Author: Corey F.

The Ultimate Guide to 802.11 Protocols and When to Use Them

WiFi signal over city

History’s trash heap of obsolete networking technology grows larger each year. Multiterminal systems, minicomputers, proprietary interfaces, sure. But even items implemented a few years ago get passed by in favor of more robust and secure solutions. According to Dimension Data’s annual Network Barometer Report, 58 percent of network devices are considered current. That’s an 11-percent… Read more

CTC’s April 2018 Cybersecurity Report: Big Brand Data Breaches Continue

Over the last few weeks, the world’s most well-known companies have continued to become victims of data breaches. The frequency and scale of these incidents make security attacks as regular as the weather. Better bring your umbrella. Here’s April 2018 cybersecurity update: [24]7 Hack & Subsequent Data Breach A malware attack on software vendor [24]7… Read more

The Top Enterprise VoIP and IP Telephony Vendors of 2019

VoIP (voice over internet protocol) has been a game-changing technology for companies of all sizes and industries. Not only can you save a great deal of money by not paying for landline phones, you can also take advantage of VoIP’s improved scalability, ease of installation and integration with your other business systems. In order to… Read more

Top Wireless Access Point Vendors of 2018

No two enterprises are exactly the same, which means that your network needs are likely unique from anyone else in your industry. Because of this, it is important to choose the right network configuration for your specific needs, which means choosing the right wireless access points (WAPs) and vendors for your enterprise. This need only… Read more

CTC’s March 2018 Threat Report: Annabelle & Crypto Mining Malware

It looks like ransomware will continue to be an ongoing threat in 2018 moving forward. Despite substantial multinational efforts from IT security teams worldwide, cybersecurity threats like Annabelle, cryptocurrency-mining malware, and Samas are continuing to hit enterprise companies and government organizations both here in the US and overseas. Here is March 2018’s cybersecurity and threat… Read more

Is Your Business Wi-Fi Acting Up? Check These 8 Places First

If your business wireless internet connectivity or WiFi connection isn’t working correctly, you may be able to troubleshoot the issue yourself. A slow connection or dropped signal can make it difficult to work on a computer, laptop or mobile device. However, many of the most common problems fit into eight categories of root causes, such… Read more

CTC’s Cybersecurity Threat Report – January 2018

Ransomware and security vulnerabilities continue to affect SMBs and large corporations at an alarming rate. Some experts believe that moving forward, these attacks will be more devastating and widespread. From an IT professional’s or security consultant’s standpoint, this is very concerning. As soon as a patch or solution is found to prevent one attack, it… Read more

Old Equipment, New Risks: The Danger of Outdated Devices on a Wireless Network

With the cost of new smartphones reaching nearly $1,000, it’s no wonder employees hold on to their old devices. Employees may not realize this means their devices are no longer getting security patches and are thus exposing them to risks. If your company follows a Bring-Your-Own-Device (BYOD) policy, which allow employees to use their own equipment,… Read more

A Quick Guide on Selecting Enterprise Wireless Access Points

Over the last few years, wireless has become a core technology of business and has benefited from intense research and development in the areas of range, spectrum and hardware. Now, there are multiple vendors offering different flavors of wireless capability, making it confusing for any business to invest in a wireless solution for its enterprise…. Read more

Network Cabling Types: Choosing The Right Structured Cabling Infrastructure

network cabling types

Technology is moving at a fast pace. Cabling infrastructure must match your company needs. Choosing the best solution for your business in advance saves time and money. Infrastructure performs rather well for an average of ten (10) years and usually, modest cabling supports up to three (3) generations of active electronic devices. But, before you… Read more

Top 5 Zero Day Exploit Prevention Solutions of 2017-2018

There are ways to equip your organization with increased cybersecurity performance solutions—under budget and within compliance of your firm. Whether your organization focuses on database, network, cloud, mobile security, or all of them integrated together, there are precautionary steps that can be taken. Consider These Top 5 Cybersecurity Preventative Solutions: 1. CylancePROTECT® Cylance developed an… Read more

Equifax Security Breach: Could It Have Been Prevented?

Zero Day Exploitation, otherwise referred to as Zero-Day Vulnerability, is defined as a security hole in software. Unknown to the software developer vendor, this hole can then be maliciously exploited by hackers before developers have an opportunity to “patch” the attack. Zero Day attacks include infiltrating malware, spyware, or allowance of unwanted access to user… Read more

Hiring a Cisco ISE Engineer: Top Ten Questions To Ask

Managing a network that requires workers and guests to connect to routers and wireless access points at their convenience requires a multi-faceted approach. Special considerations regarding BYOD policies, endpoint protection, and quick & efficient network maintenance must be taken to sustain the continuity of your network’s integrity and performance. Cisco Identity Services Engine (ISE) is… Read more

Top 5 Qualities to Look For When Hiring An IT Consultant

What are your reasons for hiring a consultant? According to Entrepreneur, the top reasons companies bring in an outside consultant are because they: • Lack specific expertise • Need help identifying problems • Are short-staffed • Need to promote change • Need an objective point of view • Need new knowledge • Want someone to do… Read more

Why Cisco ISE is the Perfect BYOD Solution For Enterprise

BYOD isn’t an option; It’s a necessity The ubiquitous nature of mobile devices can throw a fork in the road for IT admins, especially those managing larger networks. Segmentation of your WLAN with the proper authentication protocols can be manageable for smaller networks, but what about if your network has hundreds or even thousands of… Read more

The 5 Wireless Networking Issues Every IT Pro Deals With

Nowadays, enterprise organizations rely on reliable, secure wireless networks to keep their operations going. With the advancements in wireless technology, high-availability WLANs are more common than ever. Despite this, troubleshooting WLAN issues can be a pain for IT pros. Especially network admins of mixed networks. Having worked with companies of all different sizes from a… Read more

Are Network Access Control (NAC) Solutions Like Cisco ISE Worth It?

cisco ise and mdm

Identifying The Need For MDM & Access/Policy Control Mobile devices aren’t just something you carry in your pocket to make calls anymore. Being mobile is a way of life. For organizations that need to keep productivity levels high, a lack of wireless access can put a dent in the way you do business. And it’s… Read more

Our Preferred WAN Accelerator: Silver Peak Systems

CTC Technologies is proud to offer highly scalable WAN Accelerators from Silver Peak Systems. Let CTC Technologies help you design and install a WAN application acceleration solution today. CTC Technologies can help improve network latency response times with the complete family of Silver Peak WAN accelerators which feature robust management tools that facilitate key IT… Read more

Three Key Highlights of Palo Alto’s Next Generation Firewall

There are three unique technologies within the Palo Alto Networks’ next-generation firewall that enable visibility and control over applications users and content: App-IDTM, User-ID, and Content-ID. Each of the three technologies are industry firsts and are delivered in the form of a purpose-built firewall platform that helps administrators restore visibility and control. A complete set… Read more

Five Reasons Why You Should Choose Silver Peak Over Riverbed

Here are a few reasons why: The Silver Peak NX series has proven performance on all WAN links from small branch offices to large data centers. Big pipes,defined as a WAN link with > 30 Mbps WAN through-put, have very different performance, management, and scalability requirements than smaller WAN connections. They involve complex QoS, security… Read more