Entries by Brad Johnson

24/7 Cyber Security: Questions Small Retailers Should Ask an eCommerce Site Provider

‘Tis the season for scammers – so providing secure commerce capabilities to customers is high on the list of small retailers By their nature, small retailers don’t have the skills, expertise or infrastructure to provide their own eCommerce capabilities. Knowing that, the key to providing secure commerce capabilities to their customers is using well-known (large) […]

Common mistakes in IT security risk assessments

Dark Reading put together an article focused on common mistakes organizations make when running IT security risk assessments.  Included below was my response and the Dark Reading article is posted here. Trying to do too much.  One of the most common mistakes is trying to go from nothing (haven’t done an assessment) to finished in […]

Looking forward to 2012

To all of our readers of the SystemExperts Blog: thank you for taking time out of your busy schedules and lives to review and comment on the material that we prepare for you.   We hope that 2012 brings you all a healthy, rewarding and prosperous year. Despite the continued hardships of the economy and […]

Back to the Future: Layered Security

In December of 2010 I posted a “Looking forward to 2011” entry that included the following simple advice: “One thing that we have learned in the last few years is that often times, it’s the simple and straightforward actions that make the most sense.” That is a theme that has been consistently used in this […]

Data Loss Prevention: Getting Started

The term DLP, or Data Loss Prevention, tends to conjure up somewhat polarizing reactions such as “That’s the most important thing in our IT environment!” or “What is that?”The reality is, both reactions are perfectly reasonable. The minute you start talking about Data Loss Prevention, or Data Leak Prevention/Protection, or, Information Loss/Leakage Prevention/Protection, or Content […]

RSA Cyber Attack

The recent news that EMC’s RSA infrastructure was the target of an (apparently successful) Advanced Persistent Threat (APT) cyber attack is serious news in the IT and security world. A lot more information will need to come from RSA about the details of the actual compromise and what that means for RSA customers and the […]

SmartPhones: embrace them to secure them!

People who own SmartPhones live by them. People who don’t, soon will! SmartPhone usage and the applications we run on them are only going to increase in popularity and for many people, they are becoming essential business devices. The first step in helping these tools to be secure is to embrace their existence and define […]

Cloud Security: the next new/old worry!

From a security point of view, every time we come to grips with new technology it seems we have to reinvent our understanding of what makes something secure or not. In reality, however, we already know most of the things we are going to have to do, we just need to learn the nuances and […]

Looking forward to 2011

To all of our readers of the SystemExperts Blog: thank you for taking time out of your busy schedules and lives to review and comment on the material that we prepare for you. We appreciate your readership. One thing that we have learned in the last few years is that often times, it’s the simple […]