1.888.749.9800

Blog

DNS: Don’t ignore the risk to your company

by Sam Greengard, writer, Security Roundtable, February 19, 2019

It’s 5:30pm and you’re still at work going through the last batch of emails. You’re feeling a bit overwhelmed after a long day—you want to get home to dinner—when you see an e-mail from a co-worker that looks important. It has your name in it, the graphics look authentic and […]

  • Permalink Gallery

    SystemExperts’ Jon Gossels Contributes to New Book, Supreme Leadership Habits

SystemExperts’ Jon Gossels Contributes to New Book, Supreme Leadership Habits

I’m so pleased to be one of the contributing thought leaders for Alinka Rutkowska recently published book –  Supreme Leadership Habits: Gain 850 Years of Wisdom from Successful Business Leaders. Alinka, an international best-selling author, interviewed 34 executives celebrating their 25th anniversary in 2018, and shares their secrets to growing profitable businesses. […]

With AI, promises still outpace reality

by Esther Shein, senior reporter, SCMagazine, January 3, 2019

AI’s value on the endpoint still a work in progress, but it’s improving

AI is great for solving yesterday’s endpoint attacks, but the jury is still out on solving tomorrow’s.

Today it is almost impossible to talk about cybersecurity without someone turning the discussion to artificial intelligence (AI). Sometimes it is appropriate, sometimes […]

Three Security Predictions for 2019

I was recently asked my thoughts about cyber security trends for the 2019. Here are a few of my predictions:

1. Many security issues will still be caused by human error. Despite many technology advances, a significant number of issues are caused by people using bad judgement or organizations deploying hardware and services insecurely. The reality is that […]

Guideline for Reporting a Cyber Incident

In our last blog post, we covered the best practices for creating and implementing an Incident Response Plan (IRP). As a follow-on to that post, we’d like to share insight on the steps an organization can take for reporting a cyber incident. Any incident that has the potential to cause significant damage to the confidentiality, integrity, or […]

  • Permalink Gallery

    Three Best Practices for Creating and Implementing an Incident Response Plan

Three Best Practices for Creating and Implementing an Incident Response Plan

A cyber incident can have serious consequences. When a potential incident occurs that could negatively impact the confidentiality, integrity and authenticity of your company’s data, fear and confusion can consume the organization. In the military, we refer to this as “the fog of war.” To avoid a misstep during the critical post-incident response time, the organization should […]

  • Permalink Gallery

    ‘Tis the Season to Protect Your Identity: Online Shopping Security

‘Tis the Season to Protect Your Identity: Online Shopping Security

by Alayna Pehrson, content management specialist for Best Company, November 26, 2018

It’s the time of year when people start making both online and in-store purchases for their loved ones. When holiday deals appear, most people enjoy indulging the spirit of giving. Unfortunately, many identity thieves and cybercriminals don’t feel the same spirit and often target holiday shoppers.

According to a […]

Cybersecurity Tips for the Holiday Season

In my last post I offered tips to keep personal online holiday shopping safe and to help prevent fraud on any of your accounts. Today I’d like to offer small retailers some advice to make sure their IT infrastructure is up-to-date and ready to handle the holiday rush.

Before the holiday season kicks into high […]

Cybersecurity Do’s and Don’ts for the Holiday Season

As the holiday season quickly approaches, I thought it appropriate to share some tips I’ve talked about in the past to keep your online holiday shopping safe and to help prevent fraud on any of your accounts. That leads to my first tip:

  • Consolidate all of your online purchases onto a single credit […]

Protect Your Network with these Three Steps

In addition to being a security consultant by trade, I am a Chief Warrant Officer for the Massachusetts Army National Guard, where I mentor incident handlers and senior leadership on offensive and defensive cyber warfare. In this position, I am regularly asked for advice on all things related to cyber. One recent query from a newly promoted […]

Protecting from Phishing and Spear-Phishing

SystemExperts Corporation is aware that many companies are seeing spear-phishing attempts where the emails purport to be from internal employees. We have also heard reports that compromised email accounts have been used to send spear-phishing emails to third-parties and the owner of the compromised accounts do not see the emails being sent on their behalf, nor the […]

  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor Employee Benefit Advisor, September 26, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to […]

  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor, Employee Benefit News, September 24, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to think […]

Crisis Management Centers and Cyber Security

I was asked to contribute to an article about 911 communications centers recently based on my experience with large crisis management centers (think the 2014 Boston Marathon bombing). Below are my responses to the questions:

What are the common vulnerabilities communication centers face?

24-hour crisis managements centers often have shared computers. I would expect that they conduct […]

How to Protect Your Security Online

I was recently asked a series of questions about how to protect your security online. I’d like to share the answers here – and please feel free to reach out if you have any comments.

1. How can you create the best passwords that are hacker-proof but easy to remember?  

The best passwords aren’t […]