blog-banner-image.jpg

Systems Engineering Blog

Microsoft Patch Required Before July 2019

February 27, 2019

If your organization is still utilizing Windows 7 SP1Windows Server 2008 R2 SP1, and Windows Server 2008 SP2, please read this article in its entirety. 

Read More »

IT Strategy, Managed IT, IT Security

Five Mistakes Employees Make to Compromise Network Security

January 25, 2019

The 2018 Human Factor report by Proofpoint states that as many as 95% of web-based attacks now incorporate social engineering, or human error factor. So, with that simple fact, how can your organization prevent its employees from releasing confidential and critical information?

Read More »

Encryption, Data Protection, Managed IT, Cybercrime, IT Security

Three Keys to Your Organization's 2019 IT Strategy

December 11, 2018

It's a new year which makes it a great time to prioritize your technology initiatives. As technology changes dramatically, the headlines continue to focus on the same themes: Security, Cloud, and Digital Transformation. In this blog article, I will review important "to do's" within each category and offer ways you and your organization can achieve these important IT goals. 

Read More »

Cloud, IT Security, Digital Transformation

Getting the Knack of NAC – An Introduction to Network Access Control

December 07, 2018
Read More »

IT Security, Technology Trends

IT's Cyber Monday, So Be Cyber Aware

November 25, 2018

As we all work through our holiday gift giving lists this "Cyber Monday," it's important to be cyber aware of "the Grinch" lurking in the corners waiting to steal our confidential information. So, before you begin to cross the names off your list while experiencing that great sense of accomplishment, take a few moments to read through these "cyber shopping" best practices to protect yourself and your personal identifiable information (PII). Nobody wants to spend the holidays recovering their data or identity.

Read More »

Data Protection, Cybercrime, IT Security

Good Security Practices Create Great Business Relationships

November 16, 2018

When it comes to good security practices, compliance and documented policies require a top-to-bottom effort from management, operations, human resources, and the IT team. After all, the right security practices and solutions can be created and when a business can prove that solid policies and practices are in place, it provides peace of mind to its clients, partners, and auditors.

So, let's start from the beginning.

Read More »

Business Continuity, IT Consulting, IT Strategy, IT Security

Best Practices to Create a Mobile Device Defense Strategy

October 18, 2018

At Systems Engineering team, we are very conscious about practicing good IT security measures. As such, it's important to remember that protecting confidential data spans from desktops, to the cloud, to mobile devices, and more. 

Read More »

Data Protection, IT Security, Technology Trends

Three Cost Effective Cybersecurity Tools Your Business Should Not Be Without in 2019

October 05, 2018

Assuming you have your network security basics in place, there are a few cybersecurity solutions that are relatively inexpensive that many businesses have yet to include in their cybersecurity war chest. These tools help you stay ahead of the cyber criminals and provide additional protection to reduce your business' chance of a breach.

Read More »

SE Data Points, IT Security

Simple Mistakes Create the Biggest Cybersecurity Worries

October 05, 2018

In 2017 alone, $5 billion was extorted from businesses using Ransomware, software that encrypts your files until you pay the criminals off. In another attack that took advantage of the Internet of Things (IoT), cyber criminals were able to leverage 10,000 security cameras and DVRs to take down popular websites across the internet. Not scary enough? It is important to acknowledge that none of us are above these attacks and anything connected to the internet is a potential target for hackers.

Read More »

Cybercrime, IT Security

Five IT Best Practices for Organizations to Consider

August 17, 2018

When it comes to security risks and errors, businesses often fall victim to assumptions and oversights. The reality is that the protection of information and applications is always evolving and, as criminals find new ways to exploit weaknesses, it's tough to stay one step ahead.

Read More »

Encryption, Data Protection, Cybercrime, IT Security