Blogs

How Often Should my Institution Get a Penetration Test?

Note from the Editor: This blog is the final installment of an 8-part blog series entitled, “Everything you need to know about an External Penetration... Read More »

Why is the Scope of a Penetration Test so Important?

Note from the Editor: This blog is the penultimate installment of an 8-part blog series entitled, “Everything you need to know about an External Penetration... Read More »

Top 5 Ways to Improve the Results of Your Penetration Test

Note from the Editor: This is the 6th installment of an 8-part blog series entitled, “Everything you need to know about an External Penetration Test.”... Read More »

How Much Does an External Penetration Test Cost?

Note from the Editor: This is the fifth installment of an 8-part blog series entitled, “Everything you need to know about an External Penetration Test.”... Read More »

What Can Go Wrong On An External Penetration Test?

Note from the Editor: This blog is the 4th installment of an 8-part blog series entitled, “Everything you need to know about an External Penetration... Read More »

Does an External Penetration Test Include Web Application Testing?

Note from the Editor: This blog is the third installment of an 8-part blog series entitled, “Everything you need to know about an External Penetration... Read More »

Federal Financial Aid Data Undergoing Critical Changes

With Federal financial aid data undergoing critical changes, do not assume you can continue to do what you have always done. Systems and data integrations... Read More »

Our External Penetration Testing Methodology

Note from the Editor: This blog is the 2nd installment of an 8-part blog series entitled, “Everything you need to know about an External Penetration... Read More »

What is an External Penetration Test?

Note from the Editor: This blog is the first installment of an 8-part blog series entitled, “Everything you need to know about an External Penetration... Read More »

How Long Does a Web Application Penetration Test Take?

Note from the Editor: This blog is the final installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” To read... Read More »

Our Web Application Penetration Testing Methodology

Note from the Editor: This blog is the 7th installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” To read... Read More »

When Should I Penetration Test a New Web Application?

Note from the Editor: This blog is the 6th installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” To read... Read More »

SIG, Salesforce, and Personalized Marketing Engagement

After the pandemic, the University of Hawai’i at Manoa was dealing with many of the same challenges as other universities across the country with low... Read More »

Top 5 Reasons Web Penetration Testing Quotes are Different

Note from the Editor: This blog is the fifth installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” To read... Read More »

How much does a Web Application Penetration Test Cost?

Note from the Editor: This blog is the fourth installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” To read... Read More »

Penetration Test vs. Vulnerability Scan

Note from the Editor: This blog is the third installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” To read... Read More »

Top 10 Questions a Web Application Penetration Test Will Answer

Note from the Editor: This blog is the 2nd installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” To read... Read More »

WSO2 0-day Cross-Site Scripting Attack

SIG Cyber Identifies 0-Day in WSO2 Identity Server Earlier this year SIG identified and disclosed to WSO2 a previously unknown vulnerability (otherwise known as a... Read More »

What is a Web Application Penetration Test?

Note from the Editor: This blog is the first installment of an 8-part blog series entitled, “The Complete Web Application Penetration Test Guide.” A lot... Read More »

What to Expect After a Penetration Test

Note from the Editor: This blog is the last of a 10-part series entitled, “Everything you need to know about an Internal Penetration Test.” To read... Read More »

Top 5 Ways to Improve the Results of Penetration Test

Note from the Editor: This blog is part 9 of a 10-part series entitled, “Everything you need to know about an Internal Penetration Test.” To read... Read More »

How Much Does an Internal Penetration Test Cost?

Note from the Editor: This blog is part 8 of a 10-part series on Everything you need to know about an Internal Penetration Test. To read the... Read More »

What are some Potential Issues that can arise with an Internal Penetration Test?

Note from the Editor: This blog is part 7 of a 10-part series on Everything you need to know about an Internal Penetration Test. To read the... Read More »

What Is a PCI Internal Penetration Test?

Note from the Editor: This blog is part 6 of a 10-part series entitled, “Everything you need to know about an Internal Penetration Test.” To read... Read More »

Our Internal Penetration Testing Methodology

Note from the Editor: This blog is part 5 of a 10-part series on Everything you need to know about an Internal Penetration Test. To read the... Read More »

Internal Penetration Testing In The Cloud

Note from the Editor: This blog is part 4 of a 10-part series on Everything you need to know about an Internal Penetration Test. To read the... Read More »

What’s the Difference between Offline and Online Password Attacks?

Note from the Editor: This blog is part 3 of a 10-part series entitled, “Everything you need to know about an Internal Penetration Test.” To read... Read More »

External and Internal Penetration Testing

Note from the Editor: This blog is part 2 of a 10-part series entitled, “Everything you need to know about an Internal Penetration Test.” To... Read More »

What is an Internal Penetration Test?

Note from the Editor: This blog is the first installment of a 10-part blog series entitled, “Everything you need to know about an Internal Penetration... Read More »

Top Mistakes CISOs Make When it Comes to Penetration Testing

Top Mistakes CISOs Make When it Comes to Penetration Testing As cybersecurity continues to become more of a focus in higher education institutions, we have... Read More »

The Importance of using a Penetration Testing Firm that Specializes in Higher Education

In an era where cybersecurity has become a critical concern for institutions across all sectors, higher education institutions face unique challenges in safeguarding sensitive data,... Read More »

Top 5 Cybersecurity Concerns For Higher Education

To enhance the learning experience, streamline administrative processes, and foster collaboration, higher education institutions have embraced technology advancements. However, with the growing reliance on technology... Read More »

Marketing Cloud and Slate: Better Together

Slate, a CRM system developed by Technolutions, has gained popularity among higher education institutions for managing admissions, recruitment, and enrollment processes. Marketing Cloud, the marketing... Read More »

Salesforce Summer ’23 Release: Top 10 (13) Enhancements

The Salesforce Summer ‘23 release is now available. In it you will find lots of new features, as well as new enhancements related to Lightning... Read More »

Salesforce Automation: Migrating Salesforce Processes Builder and Workflows to Flow

Salesforce has been at the forefront of driving automation and streamlining business processes for organizations worldwide. Over the years, Salesforce Workflows and Process Builder have... Read More »

Musings from Education Summit 2023

The 2023 Salesforce Education Summit held April 10-12, 2023 in Dallas, Texas was a welcome return to in-person conferences for the Higher Education community. We... Read More »

Benefits of Platforms as a Service (PaaS)

What are the Benefits of PaaS? In order to understand the benefits of PaaS, you must first understand what a Platform as a Service means.... Read More »

Cloud Service Delivery Models

Are you considering moving your infrastructure to the cloud? The cloud allows for many design patterns and architectural options not readily available to on-premises data centers. There are several delivery models of cloud services that should be considered to develop an effective cloud strategy. Read More »

Salesforce Education Cloud: FAQs

Salesforce Education Cloud is the latest evolution of purpose-built education applications for the Salesforce Platform. We know many of you may have questions. Depending on your particular scenario,... Read More »

Documenting Integration Requirements

Top 20 Questions For Thoughtful Integration Documentation More and more, our clients want to integrate Salesforce CRM or their Conga Contracts applications (their “Solution”) to a... Read More »

Enhanced Domains – Salesforce Enhancement

Salesforce will enforce Enhanced Domains in all orgs beginning Winter ‘24.  Enhanced Domains include your company-specific My Domain name that is included in your URL for all of your Salesforce and Experience Cloud sites along with Visualforce pages and content files.  This document outlines what Enhanced Domains are, the steps to enable it, and the potential impacts to your org. Read More »

The Final Countdown: Safeguards Rule (GLBA)

Reminder to clients about Safeguards Rule requirements that apply to Title IV institutions. Read More »

What are Person Accounts in Salesforce?

Person Account vs. Business Account in Salesforce There are two types of accounts in Salesforce. Business accounts store information about companies. Person accounts store information... Read More »

Are You Thinking About a CRM Portal?

Are you thinking about implementing a CRM portal at your institution? Or are you migrating from Luminis, Ellucian Portal, or Ellucian Mobile to a CRM... Read More »

Consolidating Salesforce Orgs

Salesforce Orgs Definition For large clients, we often find they have multiple instances of Salesforce CRM. In Salesforce “speak” each instance is referred to as an “org”... Read More »

Multi-Factor Authentication for Salesforce

With the exponential growth into remote work environments and uptick in hacking and pfishing, it is critical for you to enhance the security of your Salesforce deployment. Salesforce aims to protect your data with the requirement of Multi-Factor Authentication (MFA).  Read More »

CVE-2022-29464 EEI Vulnerability

Were you affected by the recent CVI-2022-29464 EEI breach? Unrestricted arbitrary file upload, potentially resulting in remote code to execution. Read More »

Have You Integrated to [???] Before

Over the past two decades, we have seen Salesforce deployments with associated integrations go from less than 5% of deployments to more than 60% of deployments. Consequently, one... Read More »

Conga Feature: Contracts Flow

Conga Contracts Flow automates your Contract Lifecycle Management process without having to add a flow to a specific contact, company or project. By creating a... Read More »

Salesforce Display Density – Comfy vs. Compact

Salesforce Comfy vs. Compact The Comfy setting looks like this: The second is the “Compact” setting which has less white space so more elements fit... Read More »

Integrations using Dell Boomi

How many third-party applications does your university use every day? Don’t be surprised if the number is over 100. Read More »

Email Marketing Solutions for Salesforce (Updated)

Email marketing is necessary and important for every organization. Despite the proliferation of spam, email marketing continues to be a key weapon in the marketer’s... Read More »

Taking the First Step Towards Green

Cloud computing is more efficient than running an on-premises data center for many reasons, some of which are outlined in earlier posts of this series. Read More »

Why Building a Sustainable ICT Infrastructure Is Important to Our Shared Future!

Across the globe, higher education institutions are becoming more attentive to climate change. Computing infrastructure will be a part of this conversation at a rapidly increasing rate. Read More »

Information Technology – A Green Influencer!

Sustainability has become a priority for higher education institutions across the world.  For some, student led activism and outside pressures have led to divestment from... Read More »

Preparing For Your Scope Call

How Much will it cost? How long will it take? For turn-key implementation or integration projects, we get asked these questions every day. Because your needs... Read More »

Integrating QuickBooks with Salesforce

If you are considering integrating your Salesforce deployment with QuickBooks, here is some food for thought. We often get asked about doing this and here... Read More »

What is the Difference between Salesforce Sales Cloud and Service Cloud?

The main difference between Salesforce Sales Cloud and Service Cloud is: Understanding this fundamental difference in the technology can help ensure your institution gets the... Read More »

8 Things to Consider When Evaluating and Selecting Enterprise Solutions

To help higher ed institutions increase the odds of a successful ERP deployment, we came up with a checklist when considering a new ERP solution. Read More »

SIG Achieves Amazon Web Services Partner Network Status

SIG announced it has achieved Consulting Partner Status in the AWS Partner Network (APN).  Read More »

SIG Partners with E&I Cooperative Services to Streamline Solicited Contract Services

The E&I SIG contract provides E&I members with access to a competitively solicited contract to save time and resources on IT consulting and staffing services. Read More »

Slate CRM Deployment at University of Northwestern – St. Paul

The University of Northwestern – St Paul went live August 1 in a single Slate CRM instance, after a six month implementation for their dual enrollment, undergraduate, and graduate students. Read More »

Remote Operations Readiness Checklist

How should we be adapting now and planning for the future? Consider incorporating a remote operations readiness checklist into your remote workplace plans. Read More »

Five Important Questions to Answer for a Sound Banner Security Policy

SIG has put together detailed guidelines to adjust, re-write, or create a policy that will steer your Banner and connected systems in a safe and secure manner. Read More »

SIG Supports SAML 2.0 Single Sign-On Authentication

Security Assertion Markup Language (SAML) is an XML-based protocol that was developed to facilitate the exchange of authentication and authorization information between applications or entities. Read More »