PORTLAND, Maine — September 2020 — Systems Engineering has recently been named one of the 2020 Best Places to Work in Maine. This marks the seventh consecutive year the company has been honored for its commitment to maintaining a high level of employee satisfaction. For the first time, the final ranking of winners will be released in the October 19th edition of MaineBiz.
On Friday, September 18, 2020, Homeland Security Cybersecurity & Infrastructure Security Department issued an Emergency Directive regarding the Windows Server Netlogon Elevation of Privilege Vulnerability This Windows server operating system vulnerability could allow a cyber attacker to gain access to your Domain Controller (authentication server). From there, the attacker can give themselves administrative privileges for your network, start to run malicious software, and exfiltrate sensitive data.
Office 2010 will reach end-of-support on October 13, 2020. After this date, Microsoft will no longer provide technical support, bug fixes, or security updates for Office 2010. You will be able to continue using this version of Office, but by upgrading before any product falls out of support your business minimizes risks, including reducing exposure to security threats, remaining in compliance, and continuing to receive the latest product updates and support.
Now more than ever your employees are working on personal devices. A recent Microsoft study reported that 67% of people use personal devices in the workplace. Tasks such as sending emails, reviewing documents, accessing applications, and other business productivity actions are performed on personal devices daily. Employees work on their own devices as a matter of convenience and, for the business, the productivity benefits are appealing. Be informed about the benefits and risks of this growing trend, and learn how you can manage and secure your sensitive company data.
As a business leader, keeping your sensitive company data secure is a top priority. As your organization adds more security controls, access to applications may have become more cumbersome. You and your staff are required to sign-in to multiple systems daily, each has its own set of credentials (usernames and passwords) and authentication methods. It's easy to lose track of credentials, and IT administrators are getting bogged down with password resets in addition to applying security policy enforcement within each of the various applications.
UPDATED SEPTEMBER 2020
Current events have forced many businesses into quickly enabling staff to work from anywhere at any time. Desktops were replaced by laptops that could be taken home, staff using personal devices to access company data, and quick adoption of cloud and mobile apps. The ability to keep your business running took precedence over strategic planning, and now is the time to enable your remote workforce to be productive and secure. This mobile workforce evolution comes with many benefits, but if it’s not approached with careful thought and planning, it can also come with a unacceptable level of risk.
There comes a time in every business when the introduction of new technology is required. You know that the change is needed and will likely bring added productivity or cost saving with it. What you are trying to work out is WHEN this change could happen. You are aware that this could be a disruptive project for you and your staff and there never seems to be a good time. When thinking about implementing a new project, there are considerations every business leader needs to know.
UPDATED AUGUST 2020
In this cloud-centric, accessible-anywhere world of computing, there are many questions around how your staff can access your data and apps to work more productively and securely from anywhere. Traditionally, in-house technologies were used to deploy workstations, manage endpoints, and enforce required security policies. However, what do you do when neither your users nor your data reside within the office?
Answer: Modern Desktop
Has your small and medium-sized business (SMB) moved to the cloud, but not enabled Multi-Factor Authentication (MFA)? This tool is a proven game-changer for data security in the fast-growing shift to remote work. So why do statistics show that enforcing MFA within organizations is very low? MFA is part of your cloud services and simply needs to be enabled and enforced to provide secure end-user access to your corporate data. Here is a look at some revealing statistics that show just how important enabling MFA has become to keep the cybercriminals out of your network.
The FBI recently released a private industry notification (PIN) warning businesses about the increase in end-of-life attacks. "The FBI has observed cybercriminals targeting computer network infrastructures after an operating system achieves end-of-life status," the bureau said.