SystemExperts
  • Security Testing
  • Compliance
  • Operational Services
  • Vendor Risk Management
  • Other Services
  • Company
    • About Us
    • News & Insights
    • Our Clients
    • Careers
    • Contact Us
  • Menu

NEWS & INSIGHTS

Considering the Use of a CPaaS Provider? Look at the Inherent Risks

August 13, 2019/in Blog Posts, Security /by Paul Hill

The rise of the communications platform as a service (CPaaS) model has many enterprises migrating from on-premises communications to cloud platforms and APIs. CPaaS and APIs offer benefits including improved productivity and third-party app integrations, but before proceeding to adopt CPaaS companies should consider the inherent risks. Remember that the underlying technologies tend to be […]

Read more
https://systemexperts.com/wp-content/uploads/2019/08/CPaaS-4.png 164 307 Paul Hill https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Paul Hill2019-08-13 12:51:222020-03-11 18:30:39Considering the Use of a CPaaS Provider? Look at the Inherent Risks

Ransomware – should you pay or not?

July 30, 2019/in Blog Posts, Security, Security Breach /by Brad Johnson

You may have seen the recent news about cities and towns being held hostage to hackers infecting their data. With over 25 years of experience in cyber security, I’ve seen it all. To help guide you in managing a ransomware attack, I’ve outlined the steps you can take to minimize the impact on your organization […]

Read more
https://systemexperts.com/wp-content/uploads/2019/07/ransomware4.jpg 184 274 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-07-30 15:59:592020-03-11 18:30:39Ransomware - should you pay or not?

How significant is the tool sprawl problem?

June 20, 2019/in Blog Posts, Security /by Brad Johnson

Following up on my post earlier this month on Shadow IT, I wanted to discuss a related issue – “tool sprawl.” Tool sprawl describes an environment where the deployment and use of tools is not managed by a single IT group: applications, software, and tools are installed by end-users because they believe that waiting for […]

Read more
https://systemexperts.com/wp-content/uploads/2019/06/tool-sprawl.jpg 154 328 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-06-20 13:54:222020-03-11 18:30:39How significant is the tool sprawl problem?

Four Tips for Dealing with Shadow IT

June 10, 2019/in Blog Posts /by Brad Johnson

Simply stated, Shadow IT is what happens when people within an organization decide to deploy Information Technology systems and services without approval from the official IT group.  On the positive side, this can be the source of real innovation from within the company without the normal formal approval process that can be time consuming and […]

Read more
https://systemexperts.com/wp-content/uploads/2019/06/Shadow-IT-1.jpg 156 323 Brad Johnson https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Brad Johnson2019-06-10 09:54:202020-03-11 18:30:39Four Tips for Dealing with Shadow IT

Cybercrime: Impact on Manufacturers

May 28, 2019/in Blog Posts /by Paul Hill

With the rise in value of intellectual property, cybercriminals are now aiming their activity on the manufacturing sector. Manufacturers in the past haven’t practiced the strictest of cybersecurity measures, making themselves quite vulnerable today. The exception to this are industries, such as chemical and pharmaceutical manufacturing, which are subject to federal regulations regarding cybersecurity. Within […]

Read more
https://systemexperts.com/wp-content/uploads/2019/05/manufacturing-cyber.jpg 183 275 Paul Hill https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Paul Hill2019-05-28 17:11:362020-03-11 18:30:39Cybercrime: Impact on Manufacturers

Disaster Recovery as a Service

May 15, 2019/in Blog Posts /by Jason Kite

Disaster Recovery as a Service, or DRaaS, helps safeguard your company from IT outages and helps build a resilient IT system to maintain servers and network usage throughout recovery processes. DRaaS uses cloud resources to protect applications and data from disruption caused by disaster and gives an organization a total system backup that allows for […]

Read more
https://systemexperts.com/wp-content/uploads/2019/05/DRaaS.jpg 174 290 Jason Kite https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Jason Kite2019-05-15 11:58:572020-03-11 18:30:39Disaster Recovery as a Service

How important is AWS certification for career success?

April 17, 2019/in Blog Posts /by Paul Hill

Many companies specify the need for a certification in job postings simply to weed out unqualified candidates as quickly as possible. The reality is that for most companies, real world experience and demonstrated success will count more than a certification. For a long term career path with few limitations a much better choice is to […]

Read more
https://systemexperts.com/wp-content/uploads/2019/04/certifications.jpg 343 480 Paul Hill https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Paul Hill2019-04-17 10:16:492020-03-11 18:30:39How important is AWS certification for career success?

How Companies Can Protect Themselves from Ransomware

April 2, 2019/in Blog Posts, Security Breach /by Paul Hill

I was recently asked about ransomware and how companies can defend themselves. The most common vectors of infection for ransomware are via email, such as attachments and malicious links in the email,  and exploit kits, which are usually executed when a victim visits a compromised websites. Some organizations assert that approximately 60 percent of ransomware […]

Read more
https://systemexperts.com/wp-content/uploads/2019/04/ransomware7.jpg 191 263 Paul Hill https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Paul Hill2019-04-02 09:10:382020-03-11 18:30:39How Companies Can Protect Themselves from Ransomware

Protecting the Critical Infrastructure from cyber warfare

March 18, 2019/in Industry News, Security Breach /by Joe Clapp

by Joe Clapp, senior consultant, SystemExperts for SC Magazine, March 13, 2019 Cyber attacks are hard to prevent. A cyberattack against our nation’s critical infrastructure (CI) is especially hard to thwart and could have devastating consequences to our human existence. Most everyone is aware of the catastrophic risk the electrical grid faces from a cyberattack. […]

Read more
https://systemexperts.com/wp-content/uploads/2019/01/SC-Magazine.png 458 1068 Joe Clapp https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Joe Clapp2019-03-18 09:16:452020-03-11 18:30:39Protecting the Critical Infrastructure from cyber warfare

AI in Cybersecurity: How it can be tricked

February 25, 2019/in Blog Posts /by Paul Hill

Using AI to provide cybersecurity solutions has received a lot of press in the past two years. The reality is that most “AI cybersecurity” products use Machine Learning (ML) techniques, which is just one subset of a broader range of techniques associated with deep AI. ML techniques are being used in several cybersecurity domains including: […]

Read more
https://systemexperts.com/wp-content/uploads/2019/02/machine-language.jpg 225 224 Paul Hill https://systemexperts.com/wp-content/uploads/2019/08/System-Experts-Logo3.png Paul Hill2019-02-25 12:27:082020-03-11 18:30:39AI in Cybersecurity: How it can be tricked
Page 2 of 29‹1234›»

Categories

  • Big Data
  • Blog Posts
  • BYOD
  • HIPAA
  • HIPAA Compliance
  • Industry News
  • IoT
  • ISO 27002
  • PCI Compliance
  • Penetration Testing
  • Security
  • Security Breach
  • Uncategorized

Tags

Alex Chaveriat Big Data Brad Johnson BYOD cloud computing Construction DIVE cyber attacks cybersecurity cyber security dark reading data breach Data Loss Prevention data security Digital Guardian Disaster Recovery Plans GDPR hackers HIPAA Internet of Things IoT IoT security ISO 27002 IT Security Jason Rhykerd Jeff VanSickel Joe Clapp Jonathan Gossels Joseph Kurfehs Mark Huss Microsoft online security password protection Paul Hill Payment Card Industry PCI PCI Compliance PCI DSS Personally Identifiable Information phishing ransomware SC Magazine security security breach Shadow IT SystemExperts

Archives


Since 1994, SystemExperts has been helping companies see the big picture and design solutions to meet their comprehensive security needs. We over-deliver and provide unmatched personal attention, distilling problems to their root causes and recommending what’s appropriate for every client.

News & Insights

  • Due to COVID-19, we are scaling back our operationsMarch 31, 2020 - 9:06 pm
  • 2020 Cyber Security TrendsDecember 20, 2019 - 2:30 pm
  • Is Your Firewall Providing Adequate Protection?November 25, 2019 - 9:57 pm

CONTACT US

Tel: 1 (888) 749-9800
Fax: 1 (978) 440-9636

COPYRIGHT © SYSTEM EXPERTS   |   PRIVACY STATEMENT   |   SITE BY RADAR MEDIA
Scroll to top