<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

MPICA Seminar Presentation of MGL 93H 201CMR17.00 at the ICA

Posted by Cathie Briggette on Tue, Jan 12, 2010

 MPICA Seminar Presentation of MGL 93H 201CMR17.00 at the ICA

MPICA MGL93H Compliant  This morning NSK Inc. met with IT and Human Resources Staff from the ICA, The Museum of Science, The Boston Children's Museum, Isabella Stewart Gardner Museum and the New England Genealogical Society to discuss the new Privacy Law that goes into effect in Massachusetts on March 1, 2010 (MGL 93H 201CMR17.00).  The meeting was sponsored by and held at the ICA.  Ryan Hickey and Timothy Lasonde from NSK Inc showed a Power Point presentation to everyone and explained the new law and what is required by Massachusetts companies to be in compliance by March 1, 2010.

Read More

Topics: Disaster Recovery, Data Security

IT Security Tips for Computer Applications

Posted by Melissa Cocks on Fri, Dec 11, 2009

IT Security Tips for Computer Applications

Update your software:ComputerSecurity

All current Microsoft operating systems come configured to perform automated updates.  However, most of the applications that are installed on your computer do not.  Keep in mind that every application you use poses a potential risk that could allow an attacker to gain access to your system or information.  So, configure your software to check for updates frequently.  If it can’t be automated, make sure you check for updates to your software.  Whether it’s Adobe Reader, Apple iTunes, Sun Java, Mozilla Firefox, or the latest video game, new vulnerabilities are constantly being discovered and patches are routinely being released.  Update everything and update frequently.

If you don’t need it, uninstall it:

 Every application you have on your computer represents a potential vulnerability, or a way for an attacker to gain access.  Consider your computer to be like a house and every application is like a window.  When an application is vulnerable, it’s as if the window is open, allowing attackers easy entrance.  Even when the window is close, i.e., the application is patched, the attacker can clearly see the window and can work to find a vulnerability that will open it up.  If you don’t need an application, you should uninstall it.  This is like removing the window and walling it in; there’s nothing there through which an attacker can even try to gain access.

 

Written by:

 

Ben Howard - MCSE, Security+, CCNA Security, NSA 4011
Senior IT Associate
NSK Inc. 

 

Read More

Topics: Disaster Recovery, Data Security

The Importance of Changing Passwords

Posted by Melissa Cocks on Fri, Oct 02, 2009

Tips on Password Security

Data SecurityContinuing my previous discussion of what makes a password strong is the additional need to routinely change your password.  The reason to change your password is that the longer your password remains the same, the more likely it will be discovered by a malicious user. 

Read More

Topics: Disaster Recovery, Data Security

Creating Strong Passwords

Posted by Melissa Cocks on Fri, Oct 02, 2009

Tips on Password Security

Data Security

You always hear about choosing strong passwords. Every time you sign up online for any account, you are advised to choose a strong password and maybe even given colors showing you the strength of the password you have selected. What exactly is a strong password, though?

Read More

Topics: Disaster Recovery, Data Security

Small-Business Considerations - in Massachusetts’ Revised 201CMR17.00

Posted by Cathie Briggette on Fri, Sep 04, 2009

Below is the copy of the Release from the Commonwealth of Massachusetts Office of Consumer Affairs & Business Regulation (OCABR).

Read More

Topics: 201CMR17.00, Data Security