Hello loyal blog readers. Over the last few weeks I have been busy working on a network assessment for one of our fantastic customers. One of the areas we look at when assessing a customer’s network is how they are protecting/restricting access to the management plane of their network infrastructure.
Technology is constantly moving and advancing, and as we continue to innovate we are able to use different enterprise technologies to grow our business. Technology used to be a means to help operate the business but has transformed into a means to better the business beyond those day-to-day operations. Technology is connecting our teams, connecting us with our customers and helping us to serve those customers more efficiently.
This week is week 3 of National Cybersecurity Awareness Month (NCSAM). Each week of NCSAM is focused around a different theme meant to address specific challenges organizations face and identify how to address those challenges. Week 3 is focused around educating employees of the importance of online security and safety and their role in keeping your organization safe from online threats.
Halloween is coming and most of us are looking forward to haunted houses, scary movie marathons, and spooky decorations. October is about more than the candy, costumes, tricks and treats for IT teams and cybersecurity experts – it’s National Cybersecurity Awareness Month.
It’s our favorite time of year again – October. This love for October is more than the fall weather, leaves changing, upcoming holidays and pumpkin spice everything. October is National Cyber Security Awareness Month and here at LookingPoint we love cybersecurity.
What if you could see into the future and knew when an attack on your network was coming and were able to stop it, or at least mitigate its impact?
The last day of Cisco Live 2018 started with a Security Innovation Showcase with Bret Hartman, Cisco VP and CTO of Security. He discussed best case security for worst case scenarios. In the last year we have seen cyber attack after cyber attack from Nyetya in July 2017 to VPNFilter which was detected last month.
Cisco Live Day 3 comes to an end tonight with Cisco’s Customer Appreciation Party at Universal Studios! Today there were some technology releases and product spotlights that we are excited to share with our customers! The first of these being Cisco’s new HyperFlex 3.5.
We are experiencing the age of the “digital gold rush”. Cryptocurrency discussions are dominating conversations everywhere and we all know someone invested in some sort of crypto if we aren’t ourselves. Cryptocurrencies derive their value in part through the limitation of cryptocoins that can be created. The potential return on cryptocurrencies makes cryptomining – the creation of cryptiocurrencies - highly attractive. This mining “consumes significant CPU resources and can severely impact system performance and power consumption” (Chromium Blog). The new cryptocurrency trend has brought to light a new network threat – illicit cryptomining in which outside users are infiltrating victims’ networks to utilize their computer resources.
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.