View Post

I WISP I Had A WISP

In Tech Blog by zdwyer

Do you run a business that handles Massachusetts residents’ personal information? If so, did you know that the Massachusetts regulation 201 CMR 17.00 asks that every business handling personal information …

View Post

Falalalala  – Credit Card Fraud

In Tech Blog by zdwyer

Tis the season for stealing that large slice of PII (personally identifiable information).  Cyber Criminals are out in full force this holiday season and with Black Friday and Cyber Monday …

View Post

Info Security Can Save Your Identity

In Tech Blog by zdwyer

Cyber security has become a hot topic throughout businesses and organizations as new technology continues to develop. In the past several years the world has evolved around technology tremendously, making it …

View Post

Untrained Employees & Risk

In Tech Blog by zdwyer

The Worse Security Threat Out There – Untrained Employees Most security professionals will tell you that as soon as you connect the internet you’re vulnerable to all kinds of threats, from …

View Post

Password Managers

In Tech Blog by zdwyer

By now, everyone should know that having a strong password is something that needs to be done in order to protect your online accounts. Most people use weak passwords, and they even …

View Post

Two-Factor Authentication

In Tech Blog by zdwyer

Two-Factor Authentication and Why It’s Useful. As hackers find more and more ways to maliciously break into other people’s accounts, companies are looking for different ways to confirm one’s identity. …