syse-blog-header

BLOG

Mark Benton

Recent Posts

Multi-Factor Authentication: Prevent Unauthorized Access With Stolen Credentials

December 13, 2019

Have you noticed consumer and business sites including mobile applications requiring multiple steps to verify who you are? Perhaps you’ve set-up a multi-step verification method to access your bank or Google email account?  This security measure is growing in popularity as most data breaches today begin with a set of compromised credentials. From financial institutions to online stores to social media sites, many businesses are now requiring multiple factors of verification to ensure a user is who they say they are, reducing the chances of a cybercriminal successfully gaining access to their networks.

Read More »

Data Protection, Compliance, Cybercrime, IT Security

Disposing of E-waste Securely and Responsibly

October 21, 2019

In 2018, there was 49.8 million tons of e-waste generated worldwide. The US contributed a staggering 10 million tons of this waste, and our share is growing. As environmental and health concerns arise over the ever-increasing e-waste, it is the responsibility of everyone to ensure its proper disposal.

Read More »

General, IT Consulting, Compliance, IT Security, Technology Trends

New Microsoft Customer Agreement

October 08, 2019

This month, Microsoft began the transition to a new customer agreement, which replaces the core terms for all Microsoft customers. Their goal is to improve the purchase experience to better support all customers. They also had some important security-related reasons for the change, including;

Read More »

General, Cloud

Security Bulletin: Remote Desktop Services Vulnerability

August 23, 2019

Microsoft recently announced a pair of Windows 10 Remote Code Execution vulnerabilities, CVE-2019-1181 and CVE-2019-1182. These vulnerabilities allow cybercriminals to obtain remote control of a computer over a network connection. Microsoft discovered the vulnerabilities during routine testing of Windows 10, which allowed them to publish the required security updates and notify the public at the same time.

Read More »

Data Protection, Compliance, IT Security

FDIC Issues Advisory on Technology Service Provider Contracts

April 18, 2019

On Tuesday, April 2, the FDIC issued an advisory letter to banks on Technology Service Provider Contracts. The letter speaks to gaps that examiners are seeing in contracts between banks and their technology service providers.

Read More »

IT Consulting, IT Strategy

The Changing Nature of Microsoft Office 365

February 01, 2019

When organizations decide to move data to the cloud, there are several benefits including cost efficiency and time savings. Consistent and frequent updates to make usability easier and friendlier is yet another benefit. For those organizations that have adopted Microsoft Office 365, (or better yet Microsoft 365, a.k.a. 'Modern Desktop') for example, you might have noticed that once a login occurs, the default page seen now is Office.comAs such, Microsoft announced the following explanation earlier this week:

Read More »

Cloud, Technology Trends, Collaboration, Digital Transformation

Five Mistakes Employees Make to Compromise Network Security

January 25, 2019

The 2018 Human Factor report by Proofpoint states that as many as 95% of web-based attacks now incorporate social engineering, or human error factor. So, with that simple fact, how can your organization prevent its employees from releasing confidential and critical information?

Read More »

Encryption, Data Protection, Managed IT, Cybercrime, IT Security

Technology End-Of-Life/Support Events Lead SMBs to The Cloud

December 27, 2018

In the coming year, how will your organization be less vulnerable to security threats, remain in compliance, and continue to receive the latest product support?

Quick answer: Upgrade.

Review the chart below and ensure that your Microsoft products are not about to expire. The chart quickly points out some significant end-of-life/support dates that are on the horizon for some of the more popular Microsoft products, including Windows 7, Exchange 2010, and Office 2010. 

It seems these dates are far out, but in reality, upgrade discussions should begin now in order to prepare appropriately. By applying upgrades before products fall out of support, your business will be less vulnerable to security threats, remain in compliance, and continue to receive the latest product support.

Read More »

Cloud, Data Points, IT Strategy

3 Cost Effective Cybersecurity Tools Your Business Shouldn't Be Without in 2019

October 05, 2018

Assuming you have your network security basics in place, there are a few cybersecurity solutions that are relatively inexpensive that many businesses have yet to include in their cybersecurity war chest. These tools help you stay ahead of the cyber criminals and provide additional protection to reduce your business' chance of a breach. If you do nothing else with your cybersecurity strategy in 2019, be sure to put these security safeguards in your budgets this fall as they will provide tremendous value for the investment:

Read More »

Data Points, IT Security

Five IT Best Practices for Organizations to Consider

August 17, 2018

When it comes to security risks and errors, businesses often fall victim to assumptions and oversights. The reality is that the protection of information and applications is always evolving and, as criminals find new ways to exploit weaknesses, it's tough to stay one step ahead.

Read More »

Encryption, Data Protection, Cybercrime, IT Security