security
Ransomware Attackers Strike Again
On the heels of last month’s WannaCry cyberattack, a new ransomware attack shut down systems across Europe this week. The main focus of the attack appears to be in the Ukraine (including banks, telecom, electrical systems, the main city metros, and the airport), but it has now appeared in 65 countri…
From the floor of Cisco Live: IoT Threat Defense in Healthcare
What are IoT devices in healthcare? In my experience talking with customers, I don’t believe I’ve ever received the same answer twice. Most often, they call out patient home monitoring devices and consumer-grade fitness trackers. But to me, an IoT device is anything that you connect to the ne…
Traits of Cloud Optimized Organizations
I am headed to Cisco Live in Las Vegas and I am looking forward to meeting with our partners and customers to learn more about their cloud plans and challenges. Believe it or not, cloud has been around for at least ten years, and yet all the data points at my disposal tell us that there is room for…
#CiscoChat Live: Redefining Access and Campus Networks
It’s time to shift the mindset when it comes to building and managing networks. It’s time for a logical, policy-based approach that allows you to deploy and secure services faster, while adapting quicker to change. In this iTalk #CiscoChat we’ll discuss how to implement this shift in mindset, throug…
Control Your Own Security
Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital’ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeb…
Enemy at the gates: Cybersecurity across the continuum of care
Healthcare is the number-one industry targeted by cyber attackers. The average cost of a healthcare data breach is $355 per record—more than double the cost for other industries.[1] With nearly 16.5 million healthcare records exposed in the U.S. in 2016 alone, the economic impact of cyber attacks is…
Cisco RV340 and RV345 Dual WAN VPN Routers
Hello all, I thought it would be a good time to provide a quick update on our Cisco RV Series. As amazing as Rafael Nadal is as he took his 10th French Open yesterday at Roland Garros, our new RV340 Series models continue to amaze as they make their way to your local Cisco Partners! Well the two tho…
Illegal Streaming of Pay TV – Is It a Pirate Treasure Island?
In our previous blog post—on the scope of illegal streaming—we analyzed one of the forums that hosts illegal streaming server offers and concluded that it reaches at least 285,000 viewers. That’s an impressive figure. But what does it mean in financial terms? Or to be more specific, how much are pir…
The Internet of Vulnerable Things
Technological progress is resulting in computing systems that are smaller, cheaper and consuming less power. These micro-computing systems are able to be integrated into everyday objects; when coupled with ubiquitous wireless connectivity these devices form the “Internet of Things”. The IoT has the…