Securing Your Cloud Environment – Who is Responsible?
by Derek Boczenowski on September 18, 2019 at 1:00 PM
The speed at which technology progresses is truly staggering. I am old enough to remember having to load 9-track magnetic tapes to install a patch, and marveled at the lightning fast 384k connection for an entire organization, thinking we had finally made the big time.
Cybersecurity - Back to Basics
by Derek Boczenowski on June 14, 2019 at 1:00 PM
Welcome to summer in New England! Or close to it at any rate. Today I would like to talk about a slightly different topic than usual on these blogs. For those of you that have read past entries, you know they are full of good advice on not many different compliance issues.
Updates to MA 201 CMR 17 Data Breach Law
by Derek Boczenowski on February 1, 2019 at 1:00 PM
The Laws, they are a’ changin’… …to paraphrase Bob Dylan. And I’m speaking about privacy and breach laws. It would seem that every other day we hear of another set of customer data being compromised at another company. It could be just name and address, but it could be phone number, S …
Why a Risk Assessment is the Beginning of Security, Not the End!
by Derek Boczenowski on April 10, 2018 at 9:30 AM
In the past several weeks, the news has been filled with multiple compromises and hacks. Panera Bread, Delta, and Under Armor just to name a few. One of the ones that has had the most impact is the ransomware attack on the City of Atlanta.
Online Banking for Businesses – How to protect yourself
by Derek Boczenowski on March 27, 2018 at 9:15 AM
One of the biggest areas that we see attacks on is the business online banking customer. There has been a marked increase in trying to compromise these accounts, primarily to abscond with the funds within the accounts, but also to execute identity theft as well. Many of these attacks …
Why Every Company Needs an Information Security Officer
by Derek Boczenowski on February 7, 2018 at 10:00 AM
In today's world, businesses of all sizes depend heavily on digital systems and data. While this digital transformation brings many benefits, it also exposes companies to a growing number of cyber threats. Data breaches, ransomware attacks, and other types of cybercrime have become al …