888.624.6737

syse-blog-header

Data Backup and Replication: Why Organizations May Need Both

SECURITY ALERT: FortiClient EMS - (CVE-2023-48788 & CVE-2023-47534)

Unsupported Operating Systems (OS) and Software

Mobile Application Management (MAM): Secure Critical Data on BYOD

Systems Engineering to Lead Cyber Risk Panel Discussion at The ESOP Association New England Chapter 2024 Spring Conference

Defend Your SMB Against Brute-Force Attacks: 8 Essential Strategies

Systems Engineering Elevates Cybersecurity Leadership with Kent Goodrow as New Chief Information Security Officer

SECURITY ALERT: Cisco Expressway Series Cross-Site Request Forgery Vulnerabilities

SECURITY ALERT: FortiOS Critical Remote Code Execution (CVE-2024-21762 & CVE-2024-23113)

Technology Trends Every SMB Must Know About in 2024

SECURITY BULLETIN: Microsoft to Start Enforcing Multifactor Authentication

Artificial Intelligence: Balancing AI Adoption and Cybersecurity

Essential Questions to Ask Your Potential IT Managed Service Provider

How to become a Cyber-Resilient Organization

SECURITY ALERT: Cisco Unified Communications Products Remote Code Execution Vulnerability

CMMC Proposed Rule is Here: What You Need to Know

Prepare for M365 Copilot: Unleash Potential and Enhance Productivity

SECURITY ALERT: Citrix NetScaler ADC and Gateway Zero-Day Vulnerabilities

Single Sign-On (SSO): What It Is and How It Works

SECURITY ALERT: Cisco Unity Connection Unauthenticated Arbitrary File Upload Vulnerability: CVE-2024-20272

SECURITY ALERT: FortiOS & FortiProxy - Improper authorization for HA requests: CVE-2023-44250

What is a SOC 2 Compliance Report and Why it Matters to Your Business

Artificial Intelligence: Productivity Benefits and Risks

Fueling Organizational Growth: Embracing a Culture of Productivity

5 Strategic IT Investments Every Company Should Make in 2024

SERVICE NOTICE: Zix Email Services Degraded

Shadow IT-The Silent Threat to Cybersecurity

Unveiling State and Local Government Strategies to Strengthen Cybersecurity Resilience

Preparing and Budgeting for Cyber Insurance

What is Multi-Factor Authentication (MFA) How it Protects Data

Creating a Culture of Security

How Microsoft Copilot Can Boost Business Productivity with AI

Systems Engineering: A Decade of Excellence and Employee Satisfaction

Executive Business Review: The Art of Aligning Business and IT

Microsoft Retiring Stream (Classic): Here's what to do.

Plan, Control, & Reduce Risk With a Technology End-of-Life Strategy

Systems Engineering Announces New Adaptive Cybersecurity Framework based on a Proprietary Methodology and the NIST CSF

SECURITY ALERT: Citrix ADC and Citrix Gateway Vulnerabilities

Business Benefits of the NIST Cybersecurity Framework

SECURITY ALERT: FortiOS & FortiProxy heap-based buffer overflow vulnerability: FG-IR-23-097

Understanding ChatGPT: Risks and Precautions for Your Organization

Systems Engineering Named 2023 MSP Rookie Partner of the Year by Arctic Wolf

Hybrid IT Services Model: Best of Both Insourcing and Outsourcing

SECURITY ALERT: Critical Zero-day Update Available for iPhone, iPad, and Mac

SECURITY BULLETIN: MFA Number Match Security Upgrade

Why Your Business Needs a Cybersecurity Risk Assessment

SECURITY ALERT: Microsoft has released information on a recent vulnerability in the Outlook client on Windows devices CVE-2023-23397

SECURITY ALERT: Fortinet Discovers Critical Flaw | FG-IR-23-001

Systems Engineering Promotes Bradford Sprague to Director, Sales

SECURITY ALERT: Citrix Virtual Apps and Desktops Vulnerability

SECURITY ALERT: Hackers Using Microsoft OneNote Attachments to Deliver Malware

Systems Engineering Promotes Eric Tennyson to Chief Financial Officer

5 Cybersecurity Tips to Stay Safe Online

SECURITY ALERT: FortiOS SSL-VPN Vulnerability Exploited

What you should know about Shopping Online Safely

Systems Engineering Promotes Jen Hughes to Director of Newly Formed Office of People & Culture

With Windows 10 end-of-support in sight, it's time for Windows 11

SECURITY ALERT: Authentication Bypass Security Vulnerability Found in Fortinet Firewalls and Web Proxies

Systems Engineering Announces Security Operations Partnership with Arctic Wolf

SECURITY ALERT: VMware Tools local privilege escalation vulnerability

Is Your Backup and Restore Strategy Putting Data at Risk?

Critical Reasons You Must Enable Multi-Factor Authentication (MFA)

SECURITY BULLETIN: Mitel MiConnect VOIP Zero-Day Vulnerability

Data Breach: 5 Critical Questions Answered

5 Qualities of a Reliable Cloud Migration Partner

Cyber Risks of Poor Security Patch Management

3 Practical Tips for Creating Strong Passwords

Systems Engineering Earns Cybersecurity Maturity Model Certification (CMMC) Registered Provider Organization Credentials

Systems Engineering Promotes Erik Thomas to Director of Advisory Services

SECURITY BULLETIN: Russian Cyberattack Risks Escalate Based on Evolving Intelligence

3 Security Best Practices to Prevent Ransomware

Business Continuity Planning: Hybrid Workforce Considerations

Avoid Email Security Compromises With These Best Practices

What is Zero Trust?

Top 5 Cybersecurity Best Practices for Small to Medium Businesses

How to Manage and Mitigate Cybersecurity Risks

Microsoft's New Commerce Experience (NCE) for CSP

SECURITY ALERT: log4j-CVE-2021-44228

911 and E911 in the Hybrid Workplace

What is E-rate and how does it work?

Patch Management Best Practices

What is Patch Management and why is it important?

SECURITY ALERT: November 2021 Exchange Server Security Updates

Data Breach Prevention: 5 Common Threats To Be Aware Of

3 Bad Practices that Increase Cybersecurity Risk

2022 SMB Technology Budget and Investment Considerations

Ways to Approach and Measure Your Cybersecurity Risks

Windows 11 Advisory: Should I upgrade now?

Systems Engineering Named One of Maine's Best Places to Work in 2021

Microsoft 365 To Increase Rates in 2022

Key Technology Considerations Before Your Office Relocation

Closing the Gender Gap in Maine Tech Careers

How a Dynamic Cloud Security Strategy Keeps You Ahead of the Cybercriminals

SECURITY ALERT: MS Exchange Server Remote Code Execution Vulnerability

Return to the Workplace: Executives Discuss Strategies and Challenges

SECURITY BULLETIN: Kaseya VSA Security Incident

SECURITY ALERT: Windows Print Spooler Vulnerability - PrintNightmare

How Protected is Your Organization Against Cyberattacks?

10 Cybersecurity Best Practices for SMBs

Top Cybersecurity Risks for SMBs and Controls to Minimize the Threats

What is Cloud Security?

Return to the Workplace: Maintain Productivity and Avoid Hurdles

Data breaches are only getting worse. What is your organization doing about IT?

The Evolution of Identity and Access Management (IAM)

SECURITY ALERT: Microsoft On-Premises Exchange Server Vulnerability for April 2021

SECURITY ALERT: Multiple Fortinet Operating System Vulnerabilities

SECURITY ALERT: Cisco Jabber Desktop and Mobile Client Software Vulnerabilities

The Benefits of Breaking the 'Cyberhoarding' Cycle

Changes in Cloud Technologies: Don’t Go It Alone

SECURITY BULLETIN: Qualys Update on Third-Party Security Incident

SECURITY ALERT: Microsoft On-Premises Exchange Server Vulnerabilities

What You Need to Know Before a Microsoft Azure Cloud Migration

SECURITY ALERT: Microsoft Netlogon Enforcement Impact on Unsupported Operating Systems

3 Cost-Effective Cybersecurity Tools for Breach Prevention

Phishing Tactics That Work!

3 Critical Cybersecurity Strategies To Fight Evolving Cybercrime

Enhancing Our IT Help Desk Support

What is Digital Transformation?

Statistics Warn About the Urgent Need for MFA

SECURITY BULLETIN: Adobe Flash No Longer Supported

Employee Spotlight: Bradford Sprague

SECURITY BULLETIN: SolarWinds Compromise Advisory Statement

The Pivot: How We Re-Invented Our Summer 2020 Internship Program

4 Business Continuity Questions About Your Remote Work Strategy

How Data Loss Prevention (DLP) Protects Your Sensitive Information

IT Budgeting Tips and Best Practices

3 Work-From-Home Scenarios For Long-Term Productivity and Security

Systems Engineering Named One of Maine's Best Places to Work in 2020

Prevent Hackers From Gaining Network Access With Compromised Credentials

End-of-Life for Microsoft Office 2010

SD-WAN: Business Drivers and Benefits

5 Cloud Security Essentials Every Business Should Have

5 Common Legal Issues Surrounding Mobile Device Management (MDM)

3 Steps to a More Secure Remote Workforce

Reduce Risks With IT Project Management

3 Considerations You Must Know When Planning Any IT Project

The Microsoft Modern Desktop: Migrating with Confidence

Why Should My Business Consider Managed IT Services?

Why You Need a Human Firewall for Network Security

Bugged by the Microsoft 365 App Updates? Check Out What They Did!

Microsoft Office 365 SMB Subscription Name Changes

SMBs Targeted by Cybercriminals Exploiting COVID-19

3 Pronouns to Simplify Organization of Microsoft 365 Communication

Systems Engineering Is Now a Microsoft Premier Support Partner

Systems Engineering Receives Gold Certification for Worksite Wellness

Boots2Roots - A Partnership Worth Celebrating

Corporate WiFi vs. Guest WiFi Access - Does it really matter?

Latest Video Conferencing Phishing Email Scams

5 Tips for Recruiting Talent During a Pandemic

Digital Inclusion for Maine Students: A Call for Support

Security Bulletin: Zoom Credentials on the Dark Web

WORK FROM HOME: Don't Let Cybersecurity be an Afterthought 

How Microsoft Cloud Services Protects Your Data During a Pandemic

Working From Home: Tips to Working Remotely With Cisco Unified Communications Phone Systems

Working From Home: Tips to maximizing your bandwidth

Coronavirus (COVID-19): Preparing Your Business for Disruption

Service Notice: Managed Patching Enhancements

Learn. Connect. Grow. Summer Internships in 2020

Reminder: New Microsoft Customer Agreement Date Nears

Systems Engineering Promotes Two Employees to Senior Leadership

Security Bulletin: Windows 10 Crypto Vulnerability

End-of-Life for Microsoft Windows 7

Security Bulletin: Citrix Application Delivery Controller and Citrix Gateway Vulnerability

5 Best Practices To Manage IT Risks

SECURITY ALERT: Cisco ASA & FTD Security Advisory Bundled Publication

Disposing of E-waste Securely and Responsibly

New Microsoft Customer Agreement

Celebrate Race Day With Giving and BBQ

National IT Professionals Day - Celebrating Our Team

IT Budgeting and Planning: Four IT investments that will drive business value in 2020

Systems Engineering: A Place to Learn and Grow

Systems Engineering Named One of Maine's Best Places to Work in 2019

Security Bulletin: Remote Desktop Services Vulnerability

What do businesses need today that they don't already have?

How to Achieve a Successful and Secure Modern Cloud Workplace

Systems Engineering Supports STEM Scholarships at USM

2019 Systems Engineering Internship Program

Cisco IOS XE Software Web UI Command Injection Vulnerability

Remote Desktop Services Worm Vulnerability

Systems Engineering Recognized for Improving Employee Health and Well-Being

FDIC Issues Advisory on Technology Service Provider Contracts

Systems Engineering Helps Businesses Go Where They Want to Grow

Making the Most of Meetings

Cisco's Webex Teams Try and Buy

Microsoft Patch Required Before July 2019

The Changing Nature of Microsoft Office 365

Five Compelling Reasons to Hop on the Fast-Moving SD-WAN Wagon

Technology End-Of-Life/Support Events Lead SMBs to The Cloud

Three Keys to Your Organization's 2019 IT Strategy

Getting the Knack of NAC – An Introduction to Network Access Control

Good Security Practices Create Great Business Relationships

Best Practices to Create a Mobile Device Defense Strategy

Unified Communications and Collaboration: Empowering Businesses to Do More

Employee Spotlight:  Kelly Ridley

SE Data Points FALL 2018: New Employees Bulletin

An SE Engineer's Perspective of Microsoft's Ignite Conference

Systems Engineering Achieves Veeam Gold Pro Partner Status

Organizational Best Practices for Mobile Devices

Systems Engineering Named One of Maine's Best Places to Work for the Fifth Consecutive Year

SE Lunch & Learn Recap:  Security & Compliance in the Cloud - The New Perimeter