As IT consultants in the Bay Area, we see a lot of startups. Small businesses with bold ideas filled with hard working people focused on achieving a specific goal. Usually in their infancy, these businesses focus all their time and money on the goal they are trying to achieve and usually don’t have the dedicated staff needed to support enterprise IT solutions. The employees are extremely sharp and very tech savvy, able to quickly piece together solutions to fit their needs that actually work pretty well. Ran out of ports on a switch? Order an inexpensive PoE switch and start daisy chaining them! More ports = problem solved. Same goes for wireless, if you have a dead spot, just get another AP. If you want video in a conference room, get some 3rd party camera to work with Google Hangouts.
Healthcare is one of the most rapidly changing industries. It’s a constant challenge for healthcare organizations to keep up with changing regulations, complex reimbursement rules, ongoing revenue challenges, and evolving security threats. To keep up with the digital transformation, you need a technology foundation that will secure your environment and foster innovation.
Currently I am working on a project where I am going through and optimizing a large set of Access Control Lists (ACL) on a set of 5585 Firewalls. While going through each ACL I have noticed a few mistakes other engineers have made while configuring these rules. I have compiled a list of these common mistakes. The focus of this blog will be around ACLs on Cisco ASA’s; however these rules still apply to other devices as well.
Enjoy the first Fireside Chat. Fireside Chats are a LookingPoint video series where we bring casual technology conversations to you! This week we are discussing one of the hottest topics of 2017: SD-WAN. Sit back, relax, and enjoy a nice fireside chat.
Learn more about SD-WAN here.
Today, the most significant cyber threat is Ransomware – a type of malicious software designed to hold a user’s files (such as healthcare records, financial contracts, software codes, and other documents) for ransom by encrypting them and demanding the user pay a fee to decrypt them. Ransomware attacks use sophisticated infrastructure and resilient techniques to target data and hold critical infrastructure hostage. This advanced cyber threat, a familiar–and unwelcome–issue in IT security circles, has become one of the top enterprise cyber-security threats of 2016. Ransomware is the most profitable malware in history – in the first 3 months of 2016 cyber-criminals collected $209 million!
Meraki does it again! Meraki is no longer just simplifying networking; they are on a mission to simplify IT as a whole. On Tuesday, September 13, 2016 Meraki announced the launch of a brand new product line; Security Cameras. Just like all things Meraki, the MV series is plug and play, requires no additional on-premise hardware and is 100% cloud managed. This means no more network video recorder (NVR) and no more standalone video management software (VMS). Best of all, MV cameras are configured, managed, and monitored on Meraki’s single pane of glass web dashboard alongside your wireless, switching, network security, mobility management, and communication solutions.
Cisco Live 2016 has come to a close and the LookingPoint engineers who attended are feeling excited and inspired by all they learned in Las Vegas last week. They have shared with us their favorite takeaways from CLUS 2016 and we want to share them with you!
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.