BOSTON IT SERVICESCall us at (781) 933-9300


By amending the?Data Breach Law, Massachusetts is increasing protection of their residents personal information. This law requires businesses to expand their WISPs (Written Information Security Plan) to include a detailed ?incident response process?.

In the April issue of our security update, I wrote about the three things you cannot avoid ? death, taxes and now cybercrime/data breach. I found the new state requirements as another confirmation of such by saying, “You are going to have cyber security incidents, you need to handle them properly.”

I find two camps when dealing with cyber security ? the ones who believe it is important but fail to change their behavior, and those who do change. Unfortunately, a very large percentage of people do not change. They may have great intentions, but it never happens.

It is easy to say, why bother, we all have to deal with it anyway. There is a little truth to that, but how an incident negatively impacts you is what this is all about. Many businesses will be held hostage this year. Those who have not prepared will have no option but to be victimized because they failed to change, whereas others will be hit and it will only be a short nuisance with minor financial impact.

Stay safe!

? Dan Adams


We all know that cyber security is a concern, but until we know the details, it is really hard to understand how it can destroy us. Most of the time we learn more than we want to because we have been breached. Starting this month we have added this section to provide a definition or two of key cyber security terms and concepts.

The more educated we all are, the better decisions we make:


Exploits are programs or a piece of computer code that takes advantage of a security flaw in an application or system.

Known Exploits

Known exploits are “errors” in software/hardware that have been identified. They are publicly documented but have not been resolved yet. To protect yourself you will need a solution that overcomes that failure of the software/hardware.

Zero Day Exploits

A cyber attack on a software or hardware vulnerability before they are known by the producer. These kinds of exploits are particularly dangerous because a user?s security can be breached even when using fully updated software.

Massachusetts amends Data Breach Law ? what to know for your incident response strategy

LEGAL CHANGE! – Massachusetts companies need to update their WISPs with more documentation and structure around the “Incident Response Process”. Is your WISP in compliance?

Read Article

Flipboard reveals data breach, which left users’ details exposed

This was not a quick “hack”. The criminals had access for several months before discovery.

Read Article

Instagram data breach! 49 million users? sensitive data exposed online

Instagram Breach!?- another great example why you should always use strong unique passwords. Unique means each account you have has a unique password. That way, when someone gets breached, it will not unlock access to your other sites.

Read Article

The growth of ransomware extortion demands

The extortion demand amounts are growing – what was once a few hundred dollars has jumped significantly. Our advice is to make sure you have tested recovery and workarounds to return to business.

Read Article

iPhone privacy Is broken?and apps are to blame

Often the device or operating system we are using is safe, but the applications we install may be doing things in the background that compromise us.

Read Article

Massachusetts pledges major investment in IT modernization

The State of Massachusetts is putting over 1/2 Billion to improve its technology.? A very large portion of that amount is earmarked for cyber security.

Read Article

New England Network Solutions (NENS)?offers Cyber Security solutions for your business. Contact us today to prevent your company from being compromised. Call 781-933-9300 or Contact Us to learn more about our security managed services.