Skip to main content

Internetwork Engineering

Want to learn more about network consulting and all things Information Technology? Follow our blog for up-to-date insights and information.

Internetwork Engineering

Blog Feature

Company News | Awards

By: Internetwork Engineering
June 16th, 2016

Internetwork Engineering (IE) announced today that it has been named to The Channel Company’s 2016 CRN Solution Provider 500 list. The SP500 list is CRN’s annual ranking of the largest technology integrators, solution providers and IT consultants in North America by revenue.

Blog Feature

Cybersecurity

By: Internetwork Engineering
May 4th, 2016

We’ve all been there. That moment we’re told a storm is brewing and possibly headed our way. In technology, cyberattacks are the storm, but it’s no longer a matter of if one will affect you, but when. As cyberattacks continue to become a daily norm, leadership must understand what threats they face and keep cybersecurity top of mind for the entire organization.

Blog Feature

Company News | Awards

By: Internetwork Engineering
March 28th, 2016

Internetwork Engineering (IE) announced today that CRN®, a brand of The Channel Company, has named IE to its 2016 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology vendors.

Blog Feature

Cybersecurity

By: Internetwork Engineering
January 6th, 2016

To be resilient, you need more than one. Please Note: This is the final article in a series. To start from the beginning, please click here. You bought the best in security prevention and detection software your organization can afford and you’ve educated the entire workforce on best practices to recognize malicious emails and web links. You feel your company’s sensitive information is safe from the Big Bads of the cyber underworld. (High five!) But, you've begun to wonder what you would do if your network shows indication of an attack or, more critically, a breach. Who will make the determination that you’ve been compromised? Who needs to be notified and in what order? Who executes what role during the response? How will the business continue to operate? Do you have a plan in place or are you counting on your team, including your executives, to instinctively know what to do?

Blog Feature

Cybersecurity

By: Internetwork Engineering
December 16th, 2015

Please Note: This is the fifth article in a series. To start from the beginning, please click here. When you think of hacking tools, you probably think of complicated systems of expensive hardware and software. However, with the development and increased popularity of open source hardware and software, many hackers are learning to put together inexpensive tools for their dirty deeds. Before we can explore the tools they use, we need to examine why they are using open sourced software and hardware in the first place.

Blog Feature

Cybersecurity

By: Internetwork Engineering
December 11th, 2015

Please Note: This is the fourth article in a series. To start from the beginning, please click here. It seems as if you can’t go a day without reading a blog or news headline mentioning the loss of sensitive corporate data due to hackers successfully carrying out advanced persistent threat (APT) attacks. Are APT attacks really that frequent and how concerned should you be about them? In order to answer these questions, we must understand what an APT attack looks like and how it differs from other attacks.