1.888.749.9800

admin

  • Permalink Gallery

    The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety

The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety

By Thad Rueter,  Senior Editor,  InternetRETAILER,  April 9, 2014

The flaw could help hackers steal information, including credit card numbers and personal consumer data, from inside servers that operate e-commerce sites. But patches and other steps could help web merchants reduce any risk of fraud, experts say.

Big, huge, deeply worrying—but certainly not catastrophic if the right […]

By |April 28th, 2014|News & Events|Comments Off on The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety

The Heartbleed Bug — Commentary by Paul Hill

by Cooper Smith – Business Insider

A major flaw in the popular OpenSSL software library, which many Internet companies use to encrypt sensitive data, could leave online shoppers vulnerable to credit card theft. “Potentially everything is at risk,” said Paul Hill, a senior consultant at SystemExperts, IT compliance and security consultancy. After learning about the bug, Amazon, eBay, Etsy, and other […]

By |April 23rd, 2014|News & Events|Comments Off on The Heartbleed Bug — Commentary by Paul Hill
  • Permalink Gallery

    Privilege creep: Do your employees have more IT access than they need?

Privilege creep: Do your employees have more IT access than they need?

By James Ritchie

As employees move up and around in your organization, they likely end up with more responsibility, more influence — and more access to your IT infrastructure.

The phenomenon is known as privilege creep. As people switch roles in a company, they get login or admin privileges for new systems while retaining access to old ones. It leaves your […]

By |April 8th, 2014|News & Events|Comments Off on Privilege creep: Do your employees have more IT access than they need?

BYOD Security: Getting Employees to Buy In

By Sue Marquette Poremba

Do you have a Bring Your Own Device (BYOD) security policy in place for your company? If you do, your employees may not be too happy about it: A recent report by technology research firm Gartner found that one-fifth of BYOD policies fail because employees find the rules too restrictive and don’t bother to follow them.

BYOD gives […]

By |April 7th, 2014|BYOD, News & Events|Comments Off on BYOD Security: Getting Employees to Buy In
  • Permalink Gallery

    Accepting Credit Cards? PCI Compliance a Concern for Small Businesses

Accepting Credit Cards? PCI Compliance a Concern for Small Businesses

Recent breaches against major retailers have put payment card industry (PCI) regulations in the spotlight. However, it isn’t only big companies that need to worry about adhering to these regulations. The rules apply to every business that relies on credit and debit cards for transactions. Even if your business employs four people and it […]

By |March 25th, 2014|News & Events, PCI Compliance|Comments Off on Accepting Credit Cards? PCI Compliance a Concern for Small Businesses
  • Permalink Gallery

    Accepting Credit Cards? PCI Compliance a Concern For Small Businesses

Accepting Credit Cards? PCI Compliance a Concern For Small Businesses

Sue Marquette Poremba, Business News Daily Contributor   |   March 20, 2014 12:59pm ET

Recent breaches against major retailers have put payment card industry (PCI) regulations in the spotlight. However, it isn’t only big companies that need to worry about adhering to these regulations. The rules apply to every business that relies on credit and debit cards for transactions. Even if your […]

By |March 21st, 2014|News & Events, PCI Compliance|Comments Off on Accepting Credit Cards? PCI Compliance a Concern For Small Businesses

HIPAA audit preparation and compliance: BA effects on CEs

Author Name Nicole Freeman   |   Date March 10, 2014

While the timetable for 2014 HIPAA audits has not been released, the Office for Civil Rights (OCR) has begun surveying covered entities and business associates (BAs) to gauge organizational preparedness for the upcoming OCR HIPAA Audit Program. The audit criteria have not been disclosed, but it’s possible that OCR will follow up […]

By |March 11th, 2014|HIPAA Compliance, News & Events|Comments Off on HIPAA audit preparation and compliance: BA effects on CEs
  • Permalink Gallery

    Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill

Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill

December 4, 2013 — Mobile Fever

As BYOD becomes more acceptable in the workplace, the concerns of IT leaders continue to grow. We interviewed 22 mobility and BYOD experts to provide some pros and cons around implementing and developing an Enterprise Mobility BYOD strategy. (Click here to see comments from other 21 consultants – http://bit.ly/18lWT7y)

Paul B. Hill, Senior Consultant, SystemsExperts

Paul B. […]

By |December 4th, 2013|News & Events|Comments Off on Expert Advice on the Pros and Cons of Developing a BYOD Policy – Commentary by Paul Hill
  • Permalink Gallery

    A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill

A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill

November 26, 2013 — LINUX Insider

Chrome or Chromium more secure? Numerous security experts place their bets on Chromium, suggested Paul Hill, a senior consultant at SystemsExperts. “Chrome’s code has to be able to tie into Flash Player, for instance,” Hill explained. “So more code is involved to integrate with other third-party products. This all introduces more complexities and more […]

By |December 3rd, 2013|News & Events|Comments Off on A Tale of Two Browsers: Chrome v. Chromium – Commentary by Paul Hill
  • Permalink Gallery

    10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson

10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson

October 17, 2013 — Dark Reading

As IT organizations seek to make better risk-based decisions about security practices, perhaps the No. 1 component for success is the IT risk assessment. However, even when organizations actually conduct a risk assessment, they frequently fall prey to mistakes that can greatly devalue the exercise. Here are some of the most common blunders to […]

By |October 18th, 2013|News & Events|Comments Off on 10 Pitfalls of IT Risk Assessment — Commentary by Brad Johnson
  • Permalink Gallery

    Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

October 2013 — SearchHealthIT – TechTarget

Affordable Care Act implementation continues, despite some major obstacles: a government shutdown, deep political opposition to the ACA, and a rocky start to the first week of enrollment for its health insurance exchanges (because of initial crashes of the main federal website and ongoing technical glitches causing delays and user-authentication problems).

Mandated by the ACA, […]

By |October 17th, 2013|News & Events|Comments Off on Insurance exchanges’ IRS Publication 1075 data compliance new to many – Commentary by Jeff VanSickel

Defcon21 – Attended by Alex Chaveriat

August 2, 2013, 9:30 AM

CTP Comptition area (section 6), Rio Hotel, Las Vegas, NV
Alex Chaveriat , SystemExperts Consultant, featured speaker – Topic: “Packet Pwning”

By |August 2nd, 2013|News & Events|Comments Off on Defcon21 – Attended by Alex Chaveriat
  • Permalink Gallery

    10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

August 1, 2013 — InformationWeek

The BYOD, or bring your own device, phenomenon is taking businesses by storm — and sometimes by surprise. But higher-ed IT departments have been dealing with BYOD for years now. In fact, they have a thing or two to teach the business world about effectively managing and securing an ever-changing mix of user-owned devices.

By |August 1st, 2013|News & Events|Comments Off on 10 BYOD Lessons For Business from Higher Ed – Commentary by Paul Hill

6 Apps Your IT Guy Hates – Commentary by Paul Hill

June 24, 2013 — Inc.

Do you count on these apps for everyday business tasks? Maybe you shouldn’t.

The amazing thing about mobile apps, cloud storage, and living on the Web is that information is always at your fingertips. Unfortunately, often that means your data is not far from hackers’ fingertips as well.

Here’s a round-up of the high-risk apps that could […]

By |June 24th, 2013|News & Events|Comments Off on 6 Apps Your IT Guy Hates – Commentary by Paul Hill
  • Permalink Gallery

    How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel

How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel

May 10, 2013 — SurgicalAesthetics

Medical practices across the nation are increasingly using digital tools to track patient health records, communicate with patients and collaborate across clinical specialties. But with the rewards of convenience and efficiency come the threats of potentially compromising patients’ privacy and exposing sensitive data to hackers or identity thieves.

Digitization is a fast-growing trend. About 30% of […]

By |May 10th, 2013|News & Events|Comments Off on How to Keep Patient Information Confidential in the Digital Age – Commentary by Jeff VanSickel