<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

IT Security Tips for Computer Applications

Posted by Melissa Cocks on Fri, Dec 11, 2009

IT Security Tips for Computer Applications

Update your software:ComputerSecurity

All current Microsoft operating systems come configured to perform automated updates.  However, most of the applications that are installed on your computer do not.  Keep in mind that every application you use poses a potential risk that could allow an attacker to gain access to your system or information.  So, configure your software to check for updates frequently.  If it can’t be automated, make sure you check for updates to your software.  Whether it’s Adobe Reader, Apple iTunes, Sun Java, Mozilla Firefox, or the latest video game, new vulnerabilities are constantly being discovered and patches are routinely being released.  Update everything and update frequently.

If you don’t need it, uninstall it:

 Every application you have on your computer represents a potential vulnerability, or a way for an attacker to gain access.  Consider your computer to be like a house and every application is like a window.  When an application is vulnerable, it’s as if the window is open, allowing attackers easy entrance.  Even when the window is close, i.e., the application is patched, the attacker can clearly see the window and can work to find a vulnerability that will open it up.  If you don’t need an application, you should uninstall it.  This is like removing the window and walling it in; there’s nothing there through which an attacker can even try to gain access.

 

Written by:

 

Ben Howard - MCSE, Security+, CCNA Security, NSA 4011
Senior IT Associate
NSK Inc. 

 

Read More

Topics: Disaster Recovery, Data Security

Less Data Loss in 2009?

Posted by Melissa Cocks on Wed, Dec 02, 2009

2009 Data Loss: Overlooking Important Points When Viewing Statistics

The end of a year is a time to look back and reflect on positive and negative incidents that have occurred in the past 12 months. Some people make a more general, qualitative assessment about performance, and others look at hard numbers and come to conclusions that way. Although there are many different ways of analyzing performance, it is important to ask yourself if the paradigm you’re using to assess improvement in any situation is hiding another truth. This applies all business matters, but right now we’ll focus on business IT. To demonstrate this concept, we’ll use the following example.

Read More

Topics: Disaster Recovery

Final Version of MGL 93H 201 CMR 17.00 Filed

Posted by Cathie Briggette on Thu, Nov 19, 2009

 Final Version of MGL 93H 201 CMR 17.00 Filed

OCABR (Massachusetts Office of Consumer Affairs and Business Regulation) on October 29th, 2009 filed the "Final" version of the "Standards for the Protection of Personal Information" also known as MGL 93H 201 CMR 17.00 with the Secretary of State's office.  The first issue was in September of 2008, and after more than a year of amendments to the original regulations this is the final step before the regulation takes effect on March 1, 2010.  The final regulations include some further clarifications than the amendment that was released in August of this year, but are substantially similar.201CMR17.00

Read More

Topics: Disaster Recovery, 201CMR17.00

Frequently Asked Questions Regarding MGL 93H 201 CMR 17.00

Posted by Cathie Briggette on Wed, Oct 28, 2009

What are the differences between this new version (August 17, 2009) of 201 CMR 17.00 and the version issued in February of 2009?

There are some important differences in the two versions:

Read More

Topics: Disaster Recovery, 201CMR17.00, Managed Services

Avoiding Spam Tricks

Posted by Melissa Cocks on Mon, Oct 19, 2009

Spam E-Mail Security Tip

Read More

Topics: Disaster Recovery