1.888.749.9800

Yearly Archives: 2015

  • Permalink Gallery

    Windows Hello Biometrics: how well do the security options work, what to look out for and when are they appropriate

Windows Hello Biometrics: how well do the security options work, what to look out for and when are they appropriate

Many security pundits have been saying passwords must go for years, and biometrics are an alternative to passwords, but not all security professionals believe biometrics are the best alternative to passwords.

Microsoft Windows 10 provides native support of biometric authentication and as result many people are  making a new look […]

By |December 14th, 2015|Blog|Comments Off on Windows Hello Biometrics: how well do the security options work, what to look out for and when are they appropriate

IT Security Industry Predictions for 2016

While it is impossible to predict the future (since I don’t really have a crystal ball) I can offer the following predictions for security trends to watch for in 2016:

  • We will continue to witness large scale data breaches that could have been prevented if only well established security practices had actually been applied.
  • Companies […]
By |December 3rd, 2015|Blog|Comments Off on IT Security Industry Predictions for 2016

Security compliance: How much is enough?

by Michael O’Dwyer, contributor, The PULSE of IT, November 23, 2015

Excerpt: Businesses should take baby steps when it comes to security compliance, starting with a security standard that is easier to comply with, like the ISO/IEC 27002, which deals with end-to-end security.

“It is easy to understand, and it is up to the company to determine the level of detail. […]

By |November 30th, 2015|News & Events, PCI Compliance, Uncategorized|Comments Off on Security compliance: How much is enough?

Kudos to Alex!

It is not in our nature to brag – and doing security work means that we can’t talk about our best achievements. 

However, when one of our own accomplishes the impossible, I have to let people know.

In 2014, Alex Chaveriat won the prestigious DEF CON Black Badge by coming in first place […]

By |November 4th, 2015|Blog|Comments Off on Kudos to Alex!

BYOD Security and the Mobile Market

BYOD security is a frequent topic among IT security experts. This, my third BYOD post this year, focuses on the mobile market. (Post one, Always-on Access Brings Always-Threatening Security Risks, June 25, 2015; Post two, Device Settings that Help Prevent Unauthorized Information Disclosure, July 13, 2015.)

The mobile market continues to be […]

By |November 3rd, 2015|Blog, BYOD|Comments Off on BYOD Security and the Mobile Market

Identity and Access Management – All access pass

An SC Magazine eBook Publication – Identity Access Management, by Karen Epper Hoffman, October 2015

Security executives are looking beyond basic user name and password to secure access to the enterprise, which is becoming more complicated with remote access, cloud services and personal devices.

Knowing who is on your network and able to access your information and resources is arguably the basic foundation on which good enterprise […]

By |October 30th, 2015|News & Events|Comments Off on Identity and Access Management – All access pass
  • Permalink Gallery

    Data Loss Prevention (DLP) Technology is Maturing along with Customer Expectations

Data Loss Prevention (DLP) Technology is Maturing along with Customer Expectations

The following post on DLP is the combined effort of Joe Clapp and Paul Hill in response to a media query asking experts to weigh in on where they see the data loss prevention market going in 2016 and beyond.

The July 2015 Gartner Hype Cycle for Data Security indicates that Data Loss Prevention […]

By |October 29th, 2015|Blog|Comments Off on Data Loss Prevention (DLP) Technology is Maturing along with Customer Expectations

Hacking your back pocket

by Sue Poremba, security and technology writer, Central Desktop, a PGi company, October 27, 2015

Convenient, but vulnerable

There are two primary reasons why your smartphone is more likely to be hacked than other devices, according to Paul Hill, senior consultant with SystemExperts: the physical security of the devices and the use of untrustworthy networks.

“Mobile devices are more likely […]

By |October 28th, 2015|News & Events|Comments Off on Hacking your back pocket

Exciting Opportunities at SystemExperts

This is not a typical blog from us where we discuss security issues and solutions, but rather a post letting you know about two exciting positions now available on our team. If you are interested in applying, please contact us at SystemExperts.

Information Security Compliance Consultant

We are looking for an IT security/compliance consultant to assist in the performance […]

By |October 19th, 2015|Blog, HIPAA Compliance, PCI Compliance, Penetration Testing|Comments Off on Exciting Opportunities at SystemExperts

Holiday Marketing Guide: 2015 Trends That Will Drive Sales

Nicole Fallon Taylor, Business News Daily Assistant Editor  

With two months to go before Thanksgiving, shoppers are already gearing up for a busy holiday sale season. Data from Google revealed that more than a quarter of consumers begin their holiday shopping before Halloween, so retailers need to be ready for […]

By |September 30th, 2015|News & Events|Comments Off on Holiday Marketing Guide: 2015 Trends That Will Drive Sales

Security Risks Created by Emerging Technologies

In a recent Q&A session, Joe Clapp and I were asked to address the security risks that the continuing technological change in cloud data center poses. Following are our responses to the most common risks associated with cloud data center change and our recommendations how to safeguard data given these considerations.

Data and data handling needs created by […]

By |September 18th, 2015|Big Data, Blog|Comments Off on Security Risks Created by Emerging Technologies

Securing Data Backups – On-site and in the Cloud

The security of backups is multifaceted. Factors to be considered include encryption at rest, encryption during transmission if applicable, security of shipping if applicable, physical security, environmental controls to prevent damage, and record keeping in order to prevent loss, and to ensure that data is destroyed once the retention period has expired.

By |September 9th, 2015|Blog|Comments Off on Securing Data Backups – On-site and in the Cloud

Addressing BitLocker and PCI-DSS 3.1 Usage

Inquiry: Earlier this month we received an email from Matthew Todd of Financial Engines, Inc. that said, “Back in 2011, Phil Cox (SystemExperts) wrote some guidance on using Windows BitLocker to meet PCI-DSS requirements. PCI-DSS has been updated since then, and I’m curious if SE has updated guidance.”

Response: Section 3.4.1 of […]

By |August 20th, 2015|Blog, PCI Compliance|Comments Off on Addressing BitLocker and PCI-DSS 3.1 Usage

9 common enterprise cybersecurity myths

Joe Stangarone, writer,  MRCs Cup of Joe Blog, August 4, 2015

Summary: Cyberattacks are more sophisticated and frequent than ever. The costs to recover from a data breach are now higher than ever. Yet, many companies remain unprepared for an attack. Why? In many cases, they believe some common cybersecurity myths, which can put their data (and their customer’s […]

By |August 4th, 2015|ISO 27002, News & Events, Uncategorized|Comments Off on 9 common enterprise cybersecurity myths
  • Permalink Gallery

    Communicating the Data Security Risks of File Sharing & Cloud Storage

Communicating the Data Security Risks of File Sharing & Cloud Storage

by Nate Lord, Digital Guardian, July 23, 2015

With more enterprises moving to the cloud and more employees using file sharing and cloud storage services in the course of conducting business, effective communication regarding the inherent security risks associated with cloud computing is imperative. Cloud applications enable employees to create, store, and control more data than ever before, […]

By |July 23rd, 2015|News & Events|Comments Off on Communicating the Data Security Risks of File Sharing & Cloud Storage