Internetwork Engineering
Want to learn more about network consulting and all things Information Technology? Follow our blog for up-to-date insights and information.
By:
Internetwork Engineering
August 18th, 2016
It’s something every company knows -- the protection of data and personal company information is of the utmost importance. But as the way we store data changes and the ever-evolving cyber threats get more advanced, information security should be doing the same, and here’s why:
By:
Internetwork Engineering
May 4th, 2016
We’ve all been there. That moment we’re told a storm is brewing and possibly headed our way. In technology, cyberattacks are the storm, but it’s no longer a matter of if one will affect you, but when. As cyberattacks continue to become a daily norm, leadership must understand what threats they face and keep cybersecurity top of mind for the entire organization.
By:
Internetwork Engineering
January 6th, 2016
To be resilient, you need more than one. Please Note: This is the final article in a series. To start from the beginning, please click here. You bought the best in security prevention and detection software your organization can afford and you’ve educated the entire workforce on best practices to recognize malicious emails and web links. You feel your company’s sensitive information is safe from the Big Bads of the cyber underworld. (High five!) But, you've begun to wonder what you would do if your network shows indication of an attack or, more critically, a breach. Who will make the determination that you’ve been compromised? Who needs to be notified and in what order? Who executes what role during the response? How will the business continue to operate? Do you have a plan in place or are you counting on your team, including your executives, to instinctively know what to do?
By:
Internetwork Engineering
December 16th, 2015
Please Note: This is the fifth article in a series. To start from the beginning, please click here. When you think of hacking tools, you probably think of complicated systems of expensive hardware and software. However, with the development and increased popularity of open source hardware and software, many hackers are learning to put together inexpensive tools for their dirty deeds. Before we can explore the tools they use, we need to examine why they are using open sourced software and hardware in the first place.
By:
Internetwork Engineering
December 11th, 2015
Please Note: This is the fourth article in a series. To start from the beginning, please click here. It seems as if you can’t go a day without reading a blog or news headline mentioning the loss of sensitive corporate data due to hackers successfully carrying out advanced persistent threat (APT) attacks. Are APT attacks really that frequent and how concerned should you be about them? In order to answer these questions, we must understand what an APT attack looks like and how it differs from other attacks.
By:
Internetwork Engineering
December 1st, 2015
Please Note: This is the third article in a series. To start from the beginning, please click here. Information security is a challenge: continuously changing threat vectors, compliance requirements, budget constraints, and reduced staffing all add to an already complex situation. If you are struggling with how to address these concerns, a risk assessment might be a great place to start. Here's 10 benefits you can expect from conducting a risk assessment: