Due to COVID-19, we are scaling back our operations
/in Blog Posts /by Jonathan GosselsSystemExperts started this year on a high note; we already had new and existing clients signed on and the team here was ready to roll up our sleeves to get to know new clients and provide additional services for our existing clients. We were looking forward to continuing our work, and providing the same high-level […]
2020 Cyber Security Trends
/in Blog Posts, Security /by Brad JohnsonHuman Error Last year I proposed as a trend for 2019 that many security problems would be caused by human error. This is still the case. The reality is that social engineering attacks work: people follow links to insecure websites, they provide personal identifying information to unauthorized accounts, or they open up attachments that may […]
Is Your Firewall Providing Adequate Protection?
/in Blog Posts, Security /by Jason KiteWhat you need to do to keep your data secure Firewall security audits should be conducted at regular intervals and additionally when system configurations are updated or changed. With the addition of new firewalls, hosts or applications, a firewall security audit should follow. Security audits should also be conducted when migrating firewalls or making configuration […]
Cybersecurity Awareness for Asset Management Organizations
/in Blog Posts, Security /by Brad JohnsonMany Asset Management companies are relatively small firms but yet have a large risk profile that makes them a prime target for cybersecurity threats. These companies, like all others, need to have basic blocking and tackling security measures in place to have a solid foundation to try and thwart and detect these threats: Periodic penetration […]
Dark Data: Why is it Important?
/in Blog Posts, Security Breach /by Jonathan ShufflerData you find on the Internet is without a doubt vast and extensive, however, its sources are often hidden and out of reach to all but the most technically savvy. Often, we find ourselves waking up in the morning to learn of another large database breach containing millions of SSN’s that were discovered leaked on […]
IoT Devices’ Security Challenges
/in Blog Posts, IoT /by Brad JohnsonIoT devices bring many of the same basic security challenges as we face with BYOD technologies. That is, you need to think about how they are deployed and configured, functionality and maintenance updates, encryption of data in transit and at rest, authentication and authorization, and general administration. They also bring some new challenges. What adds […]
What’s new in phishing?
/in Blog Posts, Security /by Brad JohnsonI was recently asked to comment on what’s new in phishing. In some sense, phishing attacks are always the same. They count on the fact that some (small) percentages of people will follow links or provide information to sources that haven’t been verified or shouldn’t be trusted. They also know that even though most IT […]
How enterprises can protect themselves against cyber-attacks
/in Blog Posts, Security /by Brad JohnsonI was recently asked to comment on data security in relation to increasing threat of cyber attacks ahead of the upcoming 2020 election. How can enterprises adequately protect the data privacy of their products and services as well as their clients and employees? My response is that there’s no silver bullet to prevent cyber attacks […]
Accepting Credit Cards? PCI Compliance a Concern for Small Businesses
/in Industry News, PCI Compliance /by System ExpertsSue Poremba, contributing writer to Business News Daily, interviewed security experts on why PCI compliance is a concern for small businesses. Here are the tips we offered on how to stay PCI compliant: Identify all business and client data, including any cardholder data, its sensitivity and criticality. Correctly defining the scope of assessment is probably […]
Data Privacy Market Still Has Room for All Entrants
/in Industry News, Security /by System Expertsby Victoria Hudgins, writer, Law.com, July 18, 2019 The rapid growth and complexity of data privacy laws makes the idea of one dominant privacy compliance company unlikely, ensuring lawyers’ seat at the table. In the midst of growing data regulation laws and compliance needs, some privacy compliance technology companies are attracting a slew of investments. […]