SystemExperts
  • Security Testing
  • Compliance
  • Operational Services
  • Vendor Risk Management
  • Other Services
  • Company
    • About Us
    • News & Insights
    • Leadership Team
    • Our Clients
    • Careers
    • Contact Us
  • Menu

BLOG

Is Your Firewall Providing Adequate Protection?

November 25, 2019/in Blog Posts, Security /by Jason Kite

What you need to do to keep your data secure Firewall security audits should be conducted at regular intervals and additionally when system configurations are updated or changed. With the addition of new firewalls, hosts or applications, a firewall security audit should follow. Security audits should also be conducted when migrating firewalls or making configuration […]

Read more
https://systemexperts.com/wp-content/uploads/2019/11/Firewall-3.jpg 880 900 Jason Kite https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Jason Kite2019-11-25 21:57:352019-11-26 13:16:44Is Your Firewall Providing Adequate Protection?

Cybersecurity Awareness for Asset Management Organizations

November 5, 2019/in Blog Posts, Security /by Brad Johnson

Many Asset Management companies are relatively small firms but yet have a large risk profile that makes them a prime target for cybersecurity threats.  These companies, like all others, need to have basic blocking and tackling security measures in place to have a solid foundation to try and thwart and detect these threats: Periodic penetration […]

Read more
https://systemexperts.com/wp-content/uploads/2019/11/test.jpg 550 1140 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-11-05 17:12:502019-11-05 18:54:33Cybersecurity Awareness for Asset Management Organizations

Dark Data: Why is it Important?

October 29, 2019/in Blog Posts, Security Breach /by Jonathan Shuffler

Data you find on the Internet is without a doubt vast and extensive, however, its sources are often hidden and out of reach to all but the most technically savvy.  Often, we find ourselves waking up in the morning to learn of another large database breach containing millions of SSN’s that were discovered leaked on […]

Read more
https://systemexperts.com/wp-content/uploads/2019/10/dark-data-1.jpg 500 800 Jonathan Shuffler https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Jonathan Shuffler2019-10-29 17:37:422019-11-01 00:52:26Dark Data: Why is it Important?

IoT Devices’ Security Challenges

October 23, 2019/in Blog Posts, IoT /by Brad Johnson

IoT devices bring many of the same basic security challenges as we face with BYOD technologies. That is, you need to think about how they are deployed and configured, functionality and maintenance updates, encryption of data in transit and at rest, authentication and authorization, and general administration. They also bring some new challenges.   What adds […]

Read more
https://systemexperts.com/wp-content/uploads/2017/01/IoT-security-4.jpg 150 337 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-10-23 17:37:522019-11-01 00:19:09IoT Devices' Security Challenges
SystemExperts - what's new in phishing

What’s new in phishing?

September 26, 2019/in Blog Posts, Security /by Brad Johnson

I was recently asked to comment on what’s new in phishing. In some sense, phishing attacks are always the same. They count on the fact that some (small) percentages of people will follow links or provide information to sources that haven’t been verified or shouldn’t be trusted. They also know that even though most IT […]

Read more
https://systemexperts.com/wp-content/uploads/2019/09/phishing-2.jpg 506 900 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-09-26 14:13:352019-09-26 22:01:38What's new in phishing?

How enterprises can protect themselves against cyber-attacks

September 20, 2019/in Blog Posts, Security /by Brad Johnson

I was recently asked to comment on data security in relation to increasing threat of cyber attacks ahead of the upcoming 2020 election. How can enterprises adequately protect the data privacy of their products and services as well as their clients and employees?  My response is that there’s no silver bullet to prevent cyber attacks […]

Read more
https://systemexperts.com/wp-content/uploads/2019/09/cyber-incident.jpg 162 312 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-09-20 12:54:422019-09-20 13:30:47How enterprises can protect themselves against cyber-attacks

Considering the Use of a CPaaS Provider? Look at the Inherent Risks

August 13, 2019/in Blog Posts, Security /by Paul Hill

The rise of the communications platform as a service (CPaaS) model has many enterprises migrating from on-premises communications to cloud platforms and APIs. CPaaS and APIs offer benefits including improved productivity and third-party app integrations, but before proceeding to adopt CPaaS companies should consider the inherent risks. Remember that the underlying technologies tend to be […]

Read more
https://systemexperts.com/wp-content/uploads/2019/08/CPaaS-4.png 164 307 Paul Hill https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Paul Hill2019-08-13 12:51:222019-08-27 12:29:41Considering the Use of a CPaaS Provider? Look at the Inherent Risks

Ransomware – should you pay or not?

July 30, 2019/in Blog Posts, Security, Security Breach /by Brad Johnson

You may have seen the recent news about cities and towns being held hostage to hackers infecting their data. With over 25 years of experience in cyber security, I’ve seen it all. To help guide you in managing a ransomware attack, I’ve outlined the steps you can take to minimize the impact on your organization […]

Read more
https://systemexperts.com/wp-content/uploads/2019/07/ransomware4.jpg 184 274 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-07-30 15:59:592019-08-23 15:43:10Ransomware - should you pay or not?

How significant is the tool sprawl problem?

June 20, 2019/in Blog Posts, Security /by Brad Johnson

Following up on my post earlier this month on Shadow IT, I wanted to discuss a related issue – “tool sprawl.” Tool sprawl describes an environment where the deployment and use of tools is not managed by a single IT group: applications, software, and tools are installed by end-users because they believe that waiting for […]

Read more
https://systemexperts.com/wp-content/uploads/2019/06/tool-sprawl.jpg 154 328 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-06-20 13:54:222019-08-23 15:42:36How significant is the tool sprawl problem?

Four Tips for Dealing with Shadow IT

June 10, 2019/in Blog Posts /by Brad Johnson

Simply stated, Shadow IT is what happens when people within an organization decide to deploy Information Technology systems and services without approval from the official IT group.  On the positive side, this can be the source of real innovation from within the company without the normal formal approval process that can be time consuming and […]

Read more
https://systemexperts.com/wp-content/uploads/2019/06/Shadow-IT-1.jpg 156 323 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-06-10 09:54:202019-08-23 15:42:48Four Tips for Dealing with Shadow IT
Page 1 of 21123›»

Categories

  • Big Data
  • Blog Posts
  • BYOD
  • HIPAA
  • HIPAA Compliance
  • Industry News
  • IoT
  • ISO 27002
  • PCI Compliance
  • Penetration Testing
  • Security
  • Security Breach
  • Uncategorized

Tags

Alex Chaveriat Big Data Brad Johnson BYOD cloud computing cyber attacks cybersecurity cyber security dark reading data breach Data Loss Prevention data security Digital Guardian GDPR hackers HIPAA Internet of Things IoT IoT security ISO27002 ISO 27002 IT Security Jason Rhykerd Jeff VanSickel Joe Clapp Jonathan Gossels Joseph Kurfehs Mark Huss mobile device security online security password protection Paul Hill Payment Card Industry PCI PCI Compliance PCI DSS Personally Identifiable Information phishing ransomware SC Magazine security security breach Shadow IT Sue Poremba SystemExperts

Archives


Since 1994, SystemExperts has been helping companies see the big picture and design solutions to meet their comprehensive security needs. We over-deliver and provide unmatched personal attention, distilling problems to their root causes and recommending what’s appropriate for every client.

News & Insights

  • Is Your Firewall Providing Adequate Protection?November 25, 2019 - 9:57 pm
  • Cybersecurity Awareness for Asset Management OrganizationsNovember 5, 2019 - 5:12 pm
  • Dark Data: Why is it Important?October 29, 2019 - 5:37 pm

CONTACT US

Tel: 1 (888) 749-9800
Fax: 1 (978) 440-9636

COPYRIGHT © SYSTEM EXPERTS   |   PRIVACY STATEMENT   |   SITE BY RADAR MEDIA
Scroll to top