OpenAI's ChatGPT is all over the news and creating a lot of questions. The goal of this blog is to help clarify what this all means, where it's headed, and what cautions you might want to take as an organization responsible for protecting sensitive and personal data.
For years now, multi-factor authentication (MFA) has been at the top of the cybersecurity best practices list. MFA has proven to curb data breaches due to compromised credentials (usernames and passwords), and according to Microsoft, 99.9% of cyber-attacks on company accounts are preventable with properly deployed MFA. This is a statistic no business leader can afford to ignore.
Have you noticed consumer and business sites including mobile applications requiring multiple steps to verify who you are? Perhaps you’ve set up a multi-step verification method to access your bank or personal email account? This security measure is growing in popularity as most data breaches today begin
As a business leader, keeping your sensitive company data secure is a top priority. As your organization adds more security controls, access to applications may become more cumbersome. You and your staff are required to sign-in to multiple systems daily, each has its own set of credentials (usernames and passwords) and authentication methods. It's easy to lose track of credentials, and IT administrators are getting bogged down with password resets in addition to applying security policy enforcement within each of the various applications.
Like many of you, we are working remotely as a company following the declaration of the COVID-19 national emergency. As previously stated, Systems Engineering is well prepared to continue working and supporting our customers during this time. As expected, the morning began with higher than usual support request volume. Many customers began their work from home experiences for the first time, and we were able to get them up and working along with our regularly scheduled services.
When it comes to managing networks, businesses often fall victim to assumptions and oversights. The reality is that the protection of information and applications is always evolving and, as criminals find new ways to exploit weaknesses, it's tough to stay one step ahead.
In 2018, there was 49.8 million tons of e-waste generated worldwide. The US contributed a staggering 10 million tons of this waste, and our share is growing. As environmental and health concerns arise over the ever-increasing e-waste, it is the responsibility of everyone to ensure its proper disposal.