<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Worms and Spyware and Trojans, OH MY: Learn the facts about Malware

Posted by Nick Deluca on Mon, Apr 02, 2012

People often consider the only threat against their computers to be a virus. This is common misconception that often leads to detrimental system damage. A virus, in fact, is a specific threat that falls into the broad category of malicious software, or malware. Malware is used to disrupt computer operations, gather privileged information, and gain unauthorized access by hackers and frauds. Here are a few items that you might not know, but should learn to differentiate when it comes to malware.

Read More

Topics: Disaster Recovery, Data Security

Choosing a Cloud Service Provider for Backup Recovery

Posted by Nick Deluca on Wed, Mar 21, 2012

I recently stumbled across an article describing data loss horror stories from 2011. The most disastrous occurrence described a server being struck by lightning, subsequently set on fire, and incurring water damage from the fire department’s attempt to extinguish the fire. Amazingly, the provider was able to recover all of the data from the charred servers because the company had their data backed up through a cloud service as part of their disaster recovery. Unfortunately, not everyone has a back up recovery plan or is subscribed to a cloud provider who can restore data after such a detrimental disaster. Choosing the right provider who offers the right services is a matter of patience, rationale, meticulousness, and a little bit of common sense.

Read More

Topics: Cloud Computing, Disaster Recovery

Become SAS 70 Type II, SSAE 16 Compliant in the Cloud

Posted by Nick Deluca on Fri, Mar 16, 2012

cloudsecurity

When it comes to cloud security, one of the most popular features offered by providers is security auditing.  Security audits are what a provider uses as a method of inspecting and maintaining a company’s internal controls, which consist of policies, procedures, and safeguards. The renowned audit, SAS 70 type II, was conceived in 1992 and has since evolved to form SSAE 16. Though both of these audits are commonplace in the security realm, like most other features they do not come without disadvantages that need to be addressed and weighed against advantages by the person or company utilizing the audits.

Read More

Topics: Cloud Computing, Disaster Recovery, Cloud Security

201 CMR 17.00: Have You Secured Your Data With 3rd Party Vendors?

Posted by Nick Deluca on Wed, Mar 07, 2012

security_201CMR17On March 1, 2012, Massachusetts General Law Chapter 93H and its new regulations 201 CMR 17.00 final procedure went into effect – the provision of which included 3rd party vendors.

This law, at its most basic premise, protects Massachusetts residents against identity theft and fraud. While the ruling may seem almost obvious and even stir some déjà vu, it’s probably because the law was actually put into practice on March 1, 2010 and similar laws have already been perpetuated in California, Maryland, Nevada, Oregon, and Texas. This final step in the new law was for contracts entered into before the 2010 date that were grandfathered in. The March 1st, 2012 date completely nullified any grandfathered contracts.   Now, ALL companies or persons in Massachusetts who store or use personal information about Massachusetts residents must have created a written and regularly internally audited plan to protect a Massachusetts’s customer or user’s personal information that includes additional WISPs from third party vendors who also have the ability to see personal information.

Read More

Topics: Disaster Recovery, 201CMR17.00

Pinterest: Social Media Marketing's Newest Optimization Platform

Posted by Nick Deluca on Mon, Mar 05, 2012

Pinterest_Logo

The idea that Facebook, Google+, and LinkedIn are no longer the leading social media marketing sites on the Internet is one that has rapidly spread as of late. It’s a tough notion to comprehend seeing as how these three marketing superpower websites are considered untouchable in their ability to connect people at home and abroad, to include the best user-friendly features and apps, and to network efficiently in the professional realm, respectively.

Read More

Topics: Social Media