888.624.6737

syse-blog-header

Kent Goodrow

Kent Goodrow, CISO at Systems Engineering, brings 18+ years of experience in IT management and security. As a Certified Information Security, Cyber-AB, and ISC2 professional, Kent prioritizes safeguarding end users, computing ecosystems, client data, and managing organizational risk in the complex cyber landscape.

Recent Posts

Why Technology & Security Committees are Essential for Every Business

August 20, 2024

With digital transformation a necessity, cybersecurity threats accelerating, and compliance requirements evolving, having resources that can tackle the complexities of decision-making and investment for these major issues and initiatives is essential. It can become overwhelming for an executive leader or IT staff to bear the entire burden of making choices that span security, vendor management, and technology adoption.   

Read More »

Business Transformation, Workforce Enablement

What is Password Spraying? Shield Your Business From This Cyber Threat

July 25, 2024

As a business leader, are you aware of the latest cyber threats that could be compromising your company's security? Recently, we have witnessed a surge in a type of cyberattack known as password spraying, where cybercriminals exploit common usernames and passwords to gain unauthorized access.

Read More »

Cybersecurity

How a Dynamic Cloud Security Strategy Keeps You Ahead of the Cybercriminals

July 30, 2021

Does it ever feel like the programs and applications put in place to increase productivity, reduce risk, and control costs evolve and change faster than adoption strategies can occur within your company? In fact, it may even be that productivity decreases, causing costs and risks to increase; the exact opposite of what you are trying to accomplish.

Read More »

Cloud Security

The Microsoft Modern Desktop: Migrating with Confidence

August 27, 2020

In this cloud-centric, accessible-anywhere world of computing, there are many questions around how your staff can access your data and apps to work more productively and securely from anywhere. Traditionally, in-house technologies were used to deploy workstations, manage endpoints, and enforce required security policies. However, what do you do when neither your users nor your data reside within the office? 

Answer: Microsoft Modern Desktop

Read More »

Workforce Enablement