syse-blog-header

BLOG

Five Mistakes Employees Make to Compromise Network Security

January 25, 2019

The 2018 Human Factor report by Proofpoint states that as many as 95% of web-based attacks now incorporate social engineering, or human error factor. So, with that simple fact, how can your organization prevent its employees from releasing confidential and critical information?

Read More »

Encryption, Data Protection, Managed IT, Cybercrime, IT Security

Five IT Best Practices for Organizations to Consider

August 17, 2018

When it comes to security risks and errors, businesses often fall victim to assumptions and oversights. The reality is that the protection of information and applications is always evolving and, as criminals find new ways to exploit weaknesses, it's tough to stay one step ahead.

Read More »

Encryption, Data Protection, Cybercrime, IT Security

Email: To Trust, or Not to Trust?

December 01, 2017

Has anyone at your organization ever received an email that was not what they thought it would be? Maybe it was a message from a vendor looking to verify sensitive account information; a message from an accountant sending completed tax returns in the month of August; or, a note from what appears to be your accounting firm indicating they need you to confirm Social Security Numbers in order to send employee paychecks? 

Read More »

Encryption, Data Protection, Cybercrime, IT Security

SE Lunch & Learn Infographic: Risk Management in the Era of Ransomware

January 29, 2016

Systems Engineering's recent Lunch & Learn titled Risk Management in the Era of Ransomware, took place in three locations on three various dates. SE presenters, Joe McIntyre and Alan Damon, discussed how vulnerable businesses are to ransomware over a natural disaster. No matter what the cause or the suspect, business data continually plays the role of victim.  So, what are businesses doing to backup and recover the data that is imperative to their survival? 

Read More »

Business Continuity, Systems Engineering Events, Encryption, Data Protection, Data Management

BYOD, MDM, and EMM Demystified

October 02, 2015

It’s no revelation that the age of Bring-Your-Own-Device (BYOD) computing is here and has been for some time. Whether it's with a smart phone, tablet, or smart watch, BYOD is a convenient way for today's workforce to stay connected. Recent surveys show that BYOD adoption, as a business tool, presents a company as more attractive and a "must-have" for millennial-generation job applicants.  

Read More »

Encryption, Managed IT, Network Design & Implementation, Cybercrime, IT Security

Wait a minute, this isn't Windows 10

August 14, 2015

At the risk of giving undeserved kudos, I am going to write it: phishers are clever and tenacious.

On July 29, Microsoft released its latest generation of Windows operating systems, Windows 10. Within days, Internet security bodies such as the Cisco Talos Group began detecting prevalent propagation of CTB-Locker (a variant of the CryptoLocker ransomware virus) targeting users of Windows 7 and 8, crafted to look like the free Windows 10 upgrade. Often delivered by email messages containing .ZIP attachments, the virus encrypts the user’s personal files and demands a ransom to make them usable again.

Read More »

Help Desk, Encryption, Cybercrime, IT Security

Cloud-based Capabilities and More

May 28, 2015

A typical office in 1995, with PC's and email, might have looked very sophisticated to your mother who was used to working with typewriters and physical mailboxes in 1975. In the same cyclical pattern, the office we see in 2015 is not like that of 1995. We now have to consider working from several devices no matter where we are, and access to everything is of utter importance.

Read More »

Business Continuity, Cloud, Encryption, IT Consulting, Data Protection, Data Management, IT Security