Home LookingPoint Blog

Blog

Jan 17

Cisco Meraki provides cloud managed networking solutions, including wireless, switching, network security, communications, enterprise mobility management, and security cameras. Meraki products are designed as simple, scalable, out-of-the-box solutions with single-pane-of-glass network management, allowing users to easily manage their complex networks all over the world from one central location.

Continue reading

Happy New Year loyal LP blog readers, and what a start to the year we have had. Unless you have had your head in the sand for the last week you cannot help but have heard all the buzz around the latest two high profile security vulnerabilities to hit our networks. I am of course referring to the infamous Spectre and Meltdown flaws. Cue dramatic music “Dun Dun Duuuun!!!!”

Continue reading

We’ve said it time and time again, cybersecurity is a leading concern and area of focus for IT teams everywhere. 2017 saw new emerging and rapidly evolving cyber threats, and they aren’t going anywhere in 2018.

Continue reading

On the first day of Christmas LookingPoint delivered me, a best practice network design. 

Continue reading

Security has been a leading topic throughout 2017 across all industries. Malware, more specifically ransomware, has been a dominant cyber threat with damage costs predicted to exceed $5 billion this year, according to Cybersecurity Ventures.Cisco recently released their 2017 Annual Cybersecurity Report. This year is the 10-year anniversary of the annual report, which provides key insights and...

Continue reading

In this Fireside Chat CEO, Sean Barr, sits down with Principal Network Architect, John Li, to discuss one of the hottest IT topics of 2017: security. Sit back, relax, and enjoy this Fireside Chat. 

Continue reading

Security is something that most IT folks have a love/ hate relationship with. OK, mostly hate… because data security is not easy and it’s not something you can just do and forget about, instead you must continuously adapt your network security to keep up with evolving threats and mitigate risk.

Continue reading

On Monday Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities described a set of scenarios where a malicious user can perform a man-in-the-middle replay attack on wireless users connected to the network using...

Continue reading

What is Two-Factor Authentication?

At its core, two-factor authentication is all about checking credentials. Are you who you say you are? Traditionally, a user name and password are used to log into a secure system. Two-factor authentication provides an additional layer of security, in the form of something you physically have, to be able to log into the system. This can be a physical token in...

Continue reading

Cisco Live day three started with a security keynote with Cisco Chief Security & Trust Officer, John N. Stewart. Stewart opened with bold statements about IoT and today's digital transformation. He dove into many of the dilemma's IT teams today:

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets