Category: For IT Pros

5 Top Firewall Providers for 2019

Firewalls are vital

Rogue AI chatbots, IoT breaches, widespread fraud: many expert predictions for 2019 are downright dire. Selecting the right firewall provider can go a long way to protecting your enterprise’s reputation, data, and bottom line. Let’s take a look at five top firewall providers for 2019. 1. Fortinet Maybe it’s the company’s independently certified and continuous… Read more

CTC’s January 2019 Threat Report

Crystal ball

Despite continual technological advances, development of a crystal ball that accurately predicts the future of cybersecurity eludes us. Thankfully, a couple of recent news items provide guideposts that may well come in handy for this new year. Experts Predict 2019 Cybersecurity Dangers Responding to a request from Forbes, a number of IT experts shared their… Read more

5 Top Data Loss Prevention Providers for 2019

Data loss prevention

In 2018, the number of breached records totaled more than 1.3 billion. The root cause of many of those breaches? Unintended disclosures. That is to say, user error rather than hacks. Hackers didn’t take the year off, though. As you can imagine, their efforts also comprised a significant number of breaches. For today’s enterprise, looming… Read more

5 Top Endpoint Security Providers for 2019

Find the right endpoint protection provider.

Endpoint security is the practice of protecting a network from malicious programs or activity originating from any one of that network’s numerous connection sites. Anything can happen after that. And whatever does happen could end up costing your company a lot of money. According to the Ponemon Institute, system downtime from an endpoint attack can… Read more

5 Top Data Recovery Providers for 2019

data recovery

Not sure how much urgency a single hour of downtime merits? One survey that tallied organizations’ downtime costs suggests that it merits a lot. In some case, as much as $5 million worth.   98% of respondents put the cost of one hour of downtime at $100,000 81% put it at more than $300,000 33%… Read more

CTC’s November 2018 Threat Report

Is this circuit board safe?

It’s one of the longest-held animal myths of all time: that ostriches bury their heads in the sand to avoid danger. They don’t; they’re preparing nests or caring for their eggs. (Anything that buried its head in the sand would have a difficult time breathing.) But as a metaphor for people avoiding difficult situations by… Read more

5 Top SD-WAN Vendors for 2019

Powerful IT cloud.

SD-WAN is a success story in the tech industry. Thanks to the efforts of many different SD-WAN vendors, it’s been able to deliver on the performance and cost-reduction promises upon which it initially launched. The result is a hotly competitive market expected to hit $8.05 billion in 2021. At the same time, moving to an… Read more

CTC’s October 2018 Threat Report

An airliner.

Cybersecurity issues brought to light over the past month or so remind us of a very important aspect of the internet: everything is connected. No website exists on an island that is perfectly fortified against attack. And sometimes, the attacks come from a seemingly friendly territory. The code that KO’d British Airways An attack on… Read more

Is Your 5-Year-Old Wireless Network Outdated?

Digital hourglass.

In a study examining how circumstances influence our perception of time, scientists confirmed what many suspected: when a stressful situation is looming, time seems to slow down. Think car accident, termination notice, etc. That phenomenon might help explain why some decision-makers look at an organization’s wireless network and deem it sufficient. Facing the complexities, and… Read more

CTC’s September 2018 Threat Report

A digital lock.

Children hacking ostensibly well-protected computer systems. The FBI’s best beating a path to the exits. Unabated cyber assaults against big-name companies. Sounds like it’s time to turn our cybersecurity-related concerns up to “11.” Child hacks voting site Forget Nickelodeon. One 11-year-old boy bypassed Spongebob Squarepants and his cohorts to spend time trying to hack into… Read more

6 Social Engineering Scams To Guard Against

Social engineering tactics

Out of context, it’s a relatively innocuous term: “social engineering.” To the uninitiated, that might as well refer to efforts to design and build a new community center. You know better, of course. You know that in a “social engineering” attack, a person or group uses human interaction to identify usernames, passwords, and other information… Read more

1 Thing You Must Know About Social Engineering

A home-based computer user.

They understand the risks involved. Despite that, nearly 25% of employees admitted to ignoring company-promoted cybersecurity best practices. The ignored practices included not storing login credentials and saving company documents onto personal computers. It’s an unnerving statistic for anyone tasked with protecting a company’s network. One estimate puts employee cybersecurity training at $290,000. Based on… Read more

CTC’s August 2018 Threat Report

Cyber eye

Exploiting vulnerabilities isn’t merely the province of solo hackers and state-sponsored agents. If a weakness exists somewhere, it’s a safe bet that an effort is being made to identify and leverage it. Even if that effort is being made in a prison by the inmates themselves. (More on that in a minute.) Large, concerted effort… Read more

The Enterprise Transition to 5G

5G is coming

With the dawn of 5G upon us, “business as usual” doesn’t apply to wireless enterprise planning. That’s because the next generation of wireless promises to deliver significant changes to nearly every industry. It also promises its fair share of issues. Here’s a closer look at some of the more prominent challenges the enterprise space faces… Read more

How to Handle Wireless Security Like a Seven-Year-Old

Wireless security now, Nirvana later.

Seven-year-old you was pretty awesome. Rocking your Super NES, listening to your brother’s “Nevermind” CD when he wasn’t around, cackling like crazy to Ren & Stimpy. You were so awesome that you didn’t realize you’d already learned several key elements of wireless security — knowledge that would help you out in the 21st century. Here’s a… Read more

Wireless Scalability Is In Flux … and On the Roof

Man above a cityscape enjoying wireless access.

Wireless networks reconfigured our world. Meeting rooms, cubicles, hotel rooms and business centers, airports, and even our homes and coffee shops assumed subtle, and sometimes not-so-subtle, physical changes once a wireless network was implemented. This pattern encouraged end users to develop one particular expectation: wireless everywhere, all the time. For the most part, they got… Read more

Demystifying Wireless Site Surveys

An office site survey

Did you hear the one about the fellow who bought a house only to discover that it stood on his neighbor’s property? That’s not a joke; it happened. And it isn’t the first time, nor will it be the last. Such cautionary tales help convince people buying property that a land survey is a vital… Read more

Extend Your Network’s Wireless Signal in 5 Steps

An office meeting enabled by strong wireless signals

You know what the queue of colleagues outside your office door means: The company’s wireless signal isn’t powerful enough to extend to everyone. Too many associates are either trapped in dead zones or congregate in the one location with sufficient signal strength. Everyone acknowledges the tight spot you’re in. But then come the pleas for… Read more

Hiring a Cisco ISE Engineer: Top Ten Questions To Ask

Managing a network that requires workers and guests to connect to routers and wireless access points at their convenience requires a multi-faceted approach. Special considerations regarding BYOD policies, endpoint protection, and quick & efficient network maintenance must be taken to sustain the continuity of your network’s integrity and performance. Cisco Identity Services Engine (ISE) is… Read more

Top 5 Qualities to Look For When Hiring An IT Consultant

What are your reasons for hiring a consultant? According to Entrepreneur, the top reasons companies bring in an outside consultant are because they: • Lack specific expertise • Need help identifying problems • Are short-staffed • Need to promote change • Need an objective point of view • Need new knowledge • Want someone to do… Read more