blog-banner-image.jpg

Systems Engineering Blog

Creating a Culture of Security

July 06, 2018

It seems we can’t go more than 24 hours without hearing about the latest and greatest data breach that affects millions. So we ask ourselves, “What can we do better?” After all, if the “bad guys” can hack into the federal government, Home Depot, and Target, what hope do small and medium-sized businesses have?

Read More »

Business Continuity, Data Protection, Compliance, IT Strategy, Cybercrime, IT Security

What is Shadow IT and How do you Approach IT?

June 29, 2018

Most employees want to be productive.  As cloud service consumers, they have become accustomed to finding a tool or app that will help fill a need and simply buy it without obtaining approval from the organization first.  This practice of employees bypassing IT management to procure tools and services without proper vetting has infiltrated the workplace and is known as Shadow IT.

Read More »

IT Security, Cloud, Compliance, Data Management, Digital Transformation

How to standardize, document, implement, maintain, and control Standard Operating Procedures

March 02, 2018

Learning how Quality Management Systems (QMS) and Standard Operating Procedures (SOPs) can positively affect an organization assures consistency and accuracy. Let's take a look at each.

Read More »

Quality Management, Compliance

When is it time to conduct a Root Cause Analysis?

September 15, 2017

In my blog article posted on July 14, 2017, I covered the Foundations of Quality and Continuous Improvement which discussed the importance of establishing business quality across the board. In this blog post, I will talk about Root Cause Analysis, a method used to discover the root or cause of an issue or problem when quality breaks down.

Read More »

Business Continuity, Compliance

SE CleanMail has you covered.

March 17, 2017

Email can work for you, and it can be used against you. On the positive side, it's a tool that allows organizations to collaborate, communicate, and save time.

On the negative side, cybercriminals are savvy enough to use it as a weapon to send phishing and spear-phishing emails to unsuspecting recipients allowing confidential data to be exposed and money to be stolen.  

Read More »

Data Protection, Compliance

Guest Blog: How to Read a SOC Examination Report

November 30, 2016

Many organizations include the review of Service Organization Controls (SOC) examination reports in their annual vendor due diligence activities; however, most are unsure of what they should be looking for in the report.  Determining what is relevant and knowing how to read a SOC examination report can help to ensure that organizations get the most value and assurance out of their review.

Read More »

Compliance

SE Guest Blog: Information Security Officer - It's not just a cool title

November 04, 2016

The role of the Information Security Officer (ISO) varies based on the size and complexity of an organization. It may be a full or part-time position held by an employee having only ISO responsibilities or by an employee having other roles within the organization. A primary role of the ISO is to work with management to strengthen its information security program and to protect the organization’s information assets.

Read More »

Compliance

SE Guest Blog: Security Awareness Training - Purpose and Approaches

October 04, 2016

Systems Engineering is happy to host a guest blog series that highlights various expertise in the business community around us. This week, the author, Durward Ferland, Jr., comes to us from Macpage, a certified public accounting firm located in S. Portland and Augusta, ME as well as Marlborough, MA. In this blog article, Durward writes about the importance of Security Awareness Training in business organizations today. 


Read More »

Compliance, Cybercrime, IT Security

SE Lunch & Learn Recap:  Information Security Evolution and the Modern Network

October 07, 2015

Systems Engineering’s (SE) Lunch & Learn "Information Security Evolution and the Modern Network" was recently held in Bangor and Portland, ME and Nashua, NH.  This event covered cybersecurity, its current state, how threat intelligence has grown, and an overview of the evolving layers of security. 

Read More »

SE Data Points, Compliance, IT Security

Software Vendors Shifting Support Policies

October 07, 2015

Sometimes organizations can be reluctant or confused about when to upgrade their software to the most current release.  Operating system (OS) and application users often contend that some software releases deliver less incremental improvements in features and functionality than earlier releases, opting to wait for the next release.

Read More »

SE Data Points, Compliance, IT Strategy