Systems Engineering Blog

Five Mistakes Employees Make to Compromise Network Security

January 25, 2019

The 2018 Human Factor report by Proofpoint states that as many as 95% of web-based attacks now incorporate social engineering, or human error factor. So, with that simple fact, how can your organization prevent its employees from releasing confidential and critical information?

Read More »

Encryption, Data Protection, Managed IT, Cybercrime, IT Security

Five IT Best Practices for Organizations to Consider

August 17, 2018

When it comes to security risks and errors, businesses often fall victim to assumptions and oversights. The reality is that the protection of information and applications is always evolving and, as criminals find new ways to exploit weaknesses, it's tough to stay one step ahead.

Read More »

Encryption, Data Protection, Cybercrime, IT Security

Email: To Trust, or Not to Trust?

December 01, 2017

Has anyone at your organization ever received an email that was not what they thought it would be? Maybe it was a message from a vendor looking to verify sensitive account information; a message from an accountant sending completed tax returns in the month of August; or, a note from what appears to be your accounting firm indicating they need you to confirm Social Security Numbers in order to send employee paychecks? 

Read More »

Encryption, Data Protection, Cybercrime, IT Security

SE Lunch & Learn Infographic: Risk Management in the Era of Ransomware

January 29, 2016

Systems Engineering's recent Lunch & Learn titled Risk Management in the Era of Ransomware, took place in three locations on three various dates. SE presenters, Joe McIntyre and Alan Damon, discussed how vulnerable businesses are to ransomware over a natural disaster. No matter what the cause or the suspect, business data continually plays the role of victim.  So, what are businesses doing to backup and recover the data that is imperative to their survival? 

Read More »

Business Continuity, SE Events, Encryption, Data Protection, Data Management

BYOD, MDM, and EMM Demystified

October 02, 2015

It’s no revelation that the age of Bring-Your-Own-Device (BYOD) computing is here and has been for some time. Whether it's with a smart phone, tablet, or smart watch, BYOD is a convenient way for today's workforce to stay connected. Recent surveys show that BYOD adoption, as a business tool, presents a company as more attractive and a "must-have" for millennial-generation job applicants.  

Read More »

Encryption, Managed IT, Network Design & Implementation, Cybercrime, IT Security

Wait a minute, this isn't Windows 10

August 14, 2015

At the risk of giving undeserved kudos, I am going to write it: phishers are clever and tenacious.

On July 29, Microsoft released its latest generation of Windows operating systems, Windows 10. Within days, Internet security bodies such as the Cisco Talos Group began detecting prevalent propagation of CTB-Locker (a variant of the CryptoLocker ransomware virus) targeting users of Windows 7 and 8, crafted to look like the free Windows 10 upgrade. Often delivered by email messages containing .ZIP attachments, the virus encrypts the user’s personal files and demands a ransom to make them usable again.

Read More »

Help Desk, Encryption, Cybercrime, IT Security

Cloud-based Capabilities and More

May 28, 2015

A typical office in 1995, with PC's and email, might have looked very sophisticated to your mother who was used to working with typewriters and physical mailboxes in 1975. In the same cyclical pattern, the office we see in 2015 is not like that of 1995. We now have to consider working from several devices no matter where we are, and access to everything is of utter importance.

Read More »

Business Continuity, Cloud, Encryption, IT Consulting, Data Protection, Data Management, IT Security

CryptoWall Preventative Steps

November 03, 2014

CryptoWall continues to infect and plague both companies and consumers. At this point it is estimated that tens of thousands of machines have been infected and that the perpetrators of CryptoWall have sent millions of emails. While anti-virus software can block some variants of CryptoWall the speed with which criminals are releasing new variants makes it necessary to consider additional protections.

Read More »

Encryption, Network Administration, Cybercrime, IT Security

SE Alert: “POODLE” SSLv3 Vulnerability - Update

October 17, 2014

One of the reasons that the Poodle vulnerability is not assigned the same level of risk as the earlier Heartbleed one is that it requires what is called a “Man in the Middle” attack. This means in order to exploit Poodle the attacker needs to be able to jump on your Internet connection, most likely in a public place like a coffee shop or hotel and then it takes a significant number of attempts to break in.

Read More »

Encryption, SE Alert, IT Security

Virus Notice: Symantec releases definition file with a False Positive

July 24, 2014

Symantec sent out notification earlier today that it had released a virus definition file which contains a False Positive (FP). This FP could result in a false detection and alert for the “Trojan.Webkit!htm” virus. Symantec is currently preparing Rapid Release definitions which will remove this detection. While Symantec is working to fix this issue, SE clients should still contact SE if they see an alert for this or any virus.

Read More »

Encryption, IT Security