HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Daniyal_Ali
User Rank
Platinum
Better be SAFE than SORRY!
Daniyal_Ali   3/25/2014 3:25:09 AM
NO RATINGS
Nice share Gregory. I am also not a fan of cloud storage as it is more vulnerable to the identity thefts. A separate offline system must be managed within each firm to ensure proper safety of the data, especially for the firms dealing with large databases. It's better to avoid the online storage systems, no matter how secure they are, for the storage of crucial data.

GregoryBreads
User Rank
Iron
Re: Better be SAFE than SORRY!
GregoryBreads   3/25/2014 2:30:14 PM
NO RATINGS
It is always a good practice to take control of your data protection needs!  Unfortunately, this just isn't feasible for all companies.  No matter what though, staying informed of the threats and ways to prevent them (whether yourself or by a 3rd party host) is key! 

 

Thanks for your post!

William K.
User Rank
Platinum
And one more very real threat possibility
William K.   3/25/2014 10:15:41 AM
NO RATINGS
My brother pointed out how simple it would be to add a wireless link device to many of the wiring closets found in many buildings, since the IT folks seem to leave the door open for extended periods of time. Just plug an ethernet cable into an open hub port and put the link device up above the dropped ceiling where all of the cables go, and plug in the wall-wart that powers the unit. The rest of the hacking can be done from a nearby location without any risk of discovery, and the entire network can be explored at leisure. All for an investment of perhaps $20 and two minutes time. And if the device is discovered it is not traceable if the warranty card has not been sent in or registered. 

One more addition to the security breach nightmare.

GregoryBreads
User Rank
Iron
Re: And one more very real threat possibility
GregoryBreads   3/25/2014 2:34:09 PM
NO RATINGS
I couldn't agree more!  Using a system, such as E-LINE by DIRAK, to prevent intrusion, monitor in real time, and retroactively audit access at the individual rack level is a vital component to a complete data security plan.

 

Thanks for your comment!

William K.
User Rank
Platinum
Re: And one more very real threat possibility
William K.   3/25/2014 2:44:13 PM
NO RATINGS
Good to know, when a rack-level attack is so very cheap and easy.



Partner Zone
Latest Analysis
Some cars are more reliable than others, but even the vehicles at the bottom of this year’s Consumer Reports reliability survey are vastly better than those of 20 years ago in the key areas of powertrain and hardware, experts said this week.
While risk management sounds like one activity, in order to be conducted effectively, it must be broken down into three sub-components: risk assessment, risk monitoring, and response planning.
Many of the materials in this slideshow are resins or elastomers, plus reinforced materials, styrenics, and PLA masterbatches. Applications range from automotive and aerospace to industrial, consumer electronics and wearables, consumer goods, medical and healthcare, as well as sporting goods, and materials for protecting food and beverages.
In a speech at China's National People’s Congress in Beijing this month, Premier Li Keqiang laid out plans to revamp the country's manufacturing infrastructure with advanced technology.
While many larger companies are still reluctant to rely on wireless networks to transmit important information in industrial settings, there is an increasing acceptance rate of the newer, more robust wireless options that are now available.
More:Blogs|News
Design News Webinar Series
2/25/2015 11:00 a.m. California / 2:00 p.m. New York
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
12/10/2014 8:00 a.m. California / 11:00 a.m. New York
3/31/2015 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Mar 30 - Apr3, Getting Hands-On with Cypress’ PSoC
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  67


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service