Systems Engineering is aware of the vulnerability affecting customers with Fortinet Firewalls who are using an SSL VPN (Secure Sockets Layers Virtual Private Network) to connect to their offices remotely. This vulnerability utilizes an improper limitation of a pathname to a restricted directory ("path traversal") in multiple Fortinet OS versions under the SSL VPN web portal.
At Systems Engineering, we tend to stay under the radar. Focusing on our craft, our clients, our culture, and our community is how we spend our energy. On a daily basis, I am humbled by the passion and capabilities our employee-owners bring to their profession.
PORTLAND, Maine — August 27, 2019 — Systems Engineering announced today it has been named one of the 2019 Best Places to Work in Maine – marking the sixth consecutive year the IT company has been honored for its commitment to maintaining a high level of employee satisfaction. Systems Engineering will be recognized at the Best Places to Work in Maine awards ceremony on October 2, 2019.
Microsoft recently announced a pair of Windows 10 Remote Code Execution vulnerabilities, CVE-2019-1181 and CVE-2019-1182. These vulnerabilities allow cybercriminals to obtain remote control of a computer over a network connection. Microsoft discovered the vulnerabilities during routine testing of Windows 10, which allowed them to publish the required security updates and notify the public at the same time.
Business networks are changing rapidly every day - mobility, the cloud, and the Internet of Things (IoT) are creating this phenomenon that is causing companies to reevaluate efficiencies and security. As a result of these network design requirements, SD-WAN (Software-Defined Wide Area Network) is a great fit as it provides a dynamic control of the WAN for the end user. In this blog article, I will go over the high-level basics of an SD-WAN which is quickly becoming a game changer for businesses everywhere.
Most employees want to be productive. As cloud service consumers, we have become accustomed to finding a tool or app that will help us fill a need and simply buy it without obtaining approval from our organization first. This practice of employees bypassing IT management to procure tools and services without proper vetting has infiltrated the workplace and is known as Shadow IT.
Trends in Information Technology are continuously changing and, as a result, organizations are having to adapt to those changes. Let's look at the most prominent IT trends that are showing up today.
I spent a lot of time early in my career solving complicated problems related to security. In the late 1990's, I consulted as a civilian for the NSA to help automate the 'need-to-know' access of their internal web infrastructure and documentation. I followed that with some time as a Reserve Information Operations Officer for the U.S. Army, and then working for financial services companies including VISA during the birth of the PCI standards. Needless to say, the security field is one with overwhelming depth and it can be challenging for companies to make an iterative, incremental plan to become more secure.
Cloud-Based Modern Desktop
Many organizational networks are now cloud-based, allowing end users to connect from literally anywhere at any time, and with any device. Businesses who look towards enabling employees with a "Modern Desktop" environment typically want to meet these objectives:
- Empower staff through collaboration
- Enable business productivity without interruption
- Enhance security posture
Systems Engineering has a long history with the University of Southern Maine (USM), particularly in support of workforce development within the realm of technology and STEM. As such, the company elected to donate $10,000 to support scholarships for Maine students majoring in Information Technology and related fields.