Guest Blogs

Complete Your Security & Loss Prevention Strategy

View Comments: Oldest First|Newest First|Threaded View
User Rank
Better be SAFE than SORRY!
Daniyal_Ali   3/25/2014 3:25:09 AM
Nice share Gregory. I am also not a fan of cloud storage as it is more vulnerable to the identity thefts. A separate offline system must be managed within each firm to ensure proper safety of the data, especially for the firms dealing with large databases. It's better to avoid the online storage systems, no matter how secure they are, for the storage of crucial data.

William K.
User Rank
And one more very real threat possibility
William K.   3/25/2014 10:15:41 AM
My brother pointed out how simple it would be to add a wireless link device to many of the wiring closets found in many buildings, since the IT folks seem to leave the door open for extended periods of time. Just plug an ethernet cable into an open hub port and put the link device up above the dropped ceiling where all of the cables go, and plug in the wall-wart that powers the unit. The rest of the hacking can be done from a nearby location without any risk of discovery, and the entire network can be explored at leisure. All for an investment of perhaps $20 and two minutes time. And if the device is discovered it is not traceable if the warranty card has not been sent in or registered. 

One more addition to the security breach nightmare.

User Rank
Re: Better be SAFE than SORRY!
GregoryBreads   3/25/2014 2:30:14 PM
It is always a good practice to take control of your data protection needs!  Unfortunately, this just isn't feasible for all companies.  No matter what though, staying informed of the threats and ways to prevent them (whether yourself or by a 3rd party host) is key! 


Thanks for your post!

User Rank
Re: And one more very real threat possibility
GregoryBreads   3/25/2014 2:34:09 PM
I couldn't agree more!  Using a system, such as E-LINE by DIRAK, to prevent intrusion, monitor in real time, and retroactively audit access at the individual rack level is a vital component to a complete data security plan.


Thanks for your comment!

William K.
User Rank
Re: And one more very real threat possibility
William K.   3/25/2014 2:44:13 PM
Good to know, when a rack-level attack is so very cheap and easy.

Partner Zone
More Blogs from Guest Blogs
More often than not, with the purchase of a sports car comes the sacrifice of any sort of utility. In other words, you can forget about a large trunk, extra seats for the kids, and more importantly driving in snowy (or inclement) weather. But what if there was a vehicle that offered the best of both worlds; great handling and practicality?
As additive manufacturing (including 3D printing) becomes increasingly popular among businesses as a quick and easy solution to creating and evaluating prototypes and end-use products, the debate about whether to outsource production or to purchase equipment for in-house use is at the forefront of industry discussions.
With increasing terrorist threats overseas, organizations are thinking about how best to defend themselves here and abroad. Engineering can play a role, especially when it comes to putting a barrier between yourself and the bad guys.
Time to market is everything, but at the same time, you can’t sacrifice quality for speed. That’s where additive manufacturing comes into play.
In the last few years, use of CFD in building design has increased manifolds. Computational fluid dynamics is effective in analyzing the flow and thermal properties of air within spaces. It can be used in buildings to find the best measures for comfortable temperature at low energy use.
Design News Webinar Series
10/7/2014 8:00 a.m. California / 11:00 a.m. New York
9/25/2014 11:00 a.m. California / 2:00 p.m. New York
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 20 - 24, How to Design & Build an Embedded Web Server: An Embedded TCP/IP Tutorial
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6

Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: 10/28-10/30 11:00 AM
Sponsored by Stratasys
Next Class: 10/28-10/30 2:00 PM
Sponsored by Gates Corporation
Next Class: 11/11-11/13 2:00 PM
Sponsored by Littelfuse
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service