Google announced that within the next two years the Chrome browser would no longer allow 3rd-party cookies. Reactions are mixed.Continue reading
Boyle Software has received its SOC 2 Type 2 certification for 2019. After our initial SOC 2 Type 1 certification in 2018, we are happy to have completed a full year with our Service Organization Controls successfully in place.
Our appreciation to the good folks at Assure Professional for working with us to complete this rigorous battery of tests of our practices and procedures.Continue reading
October is National Cybersecurity Awareness Month (NCSAM) in the United States. Started by National Cyber Security Alliance and the Department of Homeland Security in 2003 it was conceived to raise awareness of the importance of cybersecurity.Continue reading
We are happy to report that Boyle Software has just received its SOC 2 Type 1 certification from Assure Professional. Assure describes Service Organization Controls (SOC) 2 certification as verification that an organization adheres to best practices with regards to the following principles:
- Security – The system is protected against unauthorized access (both physical and logical).
- Availability –The system is available for operation and use as committed or agreed upon.
- Processing Integrity – System processing is complete, accurate, timely, and authorized.
- Confidentiality –Information designated as confidential is protected as committed or agreed upon.
- Privacy –Personal information is collected, used, retained, disclosed, and/or destroyed in accordance with established standards. [Source]
Boyle Software, Inc. is now a member of the Center for Internet Security (CIS) SecureSuite®. This new partnership provides us access to multiple cyber-security resources including the CIS-CAT Pro configuration assessment tool, remediation content, full-format CIS Benchmarks™ and more.
Here’s a quick summary of the case and ruling… Continue reading
In April of 2016, members of the EU adopted the General Data Protection Regulation (GDPR), aimed at strengthening data protection and privacy for all individuals within the EU. The regulation allowed for a two-year transition period, and becomes enforceable in May of this year, 2018.
There’s a lot to the GDPR (more than can be addressed in a single post at least) but one of the key provisions is that individuals have the right to request erasure of their data from a service provider. This means that many online and cloud service providers will need to have the ability to comply with these requests, even if they’re not based in the EU. Continue reading
The site Freedom to Tinker, which is hosted by Princeton’s Center for Information Technology Policy, has started publishing an ongoing series called “No Boundries” around the topic of how third-party scripts on sites can exploit browsers to collect/extract user data in growing ways.
Their second installment focuses on how the well-known vulnerabilities of browser login managers can provide trackers with user information – not for the purposes of stealing passwords which has been looked at many times, but for the purposes of web tracking which can then be monetized to other companies. Continue reading
2017 has been a busy year for Technology. Dominating the news cycle since January have been ongoing stories and discussions about hacking (from elections to ad networks), cryptocurrencies, smart speakers, self-driving cars, and of course net neutrality. Here are some predictions of what the top Technology stories in 2018 might turn out to be… Continue reading