888.624.6737

syse-blog-header

Systems Engineering

Recent Posts

SECURITY ALERT: Cisco Jabber Desktop and Mobile Client Software Vulnerabilities

March 31, 2021

Systems Engineering is aware of multiple vulnerabilities within Cisco Jabber Client software. These vulnerabilities affect Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for Mobile platforms. Vulnerabilities include:

Read More »

Security Bulletins & Alerts

SECURITY BULLETIN: Qualys Update on Third-Party Security Incident

March 08, 2021

Qualys Cloud Platform is the incident response and breach prevention vendor used at Systems Engineering to perform monthly external vulnerability scan for our customers. Recently, Qualys released a statement relating to a previously identified zero-day exploit in one of their third-party solutions (Accellion FTA).

Read More »

Security Bulletins & Alerts

SECURITY ALERT: Microsoft On-Premises Exchange Server Vulnerabilities

March 03, 2021

UPDATE MARCH 8, 2021

Systems Engineering learned of the Exchange on-premises server vulnerability on Tuesday, March 2nd, and activated our incident response plan.  

Read More »

Security Bulletins & Alerts

SECURITY ALERT: Microsoft Netlogon Enforcement Impact on Unsupported Operating Systems

February 19, 2021

Important information for organizations who have Microsoft Windows Server 2008 Domain Controllers or with unsupported systems.

Read More »

3 Cost-Effective Cybersecurity Tools for Breach Prevention

February 18, 2021

Within the last decade, small to medium-sized businesses (SMB) have embraced cloud technologies. The promises of agility, productivity, resiliency, and scalability are appealing benefits to any business leader. If you were to look around your business today, you may find the cloud touching almost every aspect of it. While cloud technologies offer significant benefits, they also introduce new security risks. This leaves executives searching for effective cybersecurity tools and solutions to reduce chances of a high-priced, high-profile data breach.

Read More »

Cybersecurity

Phishing Tactics That Work!

February 11, 2021

Cybercriminals have small to medium-sized businesses in their crosshairs, and they are using phishing emails to lure them in. The reality is, any organization with sensitive data can be a target for cybercriminals. They have learned to precisely craft their phishing emails to trick spam filters and fool unsuspecting victims into clicking. Once this happens, the cybercriminals have the green light to proceed with their scam. Learn about the types of phishing emails used today and steps your organization can take to reduce the risk of phishing attacks.  

Read More »

Cybersecurity

3 Critical Cybersecurity Strategies To Fight Evolving Cybercrime

February 05, 2021

Cybercrime is a persistent, complex fight against the unseen. Elusive cybercriminals continually hone their hacking skills to target millions of unsuspecting users and exploit their digital weaknesses. They are usually driven by financial gain, and it is predicted that ransomware attacks against businesses will occur every 11 seconds by the end of this year. This estimate doesn't include individual attacks which occur even more frequently (Cybersecurity Ventures). Employing the right cybersecurity strategies to stay ahead of their endless attacks can sometimes feel like the cybersecurity goalpost is moving every second.

Read More »

Cybersecurity