<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

More on 201 CMR 17 - Get that WISP

Posted by Cathie Briggette on Thu, May 11, 2017


In February 2010, Massachusetts raised the bar in security for businesses keeping it's residents’ information, by creating the most comprehensive data protection and privacy law in the United States – 201 C.M.R. 17;  also, known as the Standards for the Protection of Personal Information of Residents of the Commonwealth. This regulation issued by the Department of Consumer Affairs requires all businesses that license or own personal information of a Massachusetts resident to comply with the minimum-security standards set forth in the regulation.


Read More

Topics: 201CMR17.00, cybersecurity

Outsourcing IT without Disrupting Business Continuity

Posted by Cathie Briggette on Thu, Sep 15, 2016

Given the huge importance of technology, IT management is the cornerstone of any modern business, but not every organization possesses the resources to develop an in-house IT solution that caters to their business needs.

Read More

Topics: Disaster Recovery, 201CMR17.00, Managed Services

Tech Fixes: Methods to Protect Yourself Against Identity Theft

Posted by Philip Tang on Fri, Feb 20, 2015

The 201 CMR 17 demands companies to safeguard personal information, but taking action on your own will make you even safer.Identity_Theft

Thanks to Massachusetts General Law 93H (MGL 93H) and 201 CMR 17, state businesses have been mandated to produce comprehensive data security programs to protect their customers' personal information since 2010.  

Read More

Topics: 201CMR17.00, Data Security, Tech Fixes

How to Protect Your Company From CyberCrime

Posted by Andrew Sullivan on Fri, Jan 16, 2015

How secure are your small business assets from fraud, identity theft and cybercrime?

Sixty-five percent of surveyed businesses said they are not sufficiently budgeted for online security. The number increases to 71 percent for those with revenues under $10 million. Small businesses also have a higher fraud rate than larger companies and non-business owners. One of the most frequent sources of fraud is credit card abuse – largely due to the fact that few business owners actually take the time to go through every line item on their bill or choose to mingle business and personal accounts.

Read More

Topics: Disaster Recovery, 201CMR17.00, Data Security

The New World of BYOD

Posted by Nick Deluca on Fri, May 18, 2012

The New World of BYOD (Bring Your Own Device) -- Good for Your Company?

Bring Your Own DeviceBYOD is a concept that is rapidly gaining steam throughout the IT business industry. By “gaining steam” I mean two things. It could reference the cartoon-like explosion of hot gaseous vapor from a person’s ears due to incessant aggravation; or it could simply be defined as an increase in positive momentum. The notion is rudimentary and obvious, almost intuitive: Should employees utilize their personal devices (phones, tablets, laptops, etc.) to complete work-related tasks while on the clock? Though the idea may be basic, the answer is a bit more complicated.

Read More

Topics: Cloud Computing, Mobile Device Management, 201CMR17.00, Managed Services