Contact Us!

    Full Name (Required)

    Telephone No. (Required)

    Email Address (Required)

    Areas of Interest (Required)


    Subject

    Message

    Contact Us

    [email protected]

    Worcester, MA | 866-304-4300

    Boston, MA | 508-365-3630

    Providence, RI | 401-735-1956

    Hartford, CT | 860-560-8000

    Keylogger 101 We have all heard of hacking, virus, ransomwares, etc. as they keep coming up in the news every now and then. But, have you heard of keyloggers? In this blog post, we discuss keyloggers and how they can be used to gain unauthorized access to your system, online accounts, network and data.As the name suggests, a keylogger logs...

    Read More

    Social media securitySocial media is a great tool for SMBs to get the word out about their products and services, build their brand, and connect with prospective customers. It also offers paid marketing avenues as well, such as PPCs, marketplaces, etc., But are your social media accounts secure? Typically what happens in a business account on social media is that...

    Read More

    Three things to consider when investing in new softwareWhen running a business, you will often find yourself in need of new software tools to enhance the productivity, efficiency, effectiveness and even the security of your various business processes. These software programs range across a wide spectrum of tools including accounting, finance, IT, e-commerce, marketing, sales and many more. In this...

    Read More

    Insider threats: Not as uncommon as you thinkWhen we speak of cybercrime and data theft, we typically think of seasoned cybercriminals. But you’d be surprised to know that the cause of businesses becoming victims of cybercrime is most often their own employees--sometimes on purpose, sometimes inadvertently. Remember Bob from accounting who was let go? Or the new intern who worked...

    Read More

    Gaining a competitive edge during the pandemicThe COVID-19 pandemic has been tough on everyone. The lockdowns, the need to follow social distancing--though indispensable--have been tough on individuals and also resulted in a lot of revenue loss to businesses. For SMBs though, this time has been particularly difficult, with a general downturn in the economy and the job losses, which has...

    Read More

    Best practices for remote desktop accessRemote desktop access is an essential in these days when businesses are expected to be responsive to their clients almost 24/7. Moreover, there has been a surge in the remote desktop access practice with coronavirus pandemic. But, did you know that remote desktop access, while almost indispensable now, can threaten your network security? In this...

    Read More

    For years, people have trusted the SSL certificate green lock on their Google, Firefox, Internet Explorer, edge browser for safety and security. I hate to break it to you, but SSL certificates are broke. The Story of Symantec Security Certificates In the early 90s, a famous company called Symantec was handing out security certificates like free samples of Tide in the mail. Everyone...

    Read More

    Policy, procedure and process. I was asked recently why do I need a computer policy? The short answer? It’s the law. Massachusetts 201 CMR 17.00 Compliance In Massachusetts, the law 201.cmr.17 clearly states that a business must have a clear and defined polices when it comes to internet and data access for their employees. To quote the purpose section directly: This regulation implements the...

    Read More

    In the last couple months due to governmental pressures for state and local charities and nonprofits, small medical businesses have been asked to fully comply with HIPAA compliance even if a single machine might one day encounter that information. We are currently working with many translation services, small doctor offices, dentists, and branch offices of hospitals and medical centers and you...

    Read More