October is National Cybersecurity Awareness Month (NCSAM) in the United States. Started by National Cyber Security Alliance and the Department of Homeland Security in 2003 it was conceived to raise awareness of the importance of cybersecurity.Continue reading
We are happy to report that Boyle Software has just received its SOC 2 Type 1 certification from Assure Professional. Assure describes Service Organization Controls (SOC) 2 certification as verification that an organization adheres to best practices with regards to the following principles:
- Security – The system is protected against unauthorized access (both physical and logical).
- Availability –The system is available for operation and use as committed or agreed upon.
- Processing Integrity – System processing is complete, accurate, timely, and authorized.
- Confidentiality –Information designated as confidential is protected as committed or agreed upon.
- Privacy –Personal information is collected, used, retained, disclosed, and/or destroyed in accordance with established standards. [Source]
Boyle Software, Inc. is now a member of the Center for Internet Security (CIS) SecureSuite®. This new partnership provides us access to multiple cyber-security resources including the CIS-CAT Pro configuration assessment tool, remediation content, full-format CIS Benchmarks™ and more.
Here’s a quick summary of the case and ruling… Continue reading
In April of 2016, members of the EU adopted the General Data Protection Regulation (GDPR), aimed at strengthening data protection and privacy for all individuals within the EU. The regulation allowed for a two-year transition period, and becomes enforceable in May of this year, 2018.
There’s a lot to the GDPR (more than can be addressed in a single post at least) but one of the key provisions is that individuals have the right to request erasure of their data from a service provider. This means that many online and cloud service providers will need to have the ability to comply with these requests, even if they’re not based in the EU. Continue reading
The site Freedom to Tinker, which is hosted by Princeton’s Center for Information Technology Policy, has started publishing an ongoing series called “No Boundries” around the topic of how third-party scripts on sites can exploit browsers to collect/extract user data in growing ways.
Their second installment focuses on how the well-known vulnerabilities of browser login managers can provide trackers with user information – not for the purposes of stealing passwords which has been looked at many times, but for the purposes of web tracking which can then be monetized to other companies. Continue reading
2017 has been a busy year for Technology. Dominating the news cycle since January have been ongoing stories and discussions about hacking (from elections to ad networks), cryptocurrencies, smart speakers, self-driving cars, and of course net neutrality. Here are some predictions of what the top Technology stories in 2018 might turn out to be… Continue reading
In an age where the next major data security breach seems to be lurking just around the corner, or perhaps has already happened and we just don’t know about it yet, it’s refreshing to hear talk of sunsetting the archaic social security number as a universal identifier for US citizens. While it should come as no surprise, with cybersecurity at the forefront of international headlines, and regular password-update requirements all but ubiquitous with online accounts, the onus has been largely on the individual to vigilantly guard their own digital information. At the heart of this information lies a single, 9 digit identifier meant to last a lifetime – big red flag. Continue reading
Although WannaCry, the massive worldwide ransomeware attack, is the biggest story these days when it comes to cyber crime, it’s definitely not the only issue causing problems for sites right now.
Last week, website security leader Sucuri identified code that appears to be WordPress API related, but is actually sending active cookie data to attackers. This is most problematic when the active user is a site admin because it gives someone the opportunity to create a new admin user which can be then used to do considerable damage to a site and/or gain access to user data.