888.624.6737

syse-blog-header

Kent Goodrow

Kent Goodrow, CISO at Systems Engineering, brings 18+ years of experience in IT management and security. As a Certified Information Security, Cyber-AB, and ISC2 professional, Kent prioritizes safeguarding end users, computing ecosystems, client data, and managing organizational risk in the complex cyber landscape.

Recent Posts

CMMC Compliance: Your Role In a Critical National Security Initiative

January 30, 2025
 

It can often feel like compliance requirements such as theCybersecurity Maturity Model Certification (CMMC)are just another burden - a chore that pulls resources away from day-to-day business operations. It’s easy to lose sight of why these initiatives matter. However, the reality is that CMMC compliance is far more than a regulatory hurdle; it’s a critical opportunity to make your entire business more secure. By addressing compliance requirements, organizations meet DoD standards and mitigate traditional cybersecurity risks that threaten their operations. It’s a win-win: protecting sensitive information while strengthening overall resilience.

Read More »

Compliance

AI-Powered Brute Force Attacks: A Growing Threat

January 13, 2025

It's no surprise that AI is transforming the cybersecurity landscape, but its role in amplifying brute-force attacks deserves closer attention. Brute-force attacks have long been a cybersecurity concern, where cybercriminals try to gain unauthorized access to systems, accounts, or sensitive data by systematically trying every possible combination of usernames and passwords.

Read More »

Artificial Intelligence

SECURITY PSA: AI-Powered Scams are on the Rise

December 17, 2024

In today's digital landscape, criminals are becoming increasingly sophisticated, using artificial intelligence (AI) to create convincing scams that are harder than ever to detect. From realistic fake messages to deepfake videos, these AI-driven tactics are designed to deceive and exploit both individuals and businesses. Staying informed and proactive is essential to safeguarding yourself and your organization from these escalating threats. In this blog, we'll explore AI-powered scams and share practical steps you can take to protect your personal and professional security.

Read More »

Artificial Intelligence

Why Technology & Security Committees are Essential for Every Business

August 20, 2024

With digital transformation a necessity, cybersecurity threats accelerating, and compliance requirements evolving, having resources that can tackle the complexities of decision-making and investment for these major issues and initiatives is essential. It can become overwhelming for an executive leader or IT staff to bear the entire burden of making choices that span security, vendor management, and technology adoption.   

Read More »

Business Transformation, Workforce Enablement

What is Password Spraying? Shield Your Business From This Cyber Threat

July 25, 2024

As a business leader, are you aware of the latest cyber threats that could be compromising your company's security? Recently, we have witnessed a surge in a type of cyberattack known as password spraying, where cybercriminals exploit common usernames and passwords to gain unauthorized access.

Read More »

Cybersecurity

How a Dynamic Cloud Security Strategy Keeps You Ahead of the Cybercriminals

July 30, 2021

Does it ever feel like the programs and applications put in place to increase productivity, reduce risk, and control costs evolve and change faster than adoption strategies can occur within your company? In fact, it may even be that productivity decreases, causing costs and risks to increase; the exact opposite of what you are trying to accomplish.

Read More »

Cloud Security

The Microsoft Modern Desktop: Migrating with Confidence

August 27, 2020

In this cloud-centric, accessible-anywhere world of computing, there are many questions around how your staff can access your data and apps to work more productively and securely from anywhere. Traditionally, in-house technologies were used to deploy workstations, manage endpoints, and enforce required security policies. However, what do you do when neither your users nor your data reside within the office? 

Answer: Microsoft Modern Desktop

Read More »

Workforce Enablement