A Disaster Recovery (DR) plan is a documented, detailed process for responding to a major IT service disruption at your […]
In this video, we discuss a scam that social engineers are using to gain access to sensitive personal information. Fraudsters […]
There is a very popular scam on the rise, where fraudsters are using to gain access to sensitive financial information. These […]
Join an expert panelist for “Best Practices for Local and Multi-location Businesses” The event will be held 2:00 p.m. […]
Data Privacy Day
In an effort to spread an international message addressing privacy, data protection, and trust, January 28th was deemed Data Privacy Day […]
January 17, 2017. Michael Hammond, a resident of Braintree Massachusetts, has been named Principal at CPA firm O’Connor & Drew […]
An open letter to firms requesting security assessments (especially IT consultants selling “security assessments”): Running a scan is not a […]
Outnumbered: The Importance of Vigilance in IT Security
Cybercriminals are becoming increasingly clever and more creative every day. The measures that may be in place to protect businesses […]
NCSAM – Week 3 – Recognizing and Combating Cybercrime
Week 3: October 17-21, 2016 – Topic: Recognizing and Combating Cybercrime Cybercrime can take many forms, from targeted and sophisticated […]
We often get asked about cyber security and cyber security assessments. Sometimes we are in the room when others are […]