Please be aware of Covid-19 Scams

Polar SystemsPolar Systems Blog

Covid-19 is top of mind for most individuals these days. For many of us, life has changed dramatically. Unfortunately, this has opened a new window for cyber criminals to exploit users, by using this pandemic to get them to click, or download information. Here is a good article from one of our AV partners to help keep you and your … Read More

Polar Systems in the news!

Polar SystemsPolar Systems Blog, Polar Systems News

Exciting news! In November Polar Systems was asked to be one of four thought leaders around Cyber Security in a round table discussion to be published in the Portland Business Journal.  Our very own Kenny Franklin was one of the four expert panelists joining leaders from Comcast, Miller Nash Graham & Dunn, and Brown and Brown Insurance.   Check out the Portland Business … Read More

Polar Systems Security Series 5: Keep your business running after a Ransom attack

Polar SystemsEvents

Planning for When Ransomware Hits Even when you do everything right, things still can go wrong. Cyber-criminals will continue to evolve ahead of solutions on the market today, working to encrypt more data before detection and increase the likelihood that you will pay their ransom. The FBI’s advice is to have a business continuity plan and not pay the ransom.  So how … Read More

Windows 7 hits EOL January 2020

Polar SystemsPolar Systems Blog

Most likely you’ve heard that Windows 7 is hitting End of life January 2020, you might think there is plenty of time to upgrade to Windows 10 or replace old computers with Windows 10 PC’s. Don’t wait till the last minute, avoid the stress and get this taken care of now. What does this mean? No technical Support No software … Read More

Polar Systems 2019 Security Series- Managing Your Cyber Risk and Liabilities

Polar SystemsEvents

If you are an executive, senior leader or business leader you won’t want to miss session 4 of our educational series around cyber liability. Of the $86T world economy, $6T of that is cybercrime and it’s growing rapidly. Criminals are investing back into the “trade” as any business would and trading skills to develop new tactics for attacking your business data. … Read More

Microsoft Vulnerabilities Discovered

Polar SystemsPolar Systems Blog

Many of you may have seen the recent warning regarding some newly discovered vulnerabilities in various Microsoft Windows versions.  Links to learn more about the vulnerabilities are below: Microsoft warns Windows 10 users to update immediately Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) CVE-2019-1181 | Remote Desktop Services Remote Code Execution VulnerabilityCVE-2019-1182 | Remote Desktop Services Remote Code Execution Vulnerability … Read More

Polar Systems, Inc. Earns CompTIA Security Trustmark+

Polar SystemsPolar Systems Blog, Polar Systems News

Validation that Polar Systems, Inc., uses industry accepted security best practices West Linn, Oregon, May 15th, 2019 – Polar Systems, Inc., an IT consulting & Managed Service Provider, announced today it has received the CompTIA Security Trustmark+ from CompTIA, the non-profit association for world’s information technology (IT) industry. The CompTIA Security Trustmark+ validates that Polar Systems, Inc. uses the security … Read More

Perch watches your network like a Tiger

Polar SystemsEvents

 Polar Systems is proud to announce that we’ve recently earned our CompTIA Security Trustmark+. The CompTIA Security Trustmark+ validates our use of security processes identified by the IT industry as generally accepted best practices and has been evaluated by an independent third-party assessor as meeting the criteria established by the CompTIA Security Trustmark+. We are eager to share our more … Read More

Polar Systems 2019 Security Series – Session 3

Polar SystemsEvents

Automating Compliance in the Cloud Every breach tells a story. And most of them end with the same lesson: we are the problem. Humans, and our static, on-premise, old-school, castle-mentality of security.  It does not work anymore. We make mistakes. Mistakes that hackers quickly exploit. The complexity of information security has outgrown our human capacity.  The only way to get … Read More