1.888.749.9800

Monthly Archives: February 2016

Watch Out: Your Apple Phone May be Infected After All

Conventional wisdom seems to be that Apple is secure from hackers and malware. But the reality of the situation isn’t very reassuring.

In the relatively short lifespan of the iPhone, users have felt fairly safe using them, because almost all the malware seemed to be focused upon the more widely used Android devices. However, with […]

By |February 19th, 2016|Blog, Security Breach|Comments Off on Watch Out: Your Apple Phone May be Infected After All

Don’t Neglect the Fundamentals of Identity Management

Posted by Ishan Kumar on 2/11/16 8:52 AM

Paul Hill is a Senior Consultant with SystemExperts. Previously, he worked in the IT Department of the Massachusetts Institute of Technology where he played a leadership role in the evolution of identity services. He is recognized as one of the industry’s foremost experts in Microsoft technology, […]

By |February 15th, 2016|News & Events, Security Breach|Comments Off on Don’t Neglect the Fundamentals of Identity Management
  • Permalink Gallery

    Employees Still Clicking on Phishing Links? What Companies can do to Break that Habit

Employees Still Clicking on Phishing Links? What Companies can do to Break that Habit

Phishing attacks have become sophisticated and targeted. The majority of recent successful phishing attacks have been limited to a small subset of employees (spear-phishing) and not spammed across the entire company. The phishing emails may appear to come from HR or an email address from within the company.  Due to the highly customized phishing emails from attackers […]

By |February 10th, 2016|Blog|Comments Off on Employees Still Clicking on Phishing Links? What Companies can do to Break that Habit