by Michael O’Dwyer, contributor, The PULSE of IT, November 23, 2015 Excerpt: Businesses should take baby steps when it comes to security compliance, starting with a security standard that is easier to comply with, like the ISO/IEC 27002, which deals with end-to-end security. “It is easy to understand, and it is up to the company to determine […]
About Steve McGee
This author has yet to write their bio.Meanwhile lets just say that we are proud Steve McGee contributed a whooping 13 entries.
Entries by Steve McGee
An SC Magazine eBook Publication – Identity Access Management, by Karen Epper Hoffman, October 2015 Security executives are looking beyond basic user name and password to secure access to the enterprise, which is becoming more complicated with remote access, cloud services and personal devices. Knowing who is on your network and able to access your information and resources is arguably […]
by Sue Poremba, security and technology writer, Central Desktop, a PGi company, October 27, 2015 Convenient, but vulnerable There are two primary reasons why your smartphone is more likely to be hacked than other devices, according to Paul Hill, senior consultant with SystemExperts: the physical security of the devices and the use of untrustworthy networks. […]
This is not a typical blog from us where we discuss security issues and solutions, but rather a post letting you know about two exciting positions now available on our team. If you are interested in applying, please contact us at SystemExperts. Information Security Compliance Consultant We are looking for an IT security/compliance consultant to […]
Nicole Fallon Taylor, Business News Daily Assistant Editor September 28, 2015 With two months to go before Thanksgiving, shoppers are already gearing up for a busy holiday sale season. Data from Google revealed that more than a quarter of consumers begin their holiday shopping before Halloween, so retailers need to be ready for the rush. […]
Joe Stangarone, writer, MRCs Cup of Joe Blog, August 4, 2015 Summary: Cyberattacks are more sophisticated and frequent than ever. The costs to recover from a data breach are now higher than ever. Yet, many companies remain unprepared for an attack. Why? In many cases, they believe some common cybersecurity myths, which can put their data […]
by Nate Lord, Digital Guardian, July 23, 2015 With more enterprises moving to the cloud and more employees using file sharing and cloud storage services in the course of conducting business, effective communication regarding the inherent security risks associated with cloud computing is imperative. Cloud applications enable employees to create, store, and control more data […]
by Nate Lord, Digital Guardian, June 3, 2015 Despite all of the security risks BYOD poses to an IT environment, the trend of businesses embracing bring your own device in the workplace continues to grow at a rapid pace. Some of the main reasons companies of today are so accepting of BYOD in the workplace […]
By James A. Martin, CIO.com, May 20, 2015 A set of security experts shares actionable tips for IT departments and users to help reduce the risk associated with the popular mobile OS. The security pros interviewed for our article, “Experts bust Android security myths,” offered up the following eight Android security tips for IT administrators […]
Since 1994, SystemExperts has been helping companies see the big picture and design solutions to meet their comprehensive security needs. We over-deliver and provide unmatched personal attention, distilling problems to their root causes and recommending what’s appropriate for every client.
News & Insights
Tel: 1 (888) 749-9800
Fax: 1 (978) 440-9636