1.888.749.9800

Blog

  • Permalink Gallery

    Considering the Use of a CPaaS Provider? Look at the Inherent Risks

Considering the Use of a CPaaS Provider? Look at the Inherent Risks

The rise of the communications platform as a service (CPaaS) model has many enterprises migrating from on-premises communications to cloud platforms and APIs. CPaaS and APIs offer benefits including improved productivity and third-party app integrations, but before proceeding to adopt CPaaS companies should consider the inherent risks.

Remember that the underlying technologies tend to be insecure. […]

Ransomware – should you pay or not?

You may have seen the recent news about cities and towns being held hostage to hackers infecting their data. With over 25 years of experience in cyber security, I’ve seen it all. To help guide you in managing a ransomware attack, I’ve outlined the steps you can take to minimize the impact […]

How significant is the tool sprawl problem?

Following up on my post earlier this month on Shadow IT, I wanted to discuss a related issue – “tool sprawl.” Tool sprawl describes an environment where the deployment and use of tools is not managed by a single IT group: applications, software, and tools are installed by end-users because they believe […]

Four Tips for Dealing with Shadow IT

Simply stated, Shadow IT is what happens when people within an organization decide to deploy Information Technology systems and services without approval from the official IT group.  On the positive side, this can be the source of real innovation from within the company without the normal formal approval process that can be time consuming and burdensome. On […]

Cybercrime: Impact on Manufacturers

With the rise in value of intellectual property, cybercriminals are now aiming their activity on the manufacturing sector. Manufacturers in the past haven’t practiced the strictest of cybersecurity measures, making themselves quite vulnerable today. The exception to this are industries, such as chemical and pharmaceutical manufacturing, which are subject to federal regulations regarding cybersecurity.

Within the […]

Disaster Recovery as a Service

Disaster Recovery as a Service, or DRaaS, helps safeguard your company from IT outages and helps build a resilient IT system to maintain servers and network usage throughout recovery processes. DRaaS uses cloud resources to protect applications and data from disruption caused by disaster and gives an organization a total system backup that allows for […]

How important is AWS certification for career success?

Many companies specify the need for a certification in job postings simply to weed out unqualified candidates as quickly as possible. The reality is that for most companies, real world experience and demonstrated success will count more than a certification.

For a long term career path with few limitations a much better choice is to […]

How Companies Can Protect Themselves from Ransomware

I was recently asked about ransomware and how companies can defend themselves. The most common vectors of infection for ransomware are via email, such as attachments and malicious links in the email,  and exploit kits, which are usually executed when a victim visits a compromised websites.

Some organizations assert that approximately 60 percent of […]

Protecting the Critical Infrastructure from cyber warfare

by Joe Clapp, senior consultant, SystemExperts for SC Magazine, March 13, 2019

Cyber attacks are hard to prevent. A cyberattack against our nation’s critical infrastructure (CI) is especially hard to thwart and could have devastating consequences to our human existence. Most everyone is aware of the catastrophic risk the electrical grid faces from a cyberattack. To put it in perspective, […]

AI in Cybersecurity: How it can be tricked

Using AI to provide cybersecurity solutions has received a lot of press in the past two years. The reality is that most “AI cybersecurity” products use Machine Learning (ML) techniques, which is just one subset of a broader range of techniques associated with deep AI.

ML techniques are being used in several cybersecurity domains including:

DNS: Don’t ignore the risk to your company

by Sam Greengard, writer, Security Roundtable, February 19, 2019

It’s 5:30pm and you’re still at work going through the last batch of emails. You’re feeling a bit overwhelmed after a long day—you want to get home to dinner—when you see an e-mail from a co-worker that looks important. It has your name in it, the graphics look authentic and […]

  • Permalink Gallery

    SystemExperts’ Jon Gossels Contributes to New Book, Supreme Leadership Habits

SystemExperts’ Jon Gossels Contributes to New Book, Supreme Leadership Habits

I’m so pleased to be one of the contributing thought leaders for Alinka Rutkowska recently published book –  Supreme Leadership Habits: Gain 850 Years of Wisdom from Successful Business Leaders. Alinka, an international best-selling author, interviewed 34 executives celebrating their 25th anniversary in 2018, and shares their secrets to growing profitable businesses. […]

With AI, promises still outpace reality

by Esther Shein, senior reporter, SCMagazine, January 3, 2019

AI’s value on the endpoint still a work in progress, but it’s improving

AI is great for solving yesterday’s endpoint attacks, but the jury is still out on solving tomorrow’s.

Today it is almost impossible to talk about cybersecurity without someone turning the discussion to artificial intelligence (AI). Sometimes it is appropriate, sometimes […]

Three Security Predictions for 2019

I was recently asked my thoughts about cyber security trends for the 2019. Here are a few of my predictions:

1. Many security issues will still be caused by human error. Despite many technology advances, a significant number of issues are caused by people using bad judgement or organizations deploying hardware and services insecurely. The reality is that […]

Guideline for Reporting a Cyber Incident

In our last blog post, we covered the best practices for creating and implementing an Incident Response Plan (IRP). As a follow-on to that post, we’d like to share insight on the steps an organization can take for reporting a cyber incident. Any incident that has the potential to cause significant damage to the confidentiality, integrity, or […]