What is a SOC 2 Compliance Report and Why it Matters to Your Business

December 11, 2020

Have you ever questioned how you can measure the quality of a managed service provider (MSP), and their stance on security. Do they put security first within their own organization? Well, the good news is a reputable MSP can answer this question by producing an impartial 3rd party SOC 2 Compliance audit!  Take a look at what is involved in this voluntary annual review, and how the results can be an invaluable piece of information for leveling up trust within an MSP.

Read More »

Compliance, IT Solutions & Support

Disposing of E-waste Securely and Responsibly

October 21, 2019

In 2018, there was 49.8 million tons of e-waste generated worldwide. The US contributed a staggering 10 million tons of this waste, and our share is growing. As environmental and health concerns arise over the ever-increasing e-waste, it is the responsibility of everyone to ensure its proper disposal.

Read More »

Compliance, IT Solutions & Support

SE CleanMail has you covered.

March 17, 2017

Email can work for you, and it can be used against you. On the positive side, it's a tool that allows organizations to collaborate, communicate, and save time.

On the negative side, cybercriminals are savvy enough to use it as a weapon to send phishing and spear-phishing emails to unsuspecting recipients allowing confidential data to be exposed and money to be stolen.  

Read More »

Business Transformation, Compliance

Guest Blog: How to Read a SOC Examination Report

November 30, 2016

Many organizations include the review of Service Organization Controls (SOC) examination reports in their annual vendor due diligence activities; however, most are unsure of what they should be looking for in the report.  Determining what is relevant and knowing how to read a SOC examination report can help to ensure that organizations get the most value and assurance out of their review.

Read More »


SE Guest Blog: Information Security Officer - It's not just a cool title

November 04, 2016

The role of the Information Security Officer (ISO) varies based on the size and complexity of an organization. It may be a full or part-time position held by an employee having only ISO responsibilities or by an employee having other roles within the organization. A primary role of the ISO is to work with management to strengthen its information security program and to protect the organization’s information assets.

Read More »


SE Lunch & Learn Recap:  Information Security Evolution and the Modern Network

October 07, 2015

Systems Engineering’s (SE) Lunch & Learn "Information Security Evolution and the Modern Network" was recently held in Bangor and Portland, ME and Nashua, NH.  This event covered cybersecurity, its current state, how threat intelligence has grown, and an overview of the evolving layers of security. 

Read More »

Security Bulletins & Alerts, Compliance, IT Solutions & Support

The Good, the Bad, and the Ugly of Information Lifecycle Management

July 24, 2015

Six years ago, your business might have had 400 gigabytes (GB) of data stored on the network. Maybe two-thirds of that was actual business data comprised of files, vertical application data, and email. The rest was overhead. 

Read More »

Business Transformation, Compliance, IT Solutions & Support