Tuesday, December 23, 2014

Guest Blog: Internet of Everything – It’s all about the Ecosystem

By Ed Featherston | December 18, 2014

It seems you can’t have a technology discussion today before the phrase “Internet of Things” (IoT), or better yet, “Internet of Everything” shows up. This makes sense, as according to the latest Gartner hype cycle report on emerging technologies places “Internet of Things” at the peak of the hype cycle, ousting big data from the top spot, which is now hurtling down into the trough of disillusionment (love those hype cycle names).

IoT is so pervasive that I even had a conversation with my cardiologist this week about the topic. I was in for the annual 10,000 mile checkup of my pacemaker. I mentioned to him that at the recent MassTLC Innovation UnConference, the topic of devices like the pacemaker were a hot topic of the day (see my blog MassTLC Innovation UnConference 2014- Views from an UnConference Neophyte). This triggered a great discussion with my doctor. Many of the points he made I found very applicable to the technology as a whole and provided great insight into the world of “Internet of Everything” from the viewpoint of a key consumer of that technology in the health care industry.


Monday, December 15, 2014

Guest Blog: Five Tips to Help Companies Protect Themselves from Data Breaches

By Steve Bychowski of Foley Hoag

With every swipe of a credit card this holiday season, consumers put their faith in the companies that process and store their information.  Yet, it is no secret that data breaches are on the rise, hitting companies large and small.  Massive data breaches recently struck Target and Home Depot, to just name a few, and these two breaches alone affected hundreds of millions of consumers and cost the companies hundreds of millions of dollars.  Sony Pictures is still reeling from a data breach this month that exposed the private information of thousands of Sony employees.  With the New Year almost upon us, now is a good time for companies to take stock of their data security practices to ensure that they start 2015 on the right foot.  Not only is data breach prevention good business, it is also required by many state, federal, and international laws.  Here are five tips for companies to safeguard their sensitive data. 

  1. Conduct a comprehensive risk assessment.  You can’t protect the unknown.  The first step to effective data breach prevention is understanding what types of data the company stores, where it is, what is being done to protect it, and what are the risks if the data is stolen.
  2. Keep only what you need.  Hackers can’t steal what you don’t have.  Take stock of what information the company has and weigh the benefit of keeping the data against the risk of theft.  The company should have a good reason for keeping sensitive information.
  3. Create a written data security policy.  Document the company’s data security procedures and requirements.  This will help confirm that everyone is on the same page and employees are aware of their roles and responsibilities.  Such policies help protect the company in the event of a breach and are required by most state and federal data security laws.
  4. Plan for the inevitable with a detailed breach response plan.  When a data breach occurs, time is of the essence.  The company must quickly act to contain the breach, investigate its cause, and mitigate the damage.  At the same time, state and federal laws require prompt notification to those affected.  A comprehensive breach response plan will allow the company to act accordingly.  A key component of breach response preparedness is having agreements already in place with both legal counsel and a vendor to handle breach diagnostics, correction, and notification.
  5. Hold vendors to the same standards.  Data storage vendors, such as cloud service providers, offer a cost effective alternative to handling everything in-house.  The company must trust that the vendor will properly secure the data.  Vendor contracts should clearly set forth the vendor’s security procedures and each party’s obligations.  Data breach insurance is one way companies can manage the risk involved with vendors.  

While implementing these steps takes time and resources in the short term, they can help safeguard the health of your company for years to come. 

Original
 post can be found here.

Tuesday, December 2, 2014

MassTLC Members Recognized as 'Top Places to Work' by the Boston Globe

Congratulations to the MassTLC members selected as Top Places to Work in the most recent Boston Globe survey!  Numerous MassTLC members appeared among the ranks of the state’s best employers. 
Workers at these companies completed confidential surveys in which they rated their companies on:
  • Direction
  • Execution
  • Connection
  • Management
  • Work
  • Pay and Benefits
  • Engagement

The companies that completed the survey process were separated into four size categories based on number of employees:  small (50-99), medium (100-249), large (250-999) and largest (>1000).  MassTLC member companies were represented in each category. 

The member companies and their rank within each size group are listed below:

SMALL
3.    RunKeeper
17.  iZotope

MEDIUM
10.  NetProspex
32.  Bit9
37.  Fiksu

LARGE
9.    HubSpot
25.  NaviNet

LARGEST
1.   Kronos
6.   athenahealth
11. EMC
21. Comcast

MassTLC is proud to be part of such a strong community of employers and employees!