blog-banner-image.jpg

Systems Engineering Blog

In case of a disaster, retrieve backup.

April 17, 2018

Are you aware of the amount of data you have? Do you know how to manage your data growth? Do you know how long it will take to recover your critical data and applications in the event of a disaster?

Read More »

Business Continuity, SE Events, Cloud, SE Data Points, Data Protection, Data Management, IT Strategy

Email: To Trust, or Not to Trust?

December 01, 2017

Has anyone at your organization ever received an e-mail that was not what they thought it would be? Maybe it was a message from a vendor looking to verify sensitive account information; a message from an accountant sending completed tax returns, but in the month of August; or a note from what appears to be your accounting firm, indicating they need you to confirm Social Security Numbers in order to send employees paychecks? 

Read More »

Encryption, Data Protection, Cybercrime, IT Security

IT's Cyber Monday, So Be Cyber Aware

November 27, 2017

As we all work through our holiday gift giving lists this "Cyber Monday," it's important to be cyber aware of "the Grinch" lurking in the corners waiting to steal our private, and what we hope and think is secure, information. So, before you begin to cross the names off your list while experiencing that great sense of accomplishment, take a few moments to read through these "cyber shopping" best practices to protect yourself and your information. Nobody wants to spend the holidays recovering their data and identity.

Read More »

Data Protection, Cybercrime, IT Security

Five IT Best Practices for Organizations to Consider

May 26, 2017

When it comes to security risks and errors, businesses often fall victim to assumptions and oversights. The reality is that the protection of information and applications is always evolving and, as criminals find new ways to exploit weaknesses, it's tough to stay one step ahead.

Read More »

Encryption, Data Protection, Cybercrime, IT Security

Data breaches are only getting worse. So, what is your organization doing about IT?

May 12, 2017

Data breach attacks are only getting more sophisticated and gaining more traction. They're happening to individuals at home, employees within organizations who click on the wrong link, CEOs who are targeted in a  Business Email Compromise, and the list goes on. What's even worse is that small- to medium-sized businesses are more of a target than the large corporations. According to Verizon's 2017 Data Breach Investigations Report, 61% of all data breach victims are businesses under 1,000 employees. 

Read More »

Data Protection, Cybercrime, IT Security

Creating a Culture of Security

April 24, 2017

It seems we can’t go more than 24 hours without hearing about the latest and greatest data breach that affects millions. So we ask ourselves, “What can we do better?” After all, if the “bad guys” can hack into the federal government, Home Depot, and Target, what hope do small and medium-sized businesses have?

Read More »

Business Continuity, Data Protection, Compliance, IT Strategy, Cybercrime, IT Security

SE CleanMail has you covered.

March 17, 2017

Email can work for you, and it can be used against you. On the positive side, it's a tool that allows organizations to collaborate, communicate, and save time.

On the negative side, cybercriminals are savvy enough to use it as a weapon to send phishing and spear-phishing emails to unsuspecting recipients allowing confidential data to be exposed and money to be stolen.  

Read More »

Data Protection, Compliance

Symantec Vulnerability Identified

July 01, 2016

On June 28, Google's Project Zero discovered a major vulnerability in Symantec and Norton products, including Symantec Endpoint Protection (SEP) and Mail Security for Exchange. Symantec has released a new version of SEP and patches for the Exchange product that resolves the vulnerability. Symantec Cloud users will automatically receive the update for the vulnerability while Symantec Enterprise SEP, and the discontinued Symantec Small Business Edition (SBE) users, will require a small project to install and apply the updates.  

Read More »

Data Protection, SE Alert, Cybercrime, IT Security

Wrapping IT Up: Write and Maintain a Mobile Device Management Policy

May 20, 2016

The time to think about Mobile Device Management (MDM) solutions and policies isn’t after employees start using various personal devices for work. 

At our recent Lunch & Learn, Personal Devices and Corporate Data: The impact of BYOD and MDM in the workplace, Elek Miller of Drummond Woodsum stated, “You need to carefully consider your policies & procedures and document them prior to any employee using a device for work.  It is one of the most important/first things you should do prior to implementing any MDM solution.” 

Read More »

Data Protection, IT Strategy, Managed IT, Technology Trends

Foggy on your Cloud Backup?

May 09, 2016

If you take a quick look at your network, you might notice the following: workstations, server(s), applications, and a nifty cloud backup. The cloud backup was probably simple to set up and it seems to be capturing information and data successfully, all with a price tag that is less than your parking spot in the city. However, it is likely that you are unsure of the exact data it’s capturing and you would love to check on it nightly, but don’t have the time. 

Read More »

Cloud, Data Protection, Data Management, Cybercrime