Microsoft recently announced a pair of Windows 10 Remote Code Execution vulnerabilities, CVE-2019-1181 and CVE-2019-1182. These vulnerabilities allow cybercriminals to obtain remote control of a computer over a network connection. Microsoft discovered the vulnerabilities during routine testing of Windows 10, which allowed them to publish the required security updates and notify the public at the same time.
Business networks are changing rapidly every day - mobility, the cloud, and the Internet of Things (IoT) are creating this phenomenon that is causing companies to reevaluate efficiencies and security. As a result of these network design requirements, SD-WAN (Software-Defined Wide Area Network) is a great fit as it provides a dynamic control of the WAN for the end-user. In this blog article, I will go over the high-level basics of an SD-WAN which is quickly becoming a game changer for businesses everywhere.
Most employees want to be productive. As cloud service consumers, we have become accustomed to finding a tool or app that will help us fill a need and simply buy it without obtaining approval from our organization first. This practice of employees bypassing IT management to procure tools and services without proper vetting has infiltrated the workplace and is known as Shadow IT.
Cloud, Data Management, Compliance, IT Security, Digital Transformation
Trends in Information Technology are continuously changing and, as a result, organizations are having to adapt to those changes. Let's look at the most prominent IT trends that are showing up today.
Cloud, Data Points, Data Management, IT Strategy, IT Security, Technology Trends
I spent a lot of time early in my career solving complicated problems related to security. In the late 1990's, I consulted as a civilian for the NSA to help automate the 'need-to-know' access of their internal web infrastructure and documentation. I followed that with some time as a Reserve Information Operations Officer for the U.S. Army, and then working for financial services companies including VISA during the birth of the PCI standards. Needless to say, the security field is one with overwhelming depth and it can be challenging for companies to make an iterative, incremental plan to become more secure.
Cloud-Based Modern Desktop
Many organizational networks are now cloud-based, allowing end users to connect from literally anywhere at any time, and with any device. Businesses who look towards enabling employees with a "Modern Desktop" environment typically want to meet these objectives:
- Empower staff through collaboration
- Enable business productivity without interruption
- Enhance security posture
Systems Engineering has a long history with the University of Southern Maine (USM), particularly in support of workforce development within the realm of technology and STEM. As such, the company elected to donate $10,000 to support scholarships for Maine students majoring in Information Technology and related fields.
Today, most businesses have some form of a wireless network in place. Aside from being convenient for employees with mobile devices looking to access the internet, wireless access is imperative for businesses whose employees regularly move throughout the office.
Each month, employees at Systems Engineering have the opportunity to wear jeans and contribute money towards a designated non-profit organization. All contributions are 100% matched by the company.
It seems like just yesterday that we wished our 2018 interns "good luck" before sending them off to their final year of school, and yet, here we are welcoming in a new class of interns. Our 2019 program includes five members joining us from a variety of schools including University of Southern Maine, University of Maine, Lehigh University, and the University of Alabama.