Resources | HelpSystems

Resources

Blog

From Receptionist to Senior Scrum Master: Dana Halvorson

Dana Halvorson supported grieving families as a funeral director before becoming a HelpSystems receptionist in 1999. Now a senior scrum master, she has a unique perspective on the importance of empathy, continued learning, and having fun at work.
Blog

Alternative to UiPath: HelpSystems Automate

As the RPA market has evolved three types of vendors have emerged based on increasing sophistication — and often — greatly increased costs. At one end you’ll find low-code or no-code automation products that offer desktop automation or productivity for individuals but can lack the functionality that would allow automation efforts to grow in number and complexity. At the opposite end, you’ll find...
Blog

Three Action Items to Consider After Completing a Pen Test

In order to complete a successful penetration test, a great deal of time is often spent in the planning stage. Time should also be invested into the post-test process. Going through the results of pen tests provides a great opportunity to discuss plans going forward and revisit your security posture overall. Seeing pen tests as a hoop to jump through and simply checking it off a list as “done” won...
Blog

What Customers Are Saying About Intermapper

Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.
Blog

From Intern to Email Marketing Specialist: Paola R.

Paola’s HelpSystems journey started with an online internship posting. Today, the email marketing specialist loves using her native Spanish at work and remembers the pivotal project where everything clicked. What’s your favorite internship memory?
Blog

What's It Like to Be in Marketing at HelpSystems?

The HelpSystems Marketing team is known for its commitment to producing great content with great people. Hear from some of our amazing marketing leads and specialists about their day-to-day and why they love what they do.
Blog

From Intern to Software Engineer I: Megan O.

As her software engineering internship wrapped up in 2021, Megan knew HelpSystems was where she wanted to be. Hear how she got connected with the company and why she’s passionate about the culture. Tell us about your internship experience!
Blog

How Data Security Solutions Fit into Your Cybersecurity Stance

An organization’s cybersecurity stance, or posture, is the current security status of all its hardware, software, services, information, networks, and service providers. But how can your organization put together a roster of best security solutions to fit into your cybersecurity stance?
Blog

What is a Vulnerability Management Program?

The Equifax breach was caused by a vulnerability. The WannaCry virus exploited a vulnerability. The stories don’t seem to end but it seems like no one is talking about how to solve this problem which is: start a vulnerability management program. “Manage the vulnerabilities in my network? Sounds easy” well, not so much, but not so difficult that you shouldn’t be spending time and resources on it...
Blog

6 Ways to Defend Yourself Against Password Attacks

Ever since Ali Baba uttered “open sesame,” thieves have been using stolen passwords to access hidden riches. In the digital world, password attacks have been and continue to be a common way for threat actors to gain access to an organization’s treasure trove of data. No matter how many emails we get from IT explaining what makes a good password, many of us still use the same basic password in...
Blog

Source Authentication for Email

This guest blog from Dr Edward Amoroso, Tag Cyber provides a high-level overview of modern advances in email security using source authentication and how the HelpSystems cybersecurity portfolio supports this important method for reducing information risk in enterprise.
Blog

SaaS-based Data Loss Prevention

In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can improve data security while minimizing data leaks in SaaS solutions.