Surveillance Solutions, No Strings Attached

Systech Surveillance

Goodbye hackers The one year deadline is almost upon US government agencies since Congress had placed a ban on video surveillance and telecommunications equipment manufactured, produced, and sold by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co., Zhejiang Dahua Technology and all subsidiary/affiliates of these companies. According to an article on Bloomberg, the August 13 deadline […]

What to do about passwords.

Systech Password Safety

Tons of Options Microsoft recently announced that they are changing their stance on password policies. Following their requirements, companies had policies in place that forced employees to change their passwords every 30-90 days depending on whatever was deemed appropriate. Did you really trust your employees to create passwords every 30 days and remember them? We […]

Cyber crime continues to rise.

Systech Cyber Security

Do your part and fight! GoldBrute botnet, Wannacry malware, BlueKeep vulnerability, VIM/NeoVIM vulnerability, Android smartphone backdoors, social engineering attacks, even Samsung telling consumers to scan their QLED TVs regularly for Malware. It’s seemingly the talk of the town. If you’re reading this, hopefully your first reaction is, “Ugh, enough already, tell me something I don’t […]

Severe Windows XP/7/2003/2008 Vulnerability

Systech Windows Vulnerablility

Security Updates Available   Microsoft announced a severe vulnerability with some older versions of Windows last month. If you are still using Windows XP, 7, Server 2003, or Server 2008, make sure you take the time to follow Microsoft’s instructions to patch your systems. All links are provided below which you will need to manually […]

You’re Possibly on Candid Camera

Systech Facial Recognition

Smile For users of WhatsApp, your mic might be on as well. Go start the update for the newest version and let that process while you continue to read this post. We all know that reality mimics science fiction because it’s fun and lucrative. Sometimes we even surpass sci-fi – the flip phone, for example […]

Data Backup and Recovery

Systech Backup Data Recovery

THE 3-2-1 BACKUP STRATEGY EXPLAINED. The 3-2-1 strategy requires a total of 3 copies of data to be maintained at all times. Two of these copies are kept on-site, with the third stored off-site. The locally stored data can be on the same system for quick recovery of data and the other on a SAN […]

Protecting Yourself from Social Engineering

Systech Social Engineering Phishing

Info & Best Practices Social Engineering is the act of manipulating an individual into divulging confidential information or offering unintended access. Individuals attempt to take advantage of a victims tendencies, utilizing psychological manipulation and various other techniques often leading to a victim providing data, infecting computers with malware or opening links to infected sites. Both […]

Systech Security Advisory

Systech Security Advisor

Please be advised Please be advised that over the last few days, we have received multiple calls from clients stating that they received a call from “Apple Support” regarding the security of their iCloud account. These fraudsters are attempting to retrieve information from unsuspecting individuals to gain access to their personal data and accounts. NEVER give out […]