<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

3 BEST Ways to Protect your Cloud Accounts

Posted by Steven Lai on Fri, May 12, 2017

There are quite a few cloud based applications,  such as iCloud, twitter, facebook, that are known to be easily hacked, especially with the wave of hacks against celebrity accounts.  So it is very important to take these three steps and measurements to ensure protection on all of your Cloud Accounts.

icloud-security 3 ways for best proctection-1.png  

Read More

Topics: Data Security, Apple, Cloud Security, cybersecurity

Cybercrime Tweets

Posted by Steven Lai on Thu, May 11, 2017

Scammers are now using Twitter as their new platform. They use Twitter to lure in individuals looking for customer support, by interjecting themselves into legitimate conversations the customers are having with their Financial Vendors, and offering friendly chatter and a link that directs the customer to a Phishing page designed to harvest their financial credentials.

Fake Twitter help from scammers-1.png

Read More

Topics: Data Security, #BostonIntern, cybersecurity

More on 201 CMR 17 - Get that WISP

Posted by Cathie Briggette on Thu, May 11, 2017

 

In February 2010, Massachusetts raised the bar in security for businesses keeping it's residents’ information, by creating the most comprehensive data protection and privacy law in the United States – 201 C.M.R. 17;  also, known as the Standards for the Protection of Personal Information of Residents of the Commonwealth. This regulation issued by the Department of Consumer Affairs requires all businesses that license or own personal information of a Massachusetts resident to comply with the minimum-security standards set forth in the regulation.

Square_-_HOW_SECURE_IS_YOUR_DATA-resized-600.jpg

Read More

Topics: 201CMR17.00, cybersecurity

Airline Phishing Attack

Posted by Steven Lai on Tue, May 02, 2017

 

There is another cyber attack out there and it is toward airline clients and their employees. This new cyber campaign is attacking companies involved with shipping goods and employee traveling.

Airline Phishing attack.jpg

Read More

Topics: Disaster Recovery, cybersecurity

What Data Discovery Tools do you need in 2017?

Posted by Robert Cordray on Mon, May 01, 2017

Data_Discovery_Tools 

Data has always been a driving force in the decision-making process for businesses. If you capture relevant information in the market, you can quickly make smart and strategic plans that can lead to growth and give you a competitive advantage.

There is high demand for more data, and this has significantly influenced the business landscape. As such, data discovering has emerged as the fastest-growing and changing trend of the business intelligence markets. Technology has enabled the manufacturing of tools that differ with the traditional systems of record in which the IT managed services provider was able to push reports out to the entire organization.

Read More

Topics: Data Security, data storage, data mapping