blog-banner-image.jpg

Systems Engineering Blog

The Benefits of Breaking the 'Cyberhoarding' Cycle

February 15, 2019

Five years ago, I wrote a blog post that summarized the risks of unmanaged data within IT environments. As a specialist working with Systems Engineering's FileProtect (cloud backup service), I’ve only seen this problem compound. The problem lies in the fact that the majority of businesses haven’t taken on the challenge of cleaning out their proverbial digital junk drawers.

Read More »

Data Protection, Data Management

Five Mistakes Employees Make to Compromise Network Security

January 25, 2019

The 2018 Human Factor report by Proofpoint states that as many as 95% of web-based attacks now incorporate social engineering, or human error factor. So, with that simple fact, how can your organization prevent its employees from releasing confidential and critical information?

Read More »

Encryption, Data Protection, Managed IT, Cybercrime, IT Security

IT's Cyber Monday, So Be Cyber Aware

November 25, 2018

As we all work through our holiday gift giving lists this "Cyber Monday," it's important to be cyber aware of "the Grinch" lurking in the corners waiting to steal our confidential information. So, before you begin to cross the names off your list while experiencing that great sense of accomplishment, take a few moments to read through these "cyber shopping" best practices to protect yourself and your personal identifiable information (PII). Nobody wants to spend the holidays recovering their data or identity.

Read More »

Data Protection, Cybercrime, IT Security

Best Practices to Create a Mobile Device Defense Strategy

October 18, 2018

At Systems Engineering team, we are very conscious about practicing good IT security measures. As such, it's important to remember that protecting confidential data spans from desktops, to the cloud, to mobile devices, and more. 

Read More »

Data Protection, IT Security, Technology Trends

Organizational Best Practices for Mobile Devices

September 14, 2018

As data moves to the cloud and becomes accessible from anywhere, it’s more important than ever to ensure that both corporate and personal devices being used to access data and services are secure. There are many options for addressing these security concerns, but choosing the right tools and configurations can quickly become complex. Considering what to do about devices like laptops, tablets and smartphones while in the office, at home, and while traveling can become overwhelming or cumbersome. Some organizations may find a secure one-size-fits-all solution, but many will want, or need, a little more flexibility.

Read More »

Data Protection, Data Management

Five IT Best Practices for Organizations to Consider

August 17, 2018

When it comes to security risks and errors, businesses often fall victim to assumptions and oversights. The reality is that the protection of information and applications is always evolving and, as criminals find new ways to exploit weaknesses, it's tough to stay one step ahead.

Read More »

Encryption, Data Protection, Cybercrime, IT Security

Creating a Culture of Security

July 06, 2018

It seems we can’t go more than 24 hours without hearing about the latest and greatest data breach that affects millions. So we ask ourselves, “What can we do better?” After all, if the “bad guys” can hack into the federal government, Home Depot, and Target, what hope do small and medium-sized businesses have?

Read More »

Business Continuity, Data Protection, Compliance, IT Strategy, Cybercrime, IT Security

Email: To Trust, or Not to Trust?

December 01, 2017

Has anyone at your organization ever received an email that was not what they thought it would be? Maybe it was a message from a vendor looking to verify sensitive account information; a message from an accountant sending completed tax returns in the month of August; or, a note from what appears to be your accounting firm indicating they need you to confirm Social Security Numbers in order to send employee paychecks? 

Read More »

Encryption, Data Protection, Cybercrime, IT Security

Data breaches are only getting worse. So, what is your organization doing about IT?

May 12, 2017

Data breach attacks are only getting more sophisticated and gaining more traction. They're happening to individuals at home, employees within organizations who click on the wrong link, CEOs who are targeted in a  Business Email Compromise, and the list goes on. What's even worse is that small- to medium-sized businesses are more of a target than the large corporations. According to Verizon's 2017 Data Breach Investigations Report, 61% of all data breach victims are businesses under 1,000 employees. 

Read More »

Data Protection, Cybercrime, IT Security

SE CleanMail has you covered.

March 17, 2017

Email can work for you, and it can be used against you. On the positive side, it's a tool that allows organizations to collaborate, communicate, and save time.

On the negative side, cybercriminals are savvy enough to use it as a weapon to send phishing and spear-phishing emails to unsuspecting recipients allowing confidential data to be exposed and money to be stolen.  

Read More »

Data Protection, Compliance