<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Your Timeline for Compliance with MGL 93H 201CMR17.00

Posted by Cathie Briggette on Fri, Oct 16, 2009

October 2009

Designate an Information Security Officer - You will need to designate at least 1 person at your place of business who will maintain the comprehensive information security program. Finding that person now will help get the rest of the items in line for when they need to be done. You can get a compliance checklist at: 201 CMR 17.00 Compliance Checklist

Read More

Topics: 201CMR17.00

Online Shopping Safety

Posted by Melissa Cocks on Thu, Oct 08, 2009

Tips on Online Safety

If you’re like me and millions of other people, you probably shop online.  This almost inevitably means you will transmit your credit card number along with personally identifying information such as your name and address through the internet. This is a prime opportunity for a bad guy to steal your identity without ever having to be near your trash-can, which is is another story for another tip.

Read More

Topics: Disaster Recovery

Choosing an Antivirus Protection Product

Posted by Melissa Cocks on Thu, Oct 08, 2009

Tips on Antivirus Protection

Virus ProtectionWhen it comes to safe computing, one absolute necessity is an antivirus client.  You simply cannot browse the Internet without one and expect to keep your data safe or computer free of viruses for more than a few seconds.

Read More

Topics: Disaster Recovery, Managed Services

The Importance of Changing Passwords

Posted by Melissa Cocks on Fri, Oct 02, 2009

Tips on Password Security

Data SecurityContinuing my previous discussion of what makes a password strong is the additional need to routinely change your password.  The reason to change your password is that the longer your password remains the same, the more likely it will be discovered by a malicious user. 

Read More

Topics: Disaster Recovery, Data Security

Creating Strong Passwords

Posted by Melissa Cocks on Fri, Oct 02, 2009

Tips on Password Security

Data Security

You always hear about choosing strong passwords. Every time you sign up online for any account, you are advised to choose a strong password and maybe even given colors showing you the strength of the password you have selected. What exactly is a strong password, though?

Read More

Topics: Disaster Recovery, Data Security