Local Management Software v5.3 Available

The latest version of the Uplogix Local Management Software (LMS) is now available. At Uplogix we don't name our releases after candy or big cats; we just give them a nice wholesome number. Not a whole number, there are decimals, but you get the point. LMS v5.3 brings new functionality designed to improve visibility of large [...]

Encryption battle between the FBI and Apple

Encryption has been in the news for the last week following the court order requiring Apply to unlock the iPhone of San Bernardino gunman Syed Farook for the FBI. Both the Bureau and Apple are working the court of popular opinion from different angles. The FBI's argument is that they requested Apple's help unlocking one phone, [...]

Preparing staff for increased IT automation

Accenture's Technology Vision survey of corporate execs say they are making significantly more investments in IT automation with more than half planning to use machine learning and embedded artificial intelligence (AI) solutions extensively. Does this mean that IT staff is heading the way of the dodo? Advancement of AI and robotics has created a fair [...]

Pandemic year for healthcare cybersecurity

2015 was a rough year for healthcare cybersecurity. The 113 million patient records breached was more than twice as many as in the five prior years combined. To make things even more discomforting, nine of the top ten incidents and more than 98-percent of the records stolen were the result of hacking attacks. Healthcare IT [...]

Secure remote access even on snow days

If you were caught up in Winter Storm Jonas over this past weekend, you likely didn't venture beyond the driveway or sidewalk you were shoveling. With millions snow-bound on the east coast, the federal government in the nation's capital shut down from noon Friday through Tuesday. It's the kind of weather that makes a person appreciate [...]

Healthcare IT driven by patients

While every industry has a different tolerance for risk, there are also different types of risk to consider. When asked what challenges are unique to healthcare IT, Duke University Health System CISO Chuck Kessler says the biggest differentiation between a healthcare organization and a bank, for example, is that in healthcare it's ultimately about saving lives. [...]

Weak passwords defeat secure access

One benefit to all of the leaked information from site breaches is that it provides researchers with access to millions of passwords and user names. Password management company SplashData recently released their analysis of the worst passwords of 2015. Reviewing more than 2 million passwords leaked in 2015, they found that users are beginning to [...]

Ship cyber security guidelines launched

As vessels at sea become better linked via broadband satellite and other connections, the risk of ship cyber security issues increases. To increase awareness of these risks, the global shipping community released guidelines for avoiding potential cyber vulnerabilities that could potentially drive major safety, environmental and commercial incidents. The guidelines were released by BIMCO, the largest international shipping association, and [...]

Top Uplogix Blog Articles of 2015

As a platform for network automation, Uplogix touches on many areas of networking, leading the Uplogix blog to hit on many topics throughout the year. A quick analysis of which articles had the most hits showed some of the favorites from this year. They tended to break into categories like security, our product, our staff [...]

Everything as a service

IT departments today find themselves pinned between meeting expectations of business units based on managed service provider promises and a wealth of new technology options. Oh, and no pressure -- business revenue is increasingly dependent on IT getting it right. Enterprise IT has traditionally been regarded as quite different from the Managed Service Provider model. As more and more technology is moving to the [...]