1.888.749.9800

Security Breach

Ransomware – should you pay or not?

You may have seen the recent news about cities and towns being held hostage to hackers infecting their data. With over 25 years of experience in cyber security, I’ve seen it all. To help guide you in managing a ransomware attack, I’ve outlined the steps you can take to minimize the impact […]

By |July 30th, 2019|Blog, Security, Security Breach|Comments Off on Ransomware – should you pay or not?

How Companies Can Protect Themselves from Ransomware

I was recently asked about ransomware and how companies can defend themselves. The most common vectors of infection for ransomware are via email, such as attachments and malicious links in the email,  and exploit kits, which are usually executed when a victim visits a compromised websites.

Some organizations assert that approximately 60 percent of […]

By |April 2nd, 2019|Blog, Security Breach|Comments Off on How Companies Can Protect Themselves from Ransomware

Protecting the Critical Infrastructure from cyber warfare

by Joe Clapp, senior consultant, SystemExperts for SC Magazine, March 13, 2019

Cyber attacks are hard to prevent. A cyberattack against our nation’s critical infrastructure (CI) is especially hard to thwart and could have devastating consequences to our human existence. Most everyone is aware of the catastrophic risk the electrical grid faces from a cyberattack. To put it in perspective, […]

By |March 18th, 2019|News & Events, Security Breach|Comments Off on Protecting the Critical Infrastructure from cyber warfare

DNS: Don’t ignore the risk to your company

by Sam Greengard, writer, Security Roundtable, February 19, 2019

It’s 5:30pm and you’re still at work going through the last batch of emails. You’re feeling a bit overwhelmed after a long day—you want to get home to dinner—when you see an e-mail from a co-worker that looks important. It has your name in it, the graphics look authentic and […]

By |February 19th, 2019|News & Events, Security Breach|Comments Off on DNS: Don’t ignore the risk to your company

Three Security Predictions for 2019

I was recently asked my thoughts about cyber security trends for the 2019. Here are a few of my predictions:

1. Many security issues will still be caused by human error. Despite many technology advances, a significant number of issues are caused by people using bad judgement or organizations deploying hardware and services insecurely. The reality is that […]

By |January 15th, 2019|Blog, Security Breach|Comments Off on Three Security Predictions for 2019

Guideline for Reporting a Cyber Incident

In our last blog post, we covered the best practices for creating and implementing an Incident Response Plan (IRP). As a follow-on to that post, we’d like to share insight on the steps an organization can take for reporting a cyber incident. Any incident that has the potential to cause significant damage to the confidentiality, integrity, or […]
By |January 9th, 2019|Blog, Security Breach|Comments Off on Guideline for Reporting a Cyber Incident
  • Permalink Gallery

    Three Best Practices for Creating and Implementing an Incident Response Plan

Three Best Practices for Creating and Implementing an Incident Response Plan

A cyber incident can have serious consequences. When a potential incident occurs that could negatively impact the confidentiality, integrity and authenticity of your company’s data, fear and confusion can consume the organization. In the military, we refer to this as “the fog of war.” To avoid a misstep during the critical post-incident response time, the organization should […]
By |December 17th, 2018|Blog, Security Breach|Comments Off on Three Best Practices for Creating and Implementing an Incident Response Plan
  • Permalink Gallery

    ‘Tis the Season to Protect Your Identity: Online Shopping Security

‘Tis the Season to Protect Your Identity: Online Shopping Security

by Alayna Pehrson, content management specialist for Best Company, November 26, 2018

It’s the time of year when people start making both online and in-store purchases for their loved ones. When holiday deals appear, most people enjoy indulging the spirit of giving. Unfortunately, many identity thieves and cybercriminals don’t feel the same spirit and often target holiday shoppers.

According to a […]

By |November 27th, 2018|News & Events, Security Breach|Comments Off on ‘Tis the Season to Protect Your Identity: Online Shopping Security

Cybersecurity Tips for the Holiday Season

In my last post I offered tips to keep personal online holiday shopping safe and to help prevent fraud on any of your accounts. Today I’d like to offer small retailers some advice to make sure their IT infrastructure is up-to-date and ready to handle the holiday rush.

Before the holiday season kicks into high […]

By |November 15th, 2018|Blog, Security Breach|Comments Off on Cybersecurity Tips for the Holiday Season

Protecting from Phishing and Spear-Phishing

SystemExperts Corporation is aware that many companies are seeing spear-phishing attempts where the emails purport to be from internal employees. We have also heard reports that compromised email accounts have been used to send spear-phishing emails to third-parties and the owner of the compromised accounts do not see the emails being sent on their behalf, nor the […]
By |October 15th, 2018|Blog, Security Breach|Comments Off on Protecting from Phishing and Spear-Phishing
  • Permalink Gallery

    Employers overlook a key ally in preventing cyberattacks: HR departments

Employers overlook a key ally in preventing cyberattacks: HR departments

by Caroline Hroncich, associate editor, Employee Benefit News, September 24, 2018

Everyone gets them — an email message that looks exactly like it came from a co-worker or a supervisor. It may come with a link that asks an employee to log in with a company username and password. To the untrained eye it seems harmless.

But employees need to think […]

By |September 24th, 2018|News & Events, Security Breach|Comments Off on Employers overlook a key ally in preventing cyberattacks: HR departments

How to Protect Your Security Online

I was recently asked a series of questions about how to protect your security online. I’d like to share the answers here – and please feel free to reach out if you have any comments.

1. How can you create the best passwords that are hacker-proof but easy to remember?  

The best passwords aren’t […]

By |September 11th, 2018|Blog, Security Breach|Comments Off on How to Protect Your Security Online

How Do You Define Success for a Cyber Security Team?

Is it risk reduction? Training employees? Fighting back against targeted attacks?

The easy answer to this question is to build a comprehensive and mature Security Program. The difficult part is identifying every critical component that make this a success. Remembering that any security program is only as strong as the weakest link, you must build […]

By |August 28th, 2018|Blog, Security Breach|Comments Off on How Do You Define Success for a Cyber Security Team?

Q&A On Reconstructing Data After a Disaster

I was recently asked about best practices for a business to reconstruct its data after a disaster by John Edwards, TechTarget. John included my tip noting that once a disaster involving data loss is identified, you must act fast to preserve your environment to prevent further damage, and to protect the archived data itself. Here are some addition […]
By |July 24th, 2018|Blog, Security Breach|Comments Off on Q&A On Reconstructing Data After a Disaster
  • Permalink Gallery

    Survey: Small construction companies lukewarm on tech investment

Survey: Small construction companies lukewarm on tech investment

by , author, Construction DIVE, February 28, 2018

Dive Brief:

  • A recent customer survey from small business funding siteKabbage revealed that fewer than 35% of small construction companies planned to make investments at some level this year in technologies that could help their businesses and further bring them into the digital age.
  • More than 65% of […]
By |March 1st, 2018|News & Events, Security Breach, Uncategorized|Comments Off on Survey: Small construction companies lukewarm on tech investment