• SE Lunch & Learn

    Understand how cyber insurance and written security policies can mitigate your risks of having your company's data hijacked.

  • Top 2018 Considerations for IT Budgeting & Planning

    Struggling to develop your IT budget? Watch our video.

  • ...ALERT!ALERT!ALERT!...

    WPA2 Vulnerability Update

  • The Security Suitcase for Your Move to the Cloud

    What to pack.

  • Get Ahead of IT Logo
    Get Ahead of IT logo

    Get Ahead of IT

    Established in 1988, we are an employee owned company committed to delivering engineering excellence and superior customer service. Our company offers a broad range of services including Managed IT, IT Security & Cloud Services.

    We support our clients 24×7 to help them Get Ahead of IT.

    Learn More >>
    Featured Whitepaper Image
    Featured Whitepaper Icon

    Featured White Paper

    E-rate: Technology Funding for Schools and Libraries

    Educational institutions are heavily dependent upon technology to reach today’s students and patrons. At a minimum, schools and libraries need high speed internet access, telecommunications services, and internal connections technologies...

    Read White Paper >>
    SE Essentials Logo

    SE Services

    IT Essentials

    Imagine how your business would grow if you had a reliable network delivering good user experiences backed by a team of highly skilled IT professionals. SE Essentials is a comprehensive IT solution that gives IT leaders the ability to focus on delivering unique competitive advantage to drive their business’ growth.

    News Icon

    Latest
    News

    Systems Engineering Blog

    Visit the Systems Engineering IT Blog for the latest IT news and events.

    WPA2 Vulnerability Update

    As you may have already heard, a new high-severity security vulnerability has been released publicly that is related to the WiFi Protected Access 2 Protocol (WPA2 Protocol). This newly discovered weakness could potentially allow an attacker to compromise an encrypted wireless session between a wireless client (PC/Smartphone) and the associated Wireless Access Point (AP). Once compromised, the attacking AP now acts as a "Man-in-the-Middle" and would be able to view packets between the wireless client and a remote endpoint as well as potentially inject malformed packets into the session.

    Calendar Icon

    Upcoming
    Events

    SE Lunch & Learn: Cyber Insurance, Security Policies, and Trends

    Attend in one of three locations: Bedford (NH), Bangor (ME), S. Portland (ME)

    Registration is now open! Learn more about Cyber Insurance risks and trends as well as what businesses can do to ensure information security. Learn more and register today.

    Our Partners

    Partner LogoPartner LogoPartner LogoPartner LogoPartner LogoPartner LogoPartner LogoPartner LogoPartner Logo