1.888.749.9800

Blog

Protecting from Phishing and Spear-Phishing

SystemExperts Corporation is aware that many companies are seeing spear-phishing attempts where the emails purport to be from internal employees. We have also heard reports that compromised email accounts have been used to send spear-phishing emails to third-parties and the owner of the compromised accounts do not see the emails being sent on their behalf, nor the […]

  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor Employee Benefit Advisor, September 26, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to […]

  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor, Employee Benefit News, September 24, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to think […]

Crisis Management Centers and Cyber Security

I was asked to contribute to an article about 911 communications centers recently based on my experience with large crisis management centers (think the 2014 Boston Marathon bombing). Below are my responses to the questions:

What are the common vulnerabilities communication centers face?

24-hour crisis managements centers often have shared computers. I would expect that they conduct […]

How to Protect Your Security Online

I was recently asked a series of questions about how to protect your security online. I’d like to share the answers here – and please feel free to reach out if you have any comments.

1. How can you create the best passwords that are hacker-proof but easy to remember?  

The best passwords aren’t […]

How Do You Define Success for a Cyber Security Team?

Is it risk reduction? Training employees? Fighting back against targeted attacks?

The easy answer to this question is to build a comprehensive and mature Security Program. The difficult part is identifying every critical component that make this a success. Remembering that any security program is only as strong as the weakest link, you must build […]

The data security threat is complex and constantly changing

by Adam Muspratt, content editor, CX Network, August 16, 2018

Adam Muspratt, content editor for CX Network, interviewed several experts in cyber security. In this report Muspratt delves into data security and discusses how complex the threat is and the fact that it is constantly changing.

Data security in customer experience: Are CX teams cyber-aware?

Going into […]

  • Permalink Gallery

    Business Continuity Plans and Disaster Recovery Plans (Part 2)

Business Continuity Plans and Disaster Recovery Plans (Part 2)

Comprehensive business continuity and disaster recovery plans are must-haves for companies of all sizes that are dependent on their systems to run their businesses. In Part 2 on this topic, I discuss factors that have to be considered when building a plan.

Preparing for a disaster can be a daunting task, involving many factors. A company will have […]

  • Permalink Gallery

    Business Continuity Plans and Disaster Recovery Plans (Part 1)

Business Continuity Plans and Disaster Recovery Plans (Part 1)

Comprehensive business continuity and disaster recovery plans are must-haves for companies of all sizes that are dependent on their systems to run their businesses.

The definition of a disaster is anything that can impact the continuation of business operations. Most people think disasters would just include major weather events (snowstorms, hurricanes, flood, and tornadoes), fire, […]

Q&A On Reconstructing Data After a Disaster

I was recently asked about best practices for a business to reconstruct its data after a disaster by John Edwards, TechTarget. John included my tip noting that once a disaster involving data loss is identified, you must act fast to preserve your environment to prevent further damage, and to protect the archived data itself. Here are some addition […]

Five data recovery planning steps to protect vital assets

by John Edwards, technology writer, TechTarget, July 19, 2018

Accurately restoring lost data after disaster strikes requires planning, patience and logic. If your goal is a smooth recovery process, here’s what you’ll need to know beforehand.

Disaster can strike any data center on any day. Money, time and effort enable physical IT assets to be fully restored — […]

Three Cyber Security Tips for Small Businesses

There are three critical security controls that all small businesses should implement if they are just starting to address security. These are:

  1. Keep your systems up to date by applying all security updates
  2. Make sure you have daily backups of all critical data and be sure to test the […]

Data Protection and GDPR

Do you know how your data is being used?

The most important thing an individual can do to understand how their data is used is to limit the information they provide. People by nature desire to be helpful. They click and respond quickly without a thought. Stop and think before you click.

If all of the information […]

  • Permalink Gallery

    What Questions Should an SMB Ask When Hiring Outside Cyber Security Help

What Questions Should an SMB Ask When Hiring Outside Cyber Security Help

Choosing the right cyber security consultants for an SMB can feel intimidating, but it doesn’t have to be. You don’t have to know much about cyber security to ask the right hiring questions.

To make an informed decision, an SMB should ask about the consultant’s qualifications, track record, quality of work, breadth of technical services, payment model, and […]

Top Tips for World Password Day – May 4th

To commemorate World Password Day today, I thought I’d share my top tips for for creating passwords.  They are very basic, but if you follow these guidelines, you will have a added layer of protection for your digital information.

1. A password should not be a dictionary word.

2. A password should not be easily guessable (i.e. “go pats”).

3. A password should not be […]