For years now, multi-factor authentication (MFA) has been at the top of cybersecurity best practice lists. MFA has proven to curb data breaches due to compromised credentials (usernames and passwords). According to Microsoft, 99.9% of cyber-attacks on company accounts are preventable with properly deployed MFA. It's a statistic no business leader can afford to ignore.
PORTLAND, Maine — May 19, 2020 — Systems Engineering announced today that, for the second year in a row, it has received a Best Wellness Employer Gold certification. This 2020 award was presented by Wellness Workdays, a leading provider of corporate wellness programs that developed the program with experts from Harvard Medical School to advance the field of worksite wellness. The data and research driven program recognizes the significant achievements of employers that are dedicated to improving employee health and well-being in innovative and meaningful ways.
As we all can feel, there are many pressures on families and individuals these days. This is especially true for military members returning to civilian life. Service to their country is coming to an end, and a new set of challenges is set to begin. One former Air Force veteran, Dave Hickey of West Gardiner, ME, lived through those challenges. The personal pressures he experienced upon returning home inspired a noble decision. Dave determined he would help make that transition a bit easier for other returning veterans.
Cisco released a collection of 12 Security Advisories for Cisco Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD), and Firepower Management Center (FMC) software. The collection includes High Risk Vulnerabilities that could give an attacker unauthenticated access to the affected device’s file system. This vulnerability can also cause a Denial of Service (DoS). This means a firewall would be incapable of passing through internet traffic and require a system reboot.
The prevalence of video conferencing is changing the way we conduct business. As we adapt to this new meeting practice, cybercriminals are adapting as well. The recent surge in use of cloud-based video conferencing technologies creates opportunities for cybercriminals to reengineer their phishing tactics.
What if I told you that now is the best time to recruit top talent? You don't even need to invest in more hiring platforms or third-party services to do it. Despite the pandemic, Systems Engineering is continuing our recruitment efforts. We wanted to share our five most effective and low-resource recruitment strategies with you.
For many businesses today, the programs and applications used to increase productivity, reduce risk, and control costs are evolving faster than adoption strategies can occur. When this happens, productivity may decrease, while costs and risks may increase; the exact opposite of what they are trying to accomplish.
Beginning in July 2020, Systems Engineering will adopt a new help desk process to enhance customer service and respond to recent client feedback. We have been collecting customer responses since early January through a closed ticket customer satisfaction survey. This survey gives our customers the opportunity to provide positive, negative, or neutral feedback regarding our service, and any suggestions they may want to put forward.
Due to the COVID-19 pandemic, most school districts have moved to remote learning, leaving many disadvantaged families without means to stay connected and informed. Access to personal computers and internet service are critical for students to continue remote education. To respond to this unprecedented need in the community, Systems Engineering is stepping up our longtime partnership with PCs for Maine (now known as give IT. get IT.) Together, we have embarked on an ambitious plan to provide low-cost or no-cost laptops and desktops to disadvantaged families across the state of Maine.
Every morning we log on to our corporate email and begin the day sifting through a myriad of emails, most of which are equally important and needing action. Likely, you haven't even finished your first cup of coffee and not focused on the cybercriminal who is hoping you will respond to their highly sophisticated phishing email waiting in your Inbox. So how do you recognize and react to the myriad of fake emails coming at you multiple times a day?