1.888.749.9800

system_experts

  • Permalink Gallery

    Accepting Credit Cards? PCI Compliance a Concern for Small Businesses

Accepting Credit Cards? PCI Compliance a Concern for Small Businesses

Sue Poremba, contributing writer to Business News Daily, interviewed security experts on why PCI compliance is a concern for small businesses.  Here are the tips we offered on how to stay PCI compliant:

  1. Identify all business and client data, including any cardholder data, its sensitivity and criticality. Correctly defining the scope of assessment is probably the most difficult and […]
By |August 20th, 2019|News & Events, PCI Compliance|Comments Off on Accepting Credit Cards? PCI Compliance a Concern for Small Businesses

Data Privacy Market Still Has Room for All Entrants

by Victoria Hudgins, writer, Law.com, July 18, 2019

The rapid growth and complexity of data privacy laws makes the idea of one dominant privacy compliance company unlikely, ensuring lawyers’ seat at the table.

In the midst of growing data regulation laws and compliance needs, some privacy compliance technology companies are attracting a slew of investments. Take for example, data privacy compliance […]

By |August 19th, 2019|News & Events, Security|Comments Off on Data Privacy Market Still Has Room for All Entrants

DNS: Don’t ignore the risk to your company

by Sam Greengard, writer, Security Roundtable, February 19, 2019

It’s 5:30pm and you’re still at work going through the last batch of emails. You’re feeling a bit overwhelmed after a long day—you want to get home to dinner—when you see an e-mail from a co-worker that looks important. It has your name in it, the graphics look authentic and […]

By |February 19th, 2019|News & Events, Security Breach|Comments Off on DNS: Don’t ignore the risk to your company

With AI, promises still outpace reality

by Esther Shein, senior reporter, SCMagazine, January 3, 2019

AI’s value on the endpoint still a work in progress, but it’s improving

AI is great for solving yesterday’s endpoint attacks, but the jury is still out on solving tomorrow’s.

Today it is almost impossible to talk about cybersecurity without someone turning the discussion to artificial intelligence (AI). Sometimes it is appropriate, sometimes […]

By |January 16th, 2019|News & Events|Comments Off on With AI, promises still outpace reality
  • Permalink Gallery

    ‘Tis the Season to Protect Your Identity: Online Shopping Security

‘Tis the Season to Protect Your Identity: Online Shopping Security

by Alayna Pehrson, content management specialist for Best Company, November 26, 2018

It’s the time of year when people start making both online and in-store purchases for their loved ones. When holiday deals appear, most people enjoy indulging the spirit of giving. Unfortunately, many identity thieves and cybercriminals don’t feel the same spirit and often target holiday shoppers.

According to a […]

By |November 27th, 2018|News & Events, Security Breach|Comments Off on ‘Tis the Season to Protect Your Identity: Online Shopping Security
  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor Employee Benefit Advisor, September 26, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to […]

By |September 28th, 2018|News & Events|Comments Off on Employers overlook a key ally in preventing cyberattacks: HR departments
  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor, Employee Benefit News, September 24, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to think […]

By |September 24th, 2018|News & Events, Security Breach|Comments Off on Employers overlook a key ally in preventing cyberattacks: HR departments

The data security threat is complex and constantly changing

by Adam Muspratt, content editor, CX Network, August 16, 2018

Adam Muspratt, content editor for CX Network, interviewed several experts in cyber security. In this report Muspratt delves into data security and discusses how complex the threat is and the fact that it is constantly changing.

Data security in customer experience: Are CX teams cyber-aware?

Going into […]

By |August 27th, 2018|News & Events|Comments Off on The data security threat is complex and constantly changing

Five data recovery planning steps to protect vital assets

by John Edwards, technology writer, TechTarget, July 19, 2018

Accurately restoring lost data after disaster strikes requires planning, patience and logic. If your goal is a smooth recovery process, here’s what you’ll need to know beforehand.

Disaster can strike any data center on any day. Money, time and effort enable physical IT assets to be fully restored — […]

By |July 23rd, 2018|News & Events|Comments Off on Five data recovery planning steps to protect vital assets
  • Permalink Gallery

    Survey: Small construction companies lukewarm on tech investment

Survey: Small construction companies lukewarm on tech investment

by , author, Construction DIVE, February 28, 2018

Dive Brief:

  • A recent customer survey from small business funding siteKabbage revealed that fewer than 35% of small construction companies planned to make investments at some level this year in technologies that could help their businesses and further bring them into the digital age.
  • More than 65% of […]
By |March 1st, 2018|News & Events, Security Breach, Uncategorized|Comments Off on Survey: Small construction companies lukewarm on tech investment
  • Permalink Gallery

    How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

by Megan Thudium, writer, IT Security Central, January 25, 2018

We’ve heard of the challenges of Amazon S3 Buckets and the exposure of customer data to the world wide web. When cloud storage technology emerged, the new technology had plenty of hype. Companies flocked to the new technology, and they started integrating it into their daily work structure. However, […]

By |February 5th, 2018|News & Events|Comments Off on How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak
  • Permalink Gallery

    Protecting Systems and Data for a Traveling Workforce is Crucial

Protecting Systems and Data for a Traveling Workforce is Crucial

by Samuel Greengard, writer, Security Roundtable, January 24, 2018

Mobility is at the center of today’s enterprise. Employees rely on smartphones, tablets, and personal computers to access data anywhere and at any time. It’s no news flash that these devices are now a critical piece of the enterprise productivity scheme. Yet, all the gain doesn’t come without some pain: employees carrying devices and […]

By |January 25th, 2018|News & Events, Security Breach|Comments Off on Protecting Systems and Data for a Traveling Workforce is Crucial

The Internet of Things: Still Lots for You to Learn

by John Edwards, InformationWeek, January 11, 2018

IT groups will need to provide architecture, data-mining tools and connectivity, while giving business groups the freedom to innovate on their own with the Internet of Things.

The Internet of Things (IoT) is already making a significant impact in a variety of business areas, including industrial monitoring and production, supply chain tracking, and multiple […]

By |January 23rd, 2018|IoT, News & Events|Comments Off on The Internet of Things: Still Lots for You to Learn

Is a Cyber Pearl Harbor a Real Threat?

by Samuel Greengard, writer, Baseline, December 12, 2017

In recent weeks, U.S. financial institutions such as JP Morgan Chase, Capital One and Wells Fargo have undergone sustained cyber-attacks from sources that security experts say could be a hostile foreign government or terrorist organization. Some experts, including Defense Secretary Leon Panetta, have cautioned that this distributed denial-of-service (DDoS) activity could foreshadow […]

By |December 14th, 2017|News & Events|Comments Off on Is a Cyber Pearl Harbor a Real Threat?

Cloud security and IoT are the new peanut butter and jelly

by Christine Parizo, writer, Tech Pro Research, October 2017

For enterprises using cloud services with IoT, it’s critical to adhere to as many security practices as possible. Experts weigh in on the best approaches to take.

The Internet of Things (IoT) adds another sticky layer to the question of cloud security. Most organizations think in terms of the devices themselves, rather […]

By |November 15th, 2017|IoT, News & Events|Comments Off on Cloud security and IoT are the new peanut butter and jelly