Newsletter May 2018

Say ‘I Do’ to Cyber Safety From the Cyber Security Alliance More than ever before, mobile devices are the preferred planning tool for couples preparing to tie the knot. For better or for worse, 92 percent of brides-to-be (and some grooms, too!) are checking off to-do lists virtually via their smartphones. The icing on the cake is that these devices can be used for researching gowns, tuxes and various vendors, sharing announcements, managing registries and honeymoon travel and creating personal websites. With the whirlwind of emotions leading up to your wedding, the National Cyber Security Alliance (NCSA) proposes several tried-and-true tips to help ensure thatRead More →

Cyber Safe Honeymoon

More than ever before, mobile devices are the preferred planning tool for couples preparing to tie the knot. For better or for worse, 92 percent of brides-to-be (and some grooms, too!) are checking off to-do lists virtually via their smartphones. The icing on the cake is that these devices can be used for researching gowns, tuxes and various vendors, sharing announcements, managing registries and honeymoon travel and creating personal websites. With the whirlwind of emotions leading up to your wedding, the National Cyber Security Alliance (NCSA) proposes several tried-and-true tips to help ensure that this special time in your life is safe and secure. EverlastingRead More →

Insider Threats Employee Accident

Be Wary of Insider Threats to Your Security Not all security threats come from outside: human beings in organizations are often threats as well, from accidents to negligence to malicious behavior. Be wary of the inside threats as well when considering your overall security posture. How can employees pose a risk? Any user with network permissions can inadvertently delete or compromise data. This behavior is accidental, rather than malicious, but it can be just as bad. Then there’s negligence: sometimes employees violate security policies or best practices through well-intentioned but harmful actions or inattention. And lastly, there are malicious insiders. The classic example is theRead More →

The Source Newsletter April 2018

Times are changing! You wouldn’t open your door to a criminal – don’t open your email “door” either. Systems is seeing a dramatic increase in ransomware attacks recently across all business types and sizes. Even with a best-in-class, layered and monitored security model, the risk of ransomware attack is present. This is because the last and most important line of defense is the end user. Read More Don’t sweep IoT security and training under the rug used with permission from Tektonika (HP) by Karen Gilleland When you drive home, your garage door opens as you arrive. That toy bear Santa gave your kids talks andRead More →

ransomware attack via email

You wouldn’t open your door to a criminal – don’t open your email “door” either. Systems is seeing a dramatic increase in ransomware attacks recently across all business types and sizes. Even with a best-in-class, layered and monitored security model, the risk of ransomware attack is present. This is because the last and most important line of defense is the end user. The majority of ransomware attacks are delivered via email, and many businesses facilitate employee education to better ensure their protection. Systems has tools to both assess your level of risk and provide ongoing end user training to businesses. It’s important to note thatRead More →