation of the password being so ridiculously simple caused Dark Helmet to reply, “That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!”

Not surprisingly, the other most-used passwords from the Twitter haul are just as easy to guess; “123456789,” “qwerty,” and “password.”

We make the connection to Spaceballs in order to highlight the fact that using weak passwords has been a major IT security issue for at least 30 years, with little hope of things changing. Fortunately, the remedy is quite simple; use complex passwords with a string of random characters. Taking this measure alone will improve your security vastly over all the other King Rolands to be found in cyberspace.

However, using complex passwords will only get you so far. For example, as in the case of the recent Twitter heist, if your password is stolen, then it doesn't matter how complex it is. This is why we highly recommend that you take advantage of two-factor authentication security solutions. Twitter and other major websites offer two-factor authentication, which messages your mobile device with an additional code upon entering the correct password. It’s a small inconvenience that will virtually guarantee that you’ll be protected, should your password fall into the wrong hands.

Additionally, we recommend following the best practice of using a different password for each of your online accounts. For example, if your Twitter password gets stolen and this happens to be the same password used for your other online accounts, then the hacker would have an easy time logging into your other accounts.

Actually, this happens more than you would think, with Facebook’s Mark Zuckerberg becoming the recent poster child. On June 6th, Zuckerberg briefly lost control of his Twitter and Pinterest accounts after hackers used the same password to access both. The password in question was not only ridiculously easy to guess, but it was also one that he’s apparently used before, “dadada.”

Therefore, if you’re using complex passwords, two-factor authentication, a different password for each account, and you’re routinely changing your passwords, you’ll apparently have better online security than Mark Zuckerberg, which is something to brag about.

Following all of these password security best practices will go a long way in protecting your online identity, and when it comes to network security, the more precautions you take, the better. To that end, call NSN Management today at 918-770-7400 to equip your business with the best security solutions on the market.

Learn More

This Breakthrough By MIT Will Propel Artificial Intelligence to New Heights

The team, hailing from MIT’s Computer Science and Artificial Intelligence Laboratory, developed a security platform combining the strength of human involvement with the effectiveness of artificial intelligence. Given the name A.I.², this new platform is capable of detecting 85 percent of incoming attacks while reducing reported false positives by 20 percent.

How A.I.² combines AI and human involvement is actually quite genius. To begin, the “untrained” machine reports a sample set of results to a human expert. These results are informed by machine learning and are checked against the 200 most important problems. The human expert then checks over and corrects the machine’s work, with the intention of finding mistakes and false positives. Subsequently, the human-checked results are inputted to A.I.², the machine learns, and the next set of tests will have fewer errors. This process is then repeated with the security platform adapting each time to look for what its human teacher looks for.

In a paper presented at the IEEE International Conference on Big Data Security, research scientist Kalyan Veeramachianeni summarized, "You can think about the system as a virtual analyst. It continuously generates new models that it can refine in as little as a few hours, meaning it can improve its detection rates significantly and rapidly."

Of course, the precedent of effectiveness set here by combining human expertise and oversight with A.I. has far-reaching ramifications for other A.I. initiatives currently in development; initiatives that have both humanity’s best and worst interests in mind. Although, for now, those of us in the IT world are celebrating this A.I.-enabled technology for being one giant leap forward in security analysis accuracy.

It’s important to keep in mind that a platform like A.I.² is still years away from being available to the average business. Therefore, we recommend that you stay on top of your network security by following best practices, which combines automated software solutions and human vigilance in order to combat the latest threats. NSN Management is standing by to assist you with all of your company’s network security needs. To equip your business with the most comprehensive IT security solutions on the market, call us today at 918-770-7400.

Learn More

Tip of the Week: How to Avoid Back Pain and Eye Strain in the Office

Chair Specifications
While this may not be the first issue to enter your mind as you consider sources of discomfort in the workplace, it only makes sense to assure that the office chairs are as comfortable as possible. After all, it is where the employee will spend most of their day. A good office chair will have a cushion (preferably with breathable fabric) as well as armrests for the times the employee stops typing. The arms should be bent at 90 degrees and resting on the arms with relaxed shoulders. As for the backrest, height and angle should both be adjustable to keep posture upright - and the best will include some form of lumbar support.

Desktop Hardware Positioning
Ideally, the keyboards should line up to your employees’ positions so that there’s a straight line from their navels to their “B” keys; mouse at the same level, and as close to the keyboard as possible. Heightwise, the keyboard and mouse should be at a level where the typist will bend at the elbows, not the wrists. The monitor(s) should be positioned so that the top edge of the monitor is about two or three inches above the user’s eye line. One last note concerning monitors: glare should be eliminated as much as is possible. Here is a handy chart for determining ideal desk proportions.

Using the Right Equipment
Of course, using properly-sized equipment is only half of the battle - it also must be used properly. Posture is key to minimizing soreness and discomfort. Beyond the arm positioning and eye level of the monitors, leaning and slouching will cause stiffness. You should suggest that your employees position themselves to be sitting up straight, shoulders relaxed, and avoid reaching for items on their desks.

Be Sure to Take Breaks
It is also recommended that those working with computers and screens take frequent breaks to reduce the strain on the muscles and eyes. Stretching, getting up and moving around, or at least looking away from the screen are all highly recommended.

One might ask why they should invest time and resources into assuring that their employees sit properly. The simple answer: a comfortable employee is a productive employee. Without the distraction of physical discomfort, a team will accomplish more, treat your clients better, and generally improve the environmental experience of the workplace.

So, how else could some small environmental adjustments improve office productivity? Let us know in the comments below!

Learn More

Know someone who would benefit from NSN Management? Let us know!

Latest Blog Entry

Twitter recently experienced a major hack where it saw 33 million user login credentials stolen. What may be more alarming than the hack itself is what the stash of stolen credentials reveal about users’ password security habits. Or, to put it more accurately, the lack there...

Latest News

NSN Management launches new website!

NSN Management is proud to announce the launch of our new website at www.nsnmanagement.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...