Cloud-based Capabilities and More
By Mark Benton | Product Manager A typical office in 1995, with PC’s and email, might have looked very sophisticated…
Four Simple Steps to Create an Information Security Program
By Hanna Pickering | SE Virtual CIO Many people think of an Information Security Program (ISP) as a collection of policy…
Email: To Trust, or Not to Trust?
By Kyla Morse | SE Help Desk Has anyone at your organization ever received an e-mail that was not what they…
Another Cybercrime Network Disrupted
The last big takedown of a cybercrime network was in 2013 when Microsoft, the FBI, Europol and others collaborated to…
Defending the Corporate Network From Cybercrime
Networks are increasingly being exposed to a variety of attacks that have the potential to lead to a data breach,…
Systems Engineering Named to 2015 List of CRN Tech Elite 250
Annual List Recognizes IT Solution Providers with Deep Technical Expertise and Premier Certifications Portland, ME, April 15, 2015 – Systems…
SE Data Points – Spring 2015
Phishing scams to avoid, controlling project costs and deadlines, employee spotlight and more… Read SE’s latest newsletter here. The…
IT Project Management: Why It’s a “Must”
Do you have strategic IT initiatives that are not progressing cohesively with your growing business? Are internal skill gaps bringing…
Phishing Tactics that Work
In 2013, the SANS Institute reported that 95% of all successful attacks begin with a spear phishing email. Two recent…
SE Lunch & Learn: Data Breach Reality Event Recap
Systems Engineering’s Lunch & Learn: “When Risk Becomes Reality – Responding to a Data Breach” was recently held in Bangor…