足球竞猜app软件网络世界Mark Dargin //m.banksfrench.com en - us 太阳,11月15日2020 22:07:39 -0800 太阳,11月15日2020 22:07:39 -0800 https://idge.staticworld.net/nww/networkworld510x510.png 足球竞猜app软件 m.banksfrench.com. 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 足球竞猜app软件 m.banksfrench.com. 796 288. “可信威胁”:如何保护网络免受勒索软件 星期四,2010年10月29日07:53:00 -0700 马克Dargin 马克Dargin

(Editor’s note, Oct. 29, 2020: With the FBI and US Department of Homeland Security recently warning of credible cyberthreats to healthcare facilities including ransomware, it’s a good time to review the steps outlined in this article that enterprises can take to guard against such attacks.)

Ransomware attacks are becoming more rampant now that criminals have learned they are an effective way to make money in a short amount of time.

Attackers do not even need any programming skills to launch an attack because they can obtain code that is shared among the many hacker communities. There are even services that will collect the ransom via Bitcoin on behalf of the attackers and just require them to pay a commission.

To read this article in full, please click here

//m.banksfrench.com/article/3218708/how-to-protect-your-network-from-ransomware-attacks.html
国家笔测试执行​​标准将提高网络安全性 星期五,2019年2月1日05:18:00 -0800 马克Dargin 马克Dargin

As the number of cyber attacks increases, the demand for penetration tests – to determine the strength of a company’s defense – is also going up. People are worried about their companies’ networks and computer systems being hacked and data being stolen. Plus, many regulatory standards such PCI and HITRUST require these tests to be performed on at least an annual basis.

The demand for these tests is only going to increase as attackers get more sophisticated. And it’s essential these tests catch all possible vulnerabilities.

Benefits and gaps of penetration tests

Penetration tests involve live tests of computer networks, systems, or web applications to find potential vulnerabilities. The tester actually attempts to exploit the vulnerabilities and documents the details of the results to their client. They document how severe the vulnerabilities are and recommend the steps that should be taken in order to resolve them.

To read this article in full, please click here

//m.banksfrench.com/article/3337531/national-pen-test-execution-standard-would-improve-network-security.html
争取网络中立规则的斗争势头强劲 星期二,2018年11月6日10:28:00 -0800 马克Dargin 马克Dargin

The U.S. Supreme Court has officially ended the court fight over the repealed net neutrality rules that required internet providers to treat all online traffic equally.

On Nov. 5, 2018, the court rejected appeals from the telecommunications industry seeking to throw out a lower court ruling in favor of the net neutrality rules. The Federal Communications Commission (FCC) under President Donald Trump has rolled back the rules, but the industry also wanted to completely remove the lower court’s ruling off the books.

The Supreme Court's decision is a victory for advocates of net neutrality rules, as supporters hope this will push Congress to enact new net neutrality laws or encourage other states to follow California’s lead by instituting their own requirements.

To read this article in full, please click here

//m.banksfrench.com/article/3319177/fight-for-net-neutrality-rules-gains-momentum.html
如何从DNS缓存中毒保护您的基础架构 星期四,2018年8月16日08:01:00 -0700 马克Dargin 马克Dargin

Domain Name System (DNS) is our root of trust and is one of the most critical components of the internet. It is a mission-critical service because if it goes down, a business’s web presence goes down.

DNS is a virtual database of names and numbers. It serves as the backbone for other services critical to organizations. This includes email, internet site access, voice over internet protocol (VoIP), and the management of files.

You hope that when you type a domain name that you are really going where you are supposed to go. DNS vulnerabilities do not get much attention until an actual attack occurs and makes the news. For example, in April 2018, public DNS servers that managed the domain for Myetherwallet were hijacked and customers were redirected to a phishing site. Many users reported losing funds out of their account, and this brought a lot of public attention to DNS vulnerabilities.

To read this article in full, please click here

//m.banksfrench.com/article/3298160/how-to-protect-your-infrastructure-from-dns-cache-poisoning.html
在没有网络中立的情况下为未来做好准备 2018年6月19日星期二05:38:00 -0700 马克Dargin 马克Dargin

Net neutrality officially ended on June 11, 2018, and many people are concerned that this is the end of an open internet. Many supporters of it believe the internet should be regulated no different than the phone system or power utility and that this change will decrease the performance of it. Opponents of net neutrality, argue that the end of it will now increase competition among the various internet service providers (ISPs) and increase coverage, improve performance, and lower costs.

What is net neutrality?

Net neutrality became effective by the Federal Communication Commission (FCC) under President Barack Obama in 2015. It is a set of rules that ensured ISPs treated all data transmissions, irrespective to content, that flowed through their infrastructure equally. Net neutrality protections prevented ISPs from slowing web services, blocking access to sites, or charging content organizations for faster delivery of streaming movies or videos. It is believed that antitrust laws did not go far enough in ensuring that all content received equal treatment.

To read this article in full, please click here

//m.banksfrench.com/article/3281337/prepare-for-the-future-without-net-neutrality.html.
如果你的云提供商停止提供服务,该怎么办 Fri,2018年3月16日07:55:00 -0700 马克Dargin 马克Dargin

What would your organization do if your cloud provider were to go out of business? What happens if your cloud provider suddenly stops offering critical services that your organization requires for its business to function properly? Businesses need to start asking these important questions and develop plans to address these scenarios.

The cloud is a new market that continues to grow, and there are more small players offering their services. According to Gartner, Cloud System Infrastructure Services (IaaS) are expected to grow from $45.8 billion in revenue in 2018 to $72.4 billion in 2020. As the market matures, it's only natural that some of these organizations will disappear or stop offering certain services. In 2013, Nirvanix stopped offering it cloud services and gave customers only two weeks’ notice to move their data off of their platform.

To read this article in full, please click here

//m.banksfrench.com/article/3263742/what-to-do-if-your-cloud-provider-stops-offering-its-services.html
保护您的SDN控制器 2018年1月2日星期二10:50:00 -0800 马克Dargin 马克Dargin

Managing networks has become increasingly complex, and it will remain a challenge as the use of Internet of Things devices continues to grow. This complexity makes it difficult to reconfigure a traditional network in a timely manner to respond to malicious events or fix configuration errors.

A software-defined network (SDN) can help by giving network engineers the flexibility to dynamically change the behavior of a network on a node-by-node basis — something not typically available in a traditional network. An SDN uses virtualization to simplify the management of network resources and offers a solution for increased capacity without significantly increasing costs.

To read this article in full, please click here

//m.banksfrench.com/article/3245173/secure-your-sdn-controller.html
提高您的网络安全性:部署一个蜜罐 星期二,2017年10月24日09:19:00 -0700 马克Dargin 马克Dargin

Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? 

One way to see and do those things is to deploy a honeypot. It’s a system on your network that acts as a decoy and lures potential hackers like bears get lured to honey. Honeypots do not contain any live data or information, but they can contain false information. Also, a honeypot should prevent the intruder from accessing protected areas of your network.

To read this article in full, please click here

//m.banksfrench.com/article/3234692/increase-your-network-security-deploy-a-a-honeypot.html.
始终使用WAN仿真器测试远程应用程序性能 星期四,2017年9月19日11:11:00 -0700 马克Dargin 马克Dargin

Many organizations deploy new applications for their remote site users without testing it on a WAN. Not testing these applications across a simulated WAN increases the possibility of performance issues during the early stages of usage because you have no idea how the application will perform once latency or jitter come in between the communication path of the client and server. 

If the application uses large amounts of bandwidth that causes congestion, then it can negatively affect the performance of other applications that share the bandwidth. A WAN emulator can enable you to measure the average bandwidth that an application may use before you deploy it. 

To read this article in full, please click here

//m.banksfrench.com/article/3226729/always-test-remote-app-performance-with-a-wan-emulator.html
4个步骤来规划从IPv4迁移到IPv6 星期二,2017年8月8日06:45:00 -0700 马克Dargin 马克Dargin

With the depletion of IPv4 addresses, more organizations are encouraged to transition over to using IPv6 addresses. Many organizations are noticing the benefits of the built-in security features of IPv6. Also, enterprise IT managers are observing that their service providers are successfully using IPv6, and this encourages them to move forward with it.

To continue to ignore IPv6 could cause any number of potential problems, including an inability to immediately migrate to IPv6 when there is no longer a choice, loss of internet connectivity, and not being able to compete with organizations whose systems are configured for IPv6.

To read this article in full, please click here

//m.banksfrench.com/article/3214388/how-to-plan-your-migration-to-ipv6.html.
是时候考虑到IPv6的时间 星期一,2017年6月26日08:27:00 -0700 马克Dargin 马克Dargin

Organizations should consider migrating their network infrastructure and devices over to IPv6. It may be a challenge to persuade leadership to prioritize it over other projects such as cloud computing or big data migrations, but it is essential to start planning for a migration.

Many service providers, such as Comcast, Verizon and AT&T, have already started using IPv6 addresses and are presently encouraging other organizations across the United States to do the same. The Internet Engineering Task Force (IETF) has encouraged organizations to move forward with these migrations for over a decade, and with more devices connecting to the internet, the need has increased. 

To read this article in full, please click here

//m.banksfrench.com/article/3203708/time-to-consider-a-move-to-ipv6.html
云中受保护的健康信息安全吗? 星期四,2017年5月18日04:00:00 -0700 马克Dargin 马克Dargin

Many healthcare providers face the decision on if they should store protected health information (PHI) in the cloud. There are benefits and concerns to storing PHI in the cloud, and the decision to do so should be analyzed.

PHI is any health-related or insurance payment information that is stored or managed by a healthcare provider that can identify a specific individual. Examples of PHI are patient names, addresses, Social Security numbers, X-ray images, lab results, insurance payment information and medical records. Even information about a patient’s planned future procedures is PHI. Government regulation of PHI is covered in the HIPPA Privacy Rule, and all healthcare providers in the United States must adhere to it or face fines.

To read this article in full, please click here

//m.banksfrench.com/article/3197336/is-protected-health-information-safe-in-the-cloud.html
使用公共Wi-Fi时如何保护您的数据 2017年5月03日星期三07:13:00 -0700 马克Dargin 马克Dargin

Many people are not aware of this, but Wi-Fi hotspots at Starbucks, Barnes & Noble or your local hotel that offers it as a complimentary service are not safe for confidential browsing, performing financial transactions or for viewing your emails.

Public Wi-Fi does not offer encryption for individuals using the same password and hotspot. Also, your signals are broadcast across the immediate area. It is easy for someone else within your vicinity to eavesdrop on your communication. An unskilled hacker can intercept your signal using a phony hotspot or a tampering software that can be found on a search engine.

+ Also on Network World: 4 lesser-known Wi-Fi security threats and how to defend against them +

The first task of a hacker is to get on the same network as the potential victim, then they can carry out that task with a public Wi-Fi network because they have the password. It does not matter if a network password is given out by the cashier or printed in your hotel room's welcome packet, once public, your security is compromised.

To read this article in full, please click here

//m.banksfrench.com/article/3194005/how-to-protect-your-data-when-using-public-wi-fi.html
如何保护跨站点请求伪造攻击 Tue, 18 Apr 2017 03:45:00 -0700 马克Dargin 马克Dargin

Cross-site request forgery (CSRF) attacks are becoming a more common attack method used by hackers. These attacks take advantage of the trust a website has for a user’s input and browser. The victim is tricked into performing a specific action they were not intending to do on a legitimate website; where they are authenticated to.

CSRF attacks will use the identity and privileges that the victim has on the website to impersonate them and perform malicious activity or transactions. Attackers will attempt to take advantage of users who have login cookies stored in their browsers. Ecommerce sites that send cookies to store user authentication data are vulnerable to this attack.

To read this article in full, please click here

//m.banksfrench.com/article/3190444/how-to-protect-against-cross-site-request-forgery-attacks.html
互联网VPN或分支机构IP电话通讯的MPL? 星期一,4月10日2017 08:28:00 -0700 马克Dargin 马克Dargin

Many businesses with branch offices that have IP-enabled phones must decide what type of circuit medium to use for their communication to the corporate headquarters site.

Two of the most selected choices are a MPLS circuit or internet VPN. Both solutions have their pros and cons, and what is best can depend on your business requirements. Speed, quality of service (QoS), security and cost are the key factors you should consider when making this decision.

Pros and cons of an internet VPN

A significant advantage of using an internet VPN for communication is the cost. Most times, a branch site can use its existing internet connection for communication back to its headquarters. Usually, a 10 Mbps internet circuit costs much less than a 10 Mbps MPLS circuit. This can encourage a business to purchase more bandwidth for their branch site.

To read this article in full, please click here

//m.banksfrench.com/article/3188666/ internet-vpn-or-mpls-for-branch-office-ip-phon-phonmunication.html.