888.624.6737

syse-blog-header

BLOG

How Microsoft Cloud Services Protects Your Data During a Pandemic

April 03, 2020
Systems Engineering has helped many of our customers migrate to the Microsoft Cloud, which now enables a highly distributed workforce, in response to the COVID-19 outbreak. We want to make sure you are aware of Microsoft's stance and preparedness activities specific to COVID-19. Below, Microsoft has detailed a high-level outline of key focus areas.
Read More »

Data Protection

Multi-Factor Authentication: Prevent Unauthorized Access With Stolen Credentials

December 13, 2019

Have you noticed consumer and business sites including mobile applications requiring multiple steps to verify who you are? Perhaps you’ve set-up a multi-step verification method to access your bank or Google email account?  This security measure is growing in popularity as most data breaches today begin with a set of compromised credentials. From financial institutions to online stores to social media sites, many businesses are now requiring multiple factors of verification to ensure a user is who they say they are, reducing the chances of a cybercriminal successfully gaining access to their networks.

Read More »

Data Protection, Compliance, Cybercrime, IT Security

What is Multi-Factor Authentication (MFA) and How does it work?

December 12, 2019

Today, your applications and files are no longer all contained within your four walls. Your staff may work from home or is on the move which means they are accessing your company's data and apps from multiple locations and on multiple devices. To keep your data secure, you need to know who is knocking at the door before you let them in. Your business might require complex passwords, but in reality, your staff is most likely using the same passwords across personal and business accounts, and the cybercriminals know it.

Read More »

Data Protection, Compliance, Cybercrime, IT Security

It's Cyber Monday, So Be Cyber Aware

December 02, 2019

Every year, Cyber Monday brings us incredible deals and discounts; however, it's also the time of year when cybercriminals increase their efforts to steal our money and confidential information. To stay safe while shopping online, keep the following cybersafety tips in mind.

Read More »

Data Protection, Cybercrime, IT Security

Security Bulletin: Remote Desktop Services Vulnerability

August 23, 2019

Microsoft recently announced a pair of Windows 10 Remote Code Execution vulnerabilities, CVE-2019-1181 and CVE-2019-1182. These vulnerabilities allow cybercriminals to obtain remote control of a computer over a network connection. Microsoft discovered the vulnerabilities during routine testing of Windows 10, which allowed them to publish the required security updates and notify the public at the same time.

Read More »

Data Protection, Compliance, IT Security

How to Achieve a Successful and Secure Modern Workplace

July 12, 2019

Cloud-Based Modern Desktop

Many organizational networks are now cloud-based, allowing end users to connect from literally anywhere at any time, and with any device. Businesses who look towards enabling employees with a "Modern Desktop" environment typically want to meet these objectives:

  • Empower staff through collaboration
  • Enable business productivity without interruption
  • Enhance security posture
Read More »

Data Protection, IT Strategy, Collaboration

Cisco IOS XE Software Web UI Command Injection Vulnerability

May 24, 2019

Systems Engineering is paying special attention to a Cisco IOS XE Software Web UI Command Injection Vulnerability that was announced earlier this week. Also known as "ThrangryCat Vulnerability," it is serious enough to get the attention of the press. As quoted on ZDNet, "This vulnerability allows hackers to plant persistent "backdoors" on Cisco gear, even over the Internet, with no physical access to vulnerable devices."

Read More »

Data Protection, IT Security

The Benefits of Breaking the 'Cyberhoarding' Cycle

February 15, 2019

Five years ago, I wrote a blog post that summarized the risks of unmanaged data within IT environments. As a specialist working with Systems Engineering's FileProtect (cloud backup service), I’ve only seen this problem compound. The problem lies in the fact that the majority of businesses haven’t taken on the challenge of cleaning out their proverbial digital junk drawers.

Read More »

Data Protection, Data Management

Five Mistakes Employees Make to Compromise Network Security

January 25, 2019

The 2018 Human Factor report by Proofpoint states that as many as 95% of web-based attacks now incorporate social engineering, or human error factor. So, with that simple fact, how can your organization prevent its employees from releasing confidential and critical information?

Read More »

Encryption, Data Protection, Managed IT, Cybercrime, IT Security

Best Practices to Create a Mobile Device Defense Strategy

October 18, 2018

At Systems Engineering team, we are very conscious about practicing good IT security measures. As such, it's important to remember that protecting confidential data spans from desktops, to the cloud, to mobile devices, and more. 

Read More »

Data Protection, IT Security, Technology Trends