888.624.6737

syse-blog-header

Systems Engineering Announces Security Operations Partnership with Arctic Wolf

September 08, 2022

Systems Engineering SE EventWatch Powered by the Arctic Wolf Security Operations Cloud Now Provides Clients Industry-Leading Cybersecurity Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks.

Read More »

Announcements

SECURITY ALERT: VMware Tools local privilege escalation vulnerability

August 26, 2022

On Tuesday, August 23, an advisory notification was released by VMware, the virtualization technology software firm, announcing a local privilege escalation vulnerability (CVE-2022-31676). Updates are available to remediate this vulnerability in affected VMware products.

Read More »

Security Bulletins & Alerts

Is Your Backup and Restore Strategy Putting Data at Risk?

August 01, 2022

Backing up your critical data should be a fundamental part of every data protection strategy. With ransomware breaches and recovery costs nearly doubling over the last year, at 66% up from 37% and $1.85M up from $760K respectively, organizations cited data backups as the #1 method used to restore compromised data.

Read More »

Cybersecurity, IT Solutions & Support, Cloud Security

Critical Reasons You Must Enable Multi-Factor Authentication (MFA)

July 28, 2022

For years now, multi-factor authentication (MFA) has been at the top of the cybersecurity best practices list. MFA has proven to curb data breaches due to compromised credentials (usernames and passwords), and according to Microsoft, 99.9% of cyber-attacks on company accounts are preventable with properly deployed MFA. This is a statistic no business leader can afford to ignore.

Read More »

Cybersecurity, Cloud Security

SECURITY BULLETIN: Mitel MiConnect VOIP Zero-Day Vulnerability

June 28, 2022

Several cybersecurity research groups have identified and studied the use of a Zero-Day vulnerability found in the Mitel VoIP MiConnect solution, CVE-2022-29499. The vulnerability exists due to improper input validation in the Mitel Service Appliance. A cyberattacker can send a specially crafted HTTP GET request to the application and execute arbitrary Operating System commands on the target system. Successful exploitation of this flaw may result in the complete compromise of the vulnerable system. This vulnerability has been successfully exploited by at least one ransomware group.

Read More »

Security Bulletins & Alerts

Data Breach: 5 Critical Questions Answered

June 13, 2022

Since 2008, Verizon has released its annual Data Breach Investigations Report (DBIR). This is a data-driven report on threats your organization may encounter in regard to cybercrime. The threats identified are the most common tactics used against organizations that resulted in a data breach.

Read More »

Cybersecurity

5 Qualities of a Reliable Cloud Migration Partner

May 05, 2022

Have you decided to relocate some or all of your organization's infrastructure to a cloud services provider (CSP) such as Microsoft, Google, or Amazon? If so, the next step is to consider who will serve as your cloud migration partner. The right consultant can get you to the cloud securely and cost-effectively while enhancing performance. But ... not all cloud migration partners are created equal.

Read More »

Business Transformation, IT Solutions & Support