When to Consider Hiring Jr IT Staff

By Jeremy Louise | November 6th, 2018 | Managed Services

If I had to make a list of some of the most common questions I get when speaking to customers with high urgency needs is, “should I hire a junior IT staff?” would undoubtedly be right at the top. It happened to me again, just this morning when I was on a conference call with … Continued

The Era of the vCIO: What Is It and Does It Really Matter?

By Chris Souza | October 18th, 2018 | Governance & IT Compliance

As someone with several decades of experience as a managed services provider under my belt, I’m often struck by how quickly technology continues to change the world around us. Thanks to IT, entire industries have been disrupted over the last few years to the point where they barely resemble the initial functions from where they … Continued

To Comply, or Not to Comply: The Strategic Approach to IT Compliance

By Chris Souza | September 20th, 2018 | Governance & IT Compliance

I was talking to a prospective client the other day and the subject of DFARS/NIST DoD compliance came up. Obviously, cyber security is one of the most pressing issues of our age and when you’ve got the Department of Defense watching over you, that’s a pretty big deal. I asked him a little bit more … Continued

Controlling the Costs of IT Security: Why It’s a Lot Easier Than You Think

By Jeremy Louise | September 12th, 2018 | Network Security

One of the common themes that’s permeated a lot of the meetings I’ve been having with both current and prospective clients lately can all be summed up in a single word: security. These chats may not, however, be taking the shape you probably think they are. Yes, cyber security is critical and it’s an issue … Continued

Attention CFOs: Here’s One Way to Significantly Reduce IT Capital Expenditures That You’ve Probably Overlooked

By Jeremy Louise | August 23rd, 2018 | Business Operations

The other day, I was having a conversation with a friend of mine who also just so happens to be a Chief Financial Officer (CFO). As is the case more often than either of us would like, our friendly chat quickly turned to business. He asked me how some of our clients budget their capital … Continued

Are You Preparing for an Acquisition? Don’t Forget About Your IT

By Jeremy Louise | August 21st, 2018 | Business Operations

Being at one of the leading IT services firms in Boston, Cambridge and the greater New England area, one of the major things that excites me every day is the fact that we often find ourselves in the epicenter of biotech and pharma innovation in the modern era. In addition to helping break new ground … Continued

What You Need to Know About GDPR Compliance

By Roger Murray | April 4th, 2018 | Governance & IT Compliance

The General Data Protection Regulation (GDPR) is a regulation requiring businesses to protect the personal data and privacy of European Union (EU) citizens for transactions that occur within EU member states. Every company conducting business within the EU will need to comply to these strict new rules by May 25th which will likely cause concerns and heightened expectations for security teams due to the broad, yet stringent nature of the GDPR requirements.

New PCI Compliance Standards Deadline Approaching

By Roger Murray | January 30th, 2018 | Project & Contracted Services

The Payment Card Industry Security Standards Council (PCI SSC) has published a new version of the industry standard that businesses use to safeguard payment data before, during, and after purchase.  PCI Data Security Standard (PCI DSS) version 3.2 replaces previous versions in addressing the growing threats to customer payment information.

Infected USB Drives Handed Out at Data Security Event

By Roger Murray | January 19th, 2018 | Network Security

During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.

Unusual Ransomware Strain Encrypts Cloud Email In Real-Time

By Roger Murray | January 16th, 2018 | Network Security

A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.  A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure. 

Need Support? Call Us Today

Available 24 hours a day, 7 days a week
1-508-543-6979