1.888.749.9800

Penetration Testing

Cyber Warfare Exercise: part two

There are only two certainties in a company’s life: Taxes and your network will be hacked.

I recently returned from the 15-day cyber warfare exercise hosted by the Massachusetts Army National Guard.  Attendees included soldiers and airmen from Vermont, New Hampshire, Maine, Massachusetts, Connecticut, and Rhode Island as well as personnel from private organizations such as […]

By |June 6th, 2016|Blog, Penetration Testing, Security Breach|Comments Off on Cyber Warfare Exercise: part two

Cyber Warfare Exercise

cyberwarriorIn the next few weeks I will be participating in an intensive 15-day cyber warfare exercise hosted by the Massachusetts Army National Guard.  This exercise is conceptualized around a cyber attack affecting critical infrastructure in the Northeast with an emphasis on public and private collaboration.

I will be working on a “Red […]

By |May 5th, 2016|Blog, Penetration Testing|Comments Off on Cyber Warfare Exercise

What’s Ethical Hacking?

Often in social situations, when people ask what I do for living, I have to pause for a moment.  If I want to deflect the conversation, I just say “computer security” and their eyes usually glaze over and we move on to other topics.  However, if I’m honest and say “ethical hacking,” this invariably arouses more interest. […]

By |April 7th, 2016|Blog, Penetration Testing|Comments Off on What’s Ethical Hacking?

Exciting Opportunities at SystemExperts

This is not a typical blog from us where we discuss security issues and solutions, but rather a post letting you know about two exciting positions now available on our team. If you are interested in applying, please contact us at SystemExperts.

Information Security Compliance Consultant

We are looking for an IT security/compliance consultant to assist in the performance […]

By |October 19th, 2015|Blog, HIPAA Compliance, PCI Compliance, Penetration Testing|Comments Off on Exciting Opportunities at SystemExperts
  • Permalink Gallery

    Biggest Misconceptions Companies have about Endpoint Security Tools

Biggest Misconceptions Companies have about Endpoint Security Tools

If I had to choose only one misconception that companies have about endpoint security tools, it is the hope that one solution will resolve most of their concerns. Unfortunately, the appropriate security will largely depend on the type of object you’re trying to protect. Therefore, you have to put in the time and effort to figure out the variety […]

By |February 6th, 2015|Blog, Penetration Testing|Comments Off on Biggest Misconceptions Companies have about Endpoint Security Tools

Steps SMBs Should Take to Protect Their Data

With security breaches continuing to dominate the news, I’d like to take this opportunity to share my response to a recent Q&A addressing the steps small businesses should take to protect their data against security breaches. 

1.  What steps should small businesses take to protect their data and e-commerce sites?

One of the most important steps is to tightly control access to […]

By |October 21st, 2014|Blog, Penetration Testing|Comments Off on Steps SMBs Should Take to Protect Their Data
  • Insider Threat
    Permalink Gallery

    Insider Threats – More Damaging In Today’s Highly Connected Society

Insider Threats – More Damaging In Today’s Highly Connected Society

Insider threat —  a problem that evolves and changes, but never goes away

Sam Greengard, a contributing writer to CIO Insight, recently posed the question of how business can prevent insider threats. This is a challenge for most business because they lack the ability to detect or deter them.  In Sam’s

By |October 17th, 2014|Blog, Penetration Testing|Comments Off on Insider Threats – More Damaging In Today’s Highly Connected Society

How to Prevent Insider Threats

Samuel Greengard, contributing writer for CIO Insight, October 15, 2014

Insider threats aren’t going away anytime soon. Unfortunately, most businesses say they lack the ability to detect or deter them, nor are they adequately prepared for how to respond.

Over the last few years, especially in the wake of former contractor Edward Snowden’s disclosures about the National Security […]

By |October 17th, 2014|ISO 27002, News & Events, Penetration Testing|Comments Off on How to Prevent Insider Threats
  • Permalink Gallery

    An Expert Guide to Securing Sensitive Data: 34 Experts Reveal the Biggest Mistakes Companies Make with Data Security

An Expert Guide to Securing Sensitive Data: 34 Experts Reveal the Biggest Mistakes Companies Make with Data Security

Digital Guardian, October, 8, 2014

“The #1 biggest mistake companies make when it comes to securing sensitive data”

Keeping sensitive information secure from theft and vulnerability in today’s digital world isn’t as easy as putting a lock on the file cabinet – especially with the widespread adoption of cloud computing. And […]

By |October 9th, 2014|News & Events, Penetration Testing|Comments Off on An Expert Guide to Securing Sensitive Data: 34 Experts Reveal the Biggest Mistakes Companies Make with Data Security

How Do I Secure Sensitive Data?

How do I secure sensitive data?  The first step is knowing where your sensitive data resides. Second is having set policies to systematically and consistently categorize the data and having controls in place to ensure that all categories of data are handled appropriately.

For example, if a company had a policy that said that any dataset that contain personally identifying […]

By |September 29th, 2014|Blog, Penetration Testing|Comments Off on How Do I Secure Sensitive Data?

7 more security tips for mobile users (Part II)

Joe Stangarone, writer,  MRCs Cup of Joe Blog, September 9, 2014

Summary: Users have notoriously bad security habits. The problem is, many of these users are now bringing their personal devices–and their poor security habits–into the workplace. Learn how these users can better protect themselves (and your data) with these simple tips.

By |September 9th, 2014|News & Events, Penetration Testing|Comments Off on 7 more security tips for mobile users (Part II)

Surviving a Breach

The Target breach is making many in the IT security field take a closer look at their company’s information security and compliance practices. I’d like to share here some of the questions and answers from a recent media interview looking at “How to Survive a Breach.”

1. Are most companies prepared for a cyber breach?

We find […]

By |August 28th, 2014|Blog, PCI Compliance, Penetration Testing|Comments Off on Surviving a Breach
  • Permalink Gallery

    Don’t Forget the Basics to Protect Against Security Threats and Your Online Reputation

Don’t Forget the Basics to Protect Against Security Threats and Your Online Reputation

Jessica Merritt of Online Reputation Management  recently asked the question —  what are the biggest security threats facing companies today and how do they have the potential to effect reputation? In her article – click here – she identifies 9 tips to protect against security threats and compromised reputations. While one of my tips was included in her […]

By |August 13th, 2014|Blog, Penetration Testing|Comments Off on Don’t Forget the Basics to Protect Against Security Threats and Your Online Reputation

7 Security Tips for Mobile Users

Joe Stangarone, writer,  MRCs Cup of Joe Blog, August 12, 2014

Summary: As smartphone usage grows in the business, many users still don’t understand proper security practices. If not addressed, this problem could put their (and your company’s) sensitive data at risk. Learn how your users can better protect themselves from mobile security […]

By |August 13th, 2014|News & Events, Penetration Testing|Comments Off on 7 Security Tips for Mobile Users
  • Permalink Gallery

    Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation

Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation

Online Reputation Management — Jessica Merritt, August 2014

With such serious security risks threatening every organization’s reputation, it’s clear that companies can benefit from tight security. And we’ve seen that even companies like Target that may think they have security under control still have serious room for improvement. How do security experts recommend that companies protect […]

By |August 13th, 2014|News & Events, Penetration Testing|Comments Off on Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation