Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...

Businesses In For Rude Awakening as CCPA Takes Full Effect

Businesses In For Rude Awakening as CCPA Takes Full Effect What use of technology do you use to give you the edge? Do you use outsourced technology platforms and services? Do you know what data you collect and where all your data is stored?  California’s...
5G – Not Ready For PrimeTime…Yet!

5G – Not Ready For PrimeTime…Yet!

5G – Not Ready For PrimeTime…Yet!   Technology is ever-changing, and new and improved technology is consistently released and models refreshed or introduced. The next significant advancement coming our way will be in cellular technology and the...
Business Computers Should Only Be Used For Business

Business Computers Should Only Be Used For Business

Business Computers Should Only Be Used For Business   If an employer provides you with equipment, they expect that the computer to be used for work and work only. Many times there will be software installed on these devices that monitors your activities and...
Upping your Incident Response Game — New Regulations coming

Upping your Incident Response Game — New Regulations coming

Upping your Incident Response Game — New Regulations coming   If you are a business and you have data on any Massachusetts resident or do business in Massachusetts, coming in early January, there are new data collection requirements with which you will need...