DDOS attacks growing at a faster rate

By | January 26th, 2017|Blog|

DDOS attacks are the most common threat for enterprise, government and educational IT networks, according to an Arbor Networks security report, and to make matters worse, the attacks are getting bigger.  Distributed denial of service attack size grew at a compound annual growth rate of 44 percent from 2005 until 2011. Since then, the rate has [...]

2017 predictions for IT networking & security

By | December 12th, 2016|Blog|

Mid-way through the last month of the year means it's time for everyone to release their predictions for IT in the coming year. This year is no different, and given recent headlines about Russian hacking and ransomware designed to let you opt to infect others you know rather than pay up, we're going to talk [...]

Network recovery after the hack

By | November 17th, 2016|Blog|

Today we live in a world of "when." And when you're affected by a security breach, you need to think beyond just data protection and backup. You need a clear plan for network recovery after the hack that doesn't rely on the network itself or slow trips to remote sites for "sneaker net" repairs. This [...]

Disaster recovery: Network infrastructure

By | May 24th, 2016|Blog|

Today we live in a world of not if, but when. We're not talking about global warming or the presidential election, well not here at least. We're talking about getting hacked. As strong as the efforts are going into cybersecurity and hacking prevention, it's a losing game. Smart people are putting money into thinking about [...]

Ship cyber security guidelines launched

By | January 11th, 2016|Blog|

As vessels at sea become better linked via broadband satellite and other connections, the risk of ship cyber security issues increases. To increase awareness of these risks, the global shipping community released guidelines for avoiding potential cyber vulnerabilities that could potentially drive major safety, environmental and commercial incidents. The guidelines were released by BIMCO, the largest international shipping association, and [...]

Cybersecurity threats in 2016

By | December 7th, 2015|Blog|

December is a great time to look back on the year and look forward to what to expect in the new year. The McAfee Labs security team released their annual report about the cybersecurity threats to expect in the next five years. Unfortunately the news is that if you thought ransomware, data breaches and hacked Jeeps were [...]

Cyber security responsibilities: who owns it?

By | October 23rd, 2015|Blog|

The Stop. Think. Connect. campaign is five years old this year, and while it has achieved several of the goals it began with, much of the public's increased awareness of cyber security has been based on the increasingly alarming data breaches of large corporations and the government. Statistics from the campaign say that "Nearly two-thirds of the [...]

“Flavor of the day” network security

By | October 15th, 2015|Blog|

Network security is tough. Too often a new attack vector appears on the scene and vendors scramble to put out a product to counter it. Companies scramble to implement it. And the bad guys scramble to find a new attack vector and it all starts over again. After a few cycles, this can lead to [...]

FBI publishes examples of IoT risks

By | October 15th, 2015|Blog|

Tick-tock, tick-tock... with every passing day we're getting closer to those 50 billion devices that Cisco estimates will be connected to the Internet by 2020. In anticipation, security conversations around the Internet of Things (IoT) are heating up. At the September Gartner Security and Risk Management Summit,analysts said that companies need to consider a holistic [...]

The Dirty Dozen network security issues

By | September 9th, 2015|Blog|

Gartner's "Dirty Dozen," the most common and often overlooked issues found in network security, is based on more than 3,000 client interactions over the last year. How many of these worst practices do you have in your network? They say avoiding these practices and instigating both short and long term changes will improve security while [...]