1.888.749.9800

Yearly Archives: 2013

Three Easy Tips to Successfully Tackle Project Management

Many companies get overwhelmed with the scope of large projects. Here are a few tips to make sure you bring in a project on time and in budget:

Simplify the project goals:  Too often companies create projects with multiple, potentially conflicting goals.  Suppose that a company wants to do a technology refresh because the codebase uses an obsolete technology […]

By |December 17th, 2013|Blog|Comments Off on Three Easy Tips to Successfully Tackle Project Management
  • Permalink Gallery

    24/7 Cyber Security: Questions Small Retailers Should Ask an eCommerce Site Provider

24/7 Cyber Security: Questions Small Retailers Should Ask an eCommerce Site Provider

‘Tis the season for scammers – so providing secure commerce capabilities to customers is high on the list of small retailers

By their nature, small retailers don’t have the skills, expertise or infrastructure to provide their own eCommerce capabilities. Knowing that, the key to providing secure commerce capabilities to their customers is using well-known (large) providers that have the […]

By |December 5th, 2013|Blog|Comments Off on 24/7 Cyber Security: Questions Small Retailers Should Ask an eCommerce Site Provider
  • Permalink Gallery

    Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill

Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill

December 4, 2013 — Mobile Fever

As BYOD becomes more acceptable in the workplace, the concerns of IT leaders continue to grow. We interviewed 22 mobility and BYOD experts to provide some pros and cons around implementing and developing an Enterprise Mobility BYOD strategy. (Click here to see comments from other 21 consultants – http://bit.ly/18lWT7y)

Paul B. Hill, Senior Consultant, SystemsExperts

Paul B. […]

By |December 4th, 2013|News & Events|Comments Off on Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill
  • Permalink Gallery

    A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill

A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill

November 26, 2013 — LINUX Insider

Chrome or Chromium more secure? Numerous security experts place their bets on Chromium, suggested Paul Hill, a senior consultant at SystemsExperts. “Chrome’s code has to be able to tie into Flash Player, for instance,” Hill explained. “So more code is involved to integrate with other third-party products. This all introduces more complexities and more […]

By |December 3rd, 2013|News & Events|Comments Off on A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill

Lost or Stolen Device?

Why You Should Install Mobile Device Management Software

Polls of corporate security professionals consistently show that the simplest problem is also the worst problem in the BYOD world: Lost or stolen devices (in concert with weak or nonexistent unlock codes). Anyone can have their phone stolen. Most people are unwilling to create and use large and complex passcodes […]

By |November 7th, 2013|Blog|Comments Off on Lost or Stolen Device?

Common mistakes in IT security risk assessments

ICS-risk-assessment2Dark Reading put together an article focused on common mistakes organizations make when running IT security risk assessments.  Included below was my response and the Dark Reading article is posted here.

  • Trying to do too much.  One of the most common mistakes is trying […]
By |October 21st, 2013|Blog|Comments Off on Common mistakes in IT security risk assessments
  • Permalink Gallery

    10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson

10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson

October 17, 2013 — Dark Reading

As IT organizations seek to make better risk-based decisions about security practices, perhaps the No. 1 component for success is the IT risk assessment. However, even when organizations actually conduct a risk assessment, they frequently fall prey to mistakes that can greatly devalue the exercise. Here are some of the most common blunders to […]

By |October 18th, 2013|News & Events|Comments Off on 10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson
  • Permalink Gallery

    Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

October 2013 — SearchHealthIT – TechTarget

Affordable Care Act implementation continues, despite some major obstacles: a government shutdown, deep political opposition to the ACA, and a rocky start to the first week of enrollment for its health insurance exchanges (because of initial crashes of the main federal website and ongoing technical glitches causing delays and user-authentication problems).

Mandated by the ACA, […]

By |October 17th, 2013|News & Events|Comments Off on Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

Control of USB Storage Devices

USB storage devices are a convenient mechanism for users to store data locally or transport data from one system to another.  USB storage devices may include memory sticks, portable hard disks, smartphones, cameras, media players, and even auxiliary displays.

Historically some USB storage devices have contained autorun executable malicious code.  If an employee can be enticed to insert a USB […]

By |October 3rd, 2013|Blog|Comments Off on Control of USB Storage Devices

Defcon21 – Attended by Alex Chaveriat

August 2, 2013, 9:30 AM

CTP Comptition area (section 6), Rio Hotel, Las Vegas, NV
Alex Chaveriat , SystemExperts Consultant, featured speaker – Topic: “Packet Pwning”

By |August 2nd, 2013|News & Events|Comments Off on Defcon21 – Attended by Alex Chaveriat
  • Permalink Gallery

    10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

August 1, 2013 — InformationWeek

The BYOD, or bring your own device, phenomenon is taking businesses by storm — and sometimes by surprise. But higher-ed IT departments have been dealing with BYOD for years now. In fact, they have a thing or two to teach the business world about effectively managing and securing an ever-changing mix of user-owned devices.

By |August 1st, 2013|News & Events|Comments Off on 10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

Mobile Devices: Do you know where your data is?

Most companies have policies that restrict what applications employees can install on desktops and laptops. Also, most companies have implemented technology controls to help enforce such policies.

Fewer companies have implemented similar controls on company owned mobile devices. Within companies that have adopted a Bring Your Own Device (BYOD) strategy for mobile devices, only a small percentage have created documented […]

By |July 15th, 2013|Blog|Comments Off on Mobile Devices: Do you know where your data is?

6 Apps Your IT Guy Hates – Commentary by Paul Hill

June 24, 2013 — Inc.

Do you count on these apps for everyday business tasks? Maybe you shouldn’t.

The amazing thing about mobile apps, cloud storage, and living on the Web is that information is always at your fingertips. Unfortunately, often that means your data is not far from hackers’ fingertips as well.

Here’s a round-up of the high-risk apps that could […]

By |June 24th, 2013|News & Events|Comments Off on 6 Apps Your IT Guy Hates – Commentary by Paul Hill

The first simple steps for Mobile Device Security

Many of our customers have mature security programs that address mobile devices with a wide range of controls.  However, many small businesses don’t have fully developed security policies and are trying to determine what first steps are the most practical that they can take to secure their mobile devices.
The two most basic and most repeated steps to secure data […]

By |June 17th, 2013|Blog|Comments Off on The first simple steps for Mobile Device Security
  • Permalink Gallery

    How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel

How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel

May 10, 2013 — SurgicalAesthetics

Medical practices across the nation are increasingly using digital tools to track patient health records, communicate with patients and collaborate across clinical specialties. But with the rewards of convenience and efficiency come the threats of potentially compromising patients’ privacy and exposing sensitive data to hackers or identity thieves.

Digitization is a fast-growing trend. About 30% of […]

By |May 10th, 2013|News & Events|Comments Off on How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel