Author: Steve

CTC’s September 2019 Threat Report

Cybersecurity threats

Vulnerabilities come from all sides — even from the inside. That’s the case with two notable items from recent worldwide cybersecurity activity.  Of even greater significance, however, are the ongoing attacks faced by public institutions seen in generations past as practically untouchable: presidential elections and government operations. U.S. Institutions Dealing with Ongoing Attacks A widespread… Read more

4 Network Cabling Service Mistakes To Avoid

Technician fixing cables

Wireless technology garners many of today’s IT-related headlines. However, there are few elements as crucial to a productive setting than reliable network cabling.  Recognizing that, ensuring your network cabling service providers deliver on the promise of an efficient and effective network is crucial. To help, here are four network cabling service mistakes to avoid. 1…. Read more

CTC’s August 2019 Threat Report

Cyber threat

Technology integrates so well into our daily lives that it’s easy to place perhaps too much trust in it.  That’s what happened to approximately 100 drivers in California. They trusted Google Maps to find their way out of a traffic jam but ended up stuck in a muddy field. That level of trust can create… Read more

CTC’s July 2019 Threat Report

Security is more important now than ever.

Along with rotary dial phones, cassette-playing Sony Walkman devices, and CRT televisions, add another victim to advancing technology: battle lines. Today, no one is afforded a clear demarcation point between potential conflict and peace. That includes, as we see below, your company. The U.S. Goes After Iran with Cyber Attacks; Iran Attacks Industries Following the… Read more

Wireless VoIP: Something in the Air

Wireless VoIP

With the Voice over Internet Protocol (VoIP) market projected to surpass $55 billion by 2025, it’s clear that enterprises remain bullish on the technology.  That may provide a good headwind for wireless VoIP, which looks to attract more business users in the coming years. What Is Wireless VoIP? Wireless VoIP takes a cue from its… Read more

5 Top Barcoding Systems For Manufacturing

Barcoding systems

Barcoding systems in manufacturing allow for an array of benefits, including materials and equipment inventorying, shipment processing, and equipment tracking. Those benefits and more translate to efficiencies that can directly boost a manufacturer’s bottom line. Holding inventory, for example, can cost an enterprise as much as 30% more than the inventory’s unit cost value. If… Read more

CTC’s June 2019 Threat Report

Vulnerable computer user

Trust, but verify. It’s advice popularized by President Ronald Reagan during his tenure. He used to help characterize his philosophy toward Soviet leaders on the subject of nuclear disarmament. The need for such due diligence permeates every layer of every enterprise’s IT landscape. News from the last month underscores how even the largest organizations are… Read more

Overcoming Wireless Challenges In a Manufacturing Environment

Manufacturing wireless connectivity

While wireless technology will never be problem-free, the margin of error for manufacturers grows smaller by the day, driven by global competition as well as increasing client and consumer demand for quality and reliability. For a time, manufacturers could hobble along with various wireless problems. That’s no longer the case, though. Add to the competition… Read more

CTC’s May 2019 Threat Report

Hacker threats

Hackers never take a break from their assaults, so it’s crucial never to take a break from your defense — even if that means spoiling someone’s idea of “pure fun” (see below). Manufacturers Under (Cyber) Attack from the Inside A report recently released by Verizon highlights a common — and serious — cybersecurity threat: people… Read more

Manufacturing on the Edge

Edge in manufacturing

By 2025, the industrial Internet of Things (IIoT) market will pass the $900 billion valuation mark worldwide. Among other changes, this ongoing wave of digitization promises to change how manufacturing plants look, operate, and produce goods. A chief component of this change is edge computing — locating data storage closest to the facility or facilities… Read more

CTC’s April 2019 Threat Report

Threat Report

Today’s manufacturers must navigate a demanding and highly competitive industry. And absent any other complications, many of them likely welcome the opportunity to innovate their way to success. Unfortunately, there are other complications. Specifically: cyber threats.   Manufacturing is the second most targeted industry based on the number of reported cyber attacks according to the… Read more

5 Big Challenges Facing Manufacturing Today

Manufacturing challenges

Manufacturers today face challenges on multiple fronts. Globalization, new and developing facets of the fourth industrial revolution, cyber threats, and other matters present hurdles for any company looking to make its mark. A survey of the top issues concerning manufacturers today turns up several prominent ones, including the following. 1. Producing and Protecting Innovative Products… Read more

5 Top Indoor Location Services Providers for 2019

Indoor Location Services

Few technologies promise to revolutionize the user experience more than indoor location services in the next few years. Industries with multi-billion dollar markets all stand the benefit, including: Healthcare Transportation Education Manufacturing Selecting the right vendor to support initiatives in these and other industries might make all the difference between a successful effort and one… Read more

CTC’s March 2019 Threat Report

Bitcoin

Perhaps to underscore that no single technology is effective against hackers, a wave of recent news related to cryptocurrency has hit. It includes an executive who passed away and took with him the password to about $190 million in cryptocurrency and a successful social engineering attack, among other topics.   Blockchains Under Attack It wasn’t… Read more

NAC Showdown: Cisco ISE vs. Aruba ClearPass vs. Forescout

Cisco ISE v Aruba v Forescout

A few years back, a survey of companies looking to deploy network access controls (NAC) identified two main reasons: 1) Protecting corporate resources from unauthorized users 2) Limiting the impact of security problems That second reason stands as a tacit acknowledgment that not every network threat can be fully neutralized before some damage occurs. Today,… Read more

CTC’s February 2019 Threat Report

Cyber break-in

Sometimes, cybersecurity issues hit VERY close to home. Consider the Apple FaceTime bug that allowed users to see and hear people before they answered the call. Or the Fortnite vulnerability that allowed hackers to eavesdrop on players. Such issues can instill within users a sense of vulnerability. They bring cybersecurity issues into homes across the… Read more

Head-To-Head: Fortinet and Palo Alto Firewall Solutions

Fortinet compared to Palo Alto

In our 5 Top Firewall Providers for 2019 post, we examined the prominent offerings and market conditions affecting key players in the firewall market. Now, we’re providing a closer look at two of the top finishers: Fortinet and Palo Alto. Our goal: to provide further assistance in determining which firewall solution to choose. What Users… Read more

Head-To-Head: Symantec and Digital Guardian Data Loss Prevention Solutions

Symantec comparison with Digital Guardian

In our 5 Top Digital Loss Prevention Providers for 2019 article, we examined how top data loss prevention providers’ performance and market conditions will influence the field in 2019. Now, we’re setting up a head-to-head comparison between two of those entries — Symantec and Digital Guardian — thanks to aggregated data from some of the… Read more

5 Top Firewall Providers for 2019

Firewalls are vital

Rogue AI chatbots, IoT breaches, widespread fraud: many expert predictions for 2019 are downright dire. Selecting the right firewall provider can go a long way to protecting your enterprise’s reputation, data, and bottom line. Let’s take a look at five top firewall providers for 2019. 1. Fortinet Maybe it’s the company’s independently certified and continuous… Read more

CTC’s January 2019 Threat Report

Crystal ball

Despite continual technological advances, development of a crystal ball that accurately predicts the future of cybersecurity eludes us. Thankfully, a couple of recent news items provide guideposts that may well come in handy for this new year. Experts Predict 2019 Cybersecurity Dangers Responding to a request from Forbes, a number of IT experts shared their… Read more