Internetwork Engineering
Want to learn more about network consulting and all things Information Technology? Follow our blog for up-to-date insights and information.
By:
IE Security Team
January 10th, 2018
Today, the risk of a security incident or data breach is higher than ever. Having an Incident Response Plan is crucial to maintaining a strong security posture so you can protect your business before, during and after an attack.
By:
IE Security Team
December 12th, 2017
Ransomware has evolved. It now spreads on its own inside a network, from machine to machine, encrypting files and compromising hosts. With an estimated global cost of cyberattacks sitting at $400 billion per year, and ransomware being expected to remain at the forefront of these attacks, it’s important to know how ransomware works, who it targets, and how to protect your business with a multi-layered defense. Take a look inside ransomware with our partners at Cisco Security:
Cybersecurity | Mobility & WiFi | Managed IT Services | Technology Solutions
By:
IE Security Team
November 30th, 2017
We all know that the threat landscape isn’t getting any easier to manage. Fact is, most organizations don’t have the resources or the time to carry-out the endless activities that could reduce their exposure. However, there are a few things you can do that will make the most impact. Our partners at Tenable helped us put together these 10 Steps to Effective Vulnerability Management.
Company News | OktoberTekfest | Cybersecurity | Mobility & WiFi
By:
IE Security Team
September 29th, 2017
We received quite a few interesting looks at last year’s OctoberTekfest, when we unveiled the KegBot and Hack for Beer challenge. A couple of hours into the challenge, we developed a crowd of folks gathered around the booth. Some people came to watch and cheer on their friends, while others took notes with hopes of decreasing the amount of time it took to “Pwn Beer.” The most interesting thing that happened, at least from my perspective, was that all of the folks that came to the booth experienced all of the excitement and frustration associated with executing a hack to a networked system. Many folks took note that some of the methods used to hack the KegBot, leveraged vulnerabilities and configuration issues that could have been easily mitigated. Several conversations started that examined the ideas of: What if the firewall placement changed? or What if the admin’s workstation had been patched, or not left on or unlocked? This is the true value in the whole demonstration. The process forces us to think about the issues that allowed the hack to happen in the first place. The beauty of the demonstration is that it was conducted in a controlled environment, no real data was ever at risk, and we all learned a lot.