Cybersecurity Tips for 2019: How to Spot a Phishing Email

Phishing is not a fun day on the water! Phishing emails lure you (the victim) into clicking on a malicious URL or email attachment so that you hand over your personal data. What is Phishing? Phishing is very similar to spending a day on an ocean or lake but instead of trying to reel in [...]

2019-04-09T19:19:13+00:00April 2nd, 2019|Security|

Cybersecurity Tips for Spring Break – Protect Yourself

Planning a trip? Getting ready to travel with your laptop for business or pleasure? As important as it is to deploy safe cyber practices while at home, it is even more important to be aware of cybersecurity risks while traveling. According to a TripWire survey, 51% of Americans believe that using personal devices on vacation [...]

2019-03-12T16:35:09+00:00March 12th, 2019|Mobility, Security|

IT Security Audit

 Has your company had thorough penetration testing or an IT security audit performed? Your firewall, anti-virus, and even the best practices you have in place will not give you the detailed information that a proper security audit can. Without it, you will not understand what your vulnerabilities are or where some potential holes are. [...]

2019-03-12T17:31:12+00:00January 8th, 2019|Security|

ACS Virus Protection

Virus creation is a multi-billion dollar industry. No matter how quickly the top anti-virus companies can put together patches and update security, new threads and strains are being created. Fighting viruses is a full time job and it's not enough to just install the latest anti-virus software on you machines. Viruses and security threats have [...]

2019-03-12T16:45:52+00:00December 8th, 2017|Security|

Ransomware

Have you heard about the Cryptolocker virus or ransomware? These are types of malware that attack your system and encrypts all of your data. Businesses who are victims of these kinds of attacks are at the mercy of the attacker and will often have to pay a sum of money to recover access to their [...]

2019-03-12T17:40:39+00:00November 16th, 2016|Security|

DDoS

As you may be aware, this past week we witnessed what some claim to be the most aggressive attack in the history of the internet. Due to the nature of this attack, it not only affected the intended recipient but also crippled many major service providers across the web. The following link from CNBC talks [...]

2019-03-12T17:41:25+00:00October 24th, 2016|Security|

Data Intelligence

Have you ever had a chance to go through your network to understand what kind of data you’re storing, such as social security numbers, credit card numbers, any sort of intellectual property, etc. Do you know if this information is secure? Do you know where it’s stored or if it’s backed up? Our team, along [...]

2019-03-12T16:48:10+00:00March 28th, 2016|Security|

Massachusetts 201 CMR 17.00 – Deadline extended

201 CMR 17.00 is a Massachusetts data protection law managed by ‘Office of Consumer Affairs and Business Regulation’ (OCABR). It contains the ‘Standards for the Protection of Personal Information of Residents of the Commonwealth’. The provisions of this regulation applies to all who own, store, license or maintain any personal information about a resident of [...]

2009-12-08T02:41:00+00:00December 8th, 2009|Security|