1.888.749.9800

system_experts

  • Permalink Gallery

    ‘Tis the Season to Protect Your Identity: Online Shopping Security

‘Tis the Season to Protect Your Identity: Online Shopping Security

by Alayna Pehrson, content management specialist for Best Company, November 26, 2018

It’s the time of year when people start making both online and in-store purchases for their loved ones. When holiday deals appear, most people enjoy indulging the spirit of giving. Unfortunately, many identity thieves and cybercriminals don’t feel the same spirit and often target holiday shoppers.

According to a […]

By |November 27th, 2018|News & Events, Security Breach|Comments Off on ‘Tis the Season to Protect Your Identity: Online Shopping Security
  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor Employee Benefit Advisor, September 26, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to […]

By |September 28th, 2018|News & Events|Comments Off on Employers overlook a key ally in preventing cyberattacks: HR departments
  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor, Employee Benefit News, September 24, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to think […]

By |September 24th, 2018|News & Events, Security Breach|Comments Off on Employers overlook a key ally in preventing cyberattacks: HR departments

The data security threat is complex and constantly changing

by Adam Muspratt, content editor, CX Network, August 16, 2018

Adam Muspratt, content editor for CX Network, interviewed several experts in cyber security. In this report Muspratt delves into data security and discusses how complex the threat is and the fact that it is constantly changing.

Data security in customer experience: Are CX teams cyber-aware?

Going into […]

By |August 27th, 2018|News & Events|Comments Off on The data security threat is complex and constantly changing

Five data recovery planning steps to protect vital assets

by John Edwards, technology writer, TechTarget, July 19, 2018

Accurately restoring lost data after disaster strikes requires planning, patience and logic. If your goal is a smooth recovery process, here’s what you’ll need to know beforehand.

Disaster can strike any data center on any day. Money, time and effort enable physical IT assets to be fully restored — […]

By |July 23rd, 2018|News & Events|Comments Off on Five data recovery planning steps to protect vital assets
  • Permalink Gallery

    Survey: Small construction companies lukewarm on tech investment

Survey: Small construction companies lukewarm on tech investment

by , author, Construction DIVE, February 28, 2018

Dive Brief:

  • A recent customer survey from small business funding siteKabbage revealed that fewer than 35% of small construction companies planned to make investments at some level this year in technologies that could help their businesses and further bring them into the digital age.
  • More than 65% of […]
By |March 1st, 2018|News & Events, Security Breach, Uncategorized|Comments Off on Survey: Small construction companies lukewarm on tech investment
  • Permalink Gallery

    How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

by Megan Thudium, writer, IT Security Central, January 25, 2018

We’ve heard of the challenges of Amazon S3 Buckets and the exposure of customer data to the world wide web. When cloud storage technology emerged, the new technology had plenty of hype. Companies flocked to the new technology, and they started integrating it into their daily work structure. However, […]

By |February 5th, 2018|News & Events|Comments Off on How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak
  • Permalink Gallery

    Protecting Systems and Data for a Traveling Workforce is Crucial

Protecting Systems and Data for a Traveling Workforce is Crucial

by Samuel Greengard, writer, Security Roundtable, January 24, 2018

Mobility is at the center of today’s enterprise. Employees rely on smartphones, tablets, and personal computers to access data anywhere and at any time. It’s no news flash that these devices are now a critical piece of the enterprise productivity scheme. Yet, all the gain doesn’t come without some pain: employees carrying devices and […]

By |January 25th, 2018|News & Events, Security Breach|Comments Off on Protecting Systems and Data for a Traveling Workforce is Crucial

The Internet of Things: Still Lots for You to Learn

by John Edwards, InformationWeek, January 11, 2018

IT groups will need to provide architecture, data-mining tools and connectivity, while giving business groups the freedom to innovate on their own with the Internet of Things.

The Internet of Things (IoT) is already making a significant impact in a variety of business areas, including industrial monitoring and production, supply chain tracking, and multiple […]

By |January 23rd, 2018|IoT, News & Events|Comments Off on The Internet of Things: Still Lots for You to Learn

Is a Cyber Pearl Harbor a Real Threat?

by Samuel Greengard, writer, Baseline, December 12, 2017

In recent weeks, U.S. financial institutions such as JP Morgan Chase, Capital One and Wells Fargo have undergone sustained cyber-attacks from sources that security experts say could be a hostile foreign government or terrorist organization. Some experts, including Defense Secretary Leon Panetta, have cautioned that this distributed denial-of-service (DDoS) activity could foreshadow […]

By |December 14th, 2017|News & Events|Comments Off on Is a Cyber Pearl Harbor a Real Threat?

Cloud security and IoT are the new peanut butter and jelly

by Christine Parizo, writer, Tech Pro Research, October 2017

For enterprises using cloud services with IoT, it’s critical to adhere to as many security practices as possible. Experts weigh in on the best approaches to take.

The Internet of Things (IoT) adds another sticky layer to the question of cloud security. Most organizations think in terms of the devices themselves, rather […]

By |November 15th, 2017|IoT, News & Events|Comments Off on Cloud security and IoT are the new peanut butter and jelly

Fighting Cyber-Threats With Innovative Tech

by Samuel Greengard, business & technology reporter, Baseline, Oct. 24, 2017

Increasingly sophisticated and dangerous cyber-threats require more innovative security approaches, including advanced automation tools, AI and blockchain.

The complexities of today’s cyber-security environment aren’t lost on anyone. It’s increasingly difficult to spot threats, detect intrusions, and thwart hackers and cyber-thieves.

“A cruise through the latest headlines about breaches is sobering,” says […]

By |October 24th, 2017|News & Events, Security Breach|Comments Off on Fighting Cyber-Threats With Innovative Tech

No Compromises with the Latest Cybersecurity Threats

by Samuel Greengard, business & technology reporter, ChannelProNetwork, Sept. 8, 2017

Business process compromise attacks represent a growing risk. But channel pros can help their clients address the problem.

AS THE DIGITAL AGE UNFOLDS, it’s increasingly clear that the weakest link in cybersecurity is humans. People click bad links, open infected files, and succumb to an array of other social engineering […]

By |September 12th, 2017|News & Events, Security Breach|Comments Off on No Compromises with the Latest Cybersecurity Threats
  • Permalink Gallery

    Ethical hacking: At WPI, a search for computer vulnerabilities

Ethical hacking: At WPI, a search for computer vulnerabilities

by Kaitlin Milliken, Correspondent, Worcester Telegram, July 16, 2017

WORCESTER – Students participating in Worcester Polytechnic Institute’s Cyber Security Club stare at their laptop screens, typing long lines of code.

They hope to find vulnerabilities in software and hack into a computer system. Each task they complete earns points.

Alex Gaines, president of the club, anticipates […]

By |July 17th, 2017|News & Events|Comments Off on Ethical hacking: At WPI, a search for computer vulnerabilities
  • Permalink Gallery

    Security Experts Share Top Tips for Protecting Unstructured Data

Security Experts Share Top Tips for Protecting Unstructured Data

by Nate Lord, Digital Guardian, May 22, 2017

19 security professionals and business leaders share their top tips for protecting unstructured data.

From the contents of emails to intellectual property, business plans, proprietary training documentation, and much more, most enterprises manage vast amounts of unstructured data containing valuable and sensitive information. The sheer volume of unstructured data created and managed by most […]

By |May 23rd, 2017|News & Events|Comments Off on Security Experts Share Top Tips for Protecting Unstructured Data