February 9, 2016
To facilitate the easy flow of data and ease the maintenance and setup burden of IT teams, many organizations have been moving toward BYOD, or Bring Your Own Device. The policies and practices surrounding BYOD are difficult to navigate, especially with the ever-increasing footprint of the Internet of Things. In the face of expansion, though, and the reality that all of your employees now have personal devices, limiting access to company laptops and desktops, while infinitely more secure, seems downright parochial. As an IT professional, though, the safety and security of the data is paramount. (more…)
January 17, 2016
It’s awards season, our time of looking back to a previous year’s achievements across a variety of cultural disciplines. The Oscars, the Golden Globes, and the Peoples’ Choice Awards are just a few. As an IT professional, you’ve longed for more industry-specific recognition, and awards like “Best Pocket Protector in a Supporting Role” or “Best Line of Code in a Feature Length Composition” make your digital heart sing. (more…)
January 11, 2016
Another year in the rearview mirror. You raise a glass and toast your organization’s many accomplishments. You met or exceeded your revenue goals, maybe, or you successfully completed three projects and put four more on the books for 2016. You are blowing and going and the world is your oyster. Take a big sip of that success. You’ve earned it. Take another for growing your business and your staff in parallel. Oh, the hint of fruit in that bubbly is very nice. Take another for the solid performance of your IT staff, keeping your network and data at the fingertips of the heroes but safe from the sticky fingers of the bad guys. At least as far as you know. (more…)
January 6, 2016
Isn’t it great to be back at work? The kids are back in school, the elf-on-the-shelf is back in the attic planning next year’s pranks, and all you’ve got left to look forward to are the credit card bills. Santa was a bit overzealous, perhaps, but the looks on their faces make it all worthwhile, am I right? (more…)
December 19, 2015
The District Attorney for New York County and Manhattan is officially calling for smartphones to be equipped with a backdoor. Boing Boing reported last week that the DA’s efforts to ensure law enforcement access to stored data on all tablets and smartphones has the support of law enforcement officials in The UK and The Netherlands. So there’s that. But while the DA’s office goes to great lengths to affirm that access under search warrant would not violate human or civil rights, the report does not address the very real problem on the tech side. If you put a chink in the armor, it seems, wouldn’t you invite other, less hospitable elements to the party? (more…)
December 16, 2015
Forrester Research suggests that Ransomware will hit medical devices as early as 2017. Motherboard reported in November that the technology commonly deployed to hold your data ransom, usually payable in Bitcoin, will soon make its way into your pacemaker, drug pump, or any device that uses IoT to enhance the healthcare experience. Ransomware is effective largely because it demands a payment that is proximate to what its victims might have to pay to resolve the issue otherwise, making it cost effective to simply pay the ransom to release your data. That scenario is changed dramatically when the ransom note is received as the heart monitor weakens overhead and nears flatline. (more…)
December 5, 2015
As an IT professional, you are familiar with social engineering. You’ve probably even had specific training on social engineering and the ubiquitous threat it poses to your network. As a result, you look suspiciously at Melvin, the new facilities guy, as he makes small talk with Raynell at the front desk. Is that a thumb drive on his big key ring? (more…)
November 23, 2015
Welcome to the Tweener, that brief window of time between Thanksgiving and Christmas, when shopping reaches a fevered pitch, tensions run high, and Jim from Sales makes his way back to his office from seven months on the golf course to close deals before year end. Ho, Ho, Holy Cow, what a year it’s been.
November 24, 2015
It’s the beginning of the holiday season. The radio stations switched to Christmas carols around Halloween, Santa is ringing a bell over a red bucket on every street corner, and we haven’t even carved the first of the annual pair of turkeys, much less cleared the freezer of last year’s fruitcakes from Aunt Eunice. Our only consolation, apparently, is the conspicuous consumption masking itself as Black Friday.
November 20, 2015
November 19, 2015
November 17, 2015
November 16, 2015
October 27, 2015
As Republicans try to make political hay while the sun shines on Hillary’s private email server, another national security issue rears its ugly head from the latest batch of those released emails. The AP reported last month that Russian hackers tried to access Hillary’s private server at least five times while she was secretary of state. The attempts in 2011 were disguised as fake New York State traffic tickets and, if opened, would have embedded malware that would allow foreign nationals to control her server and access all of the information stored there. (more…)
October 25, 2015
A couple of weekends ago, a network failure at Southwest Airlines wreaked havoc and tested the smiles of the usually happy airline and customer base. Check-in functions typically performed by their website and app had to be handled manually, slowing the process to a crawl and delaying over 500 of the 3600 flights scheduled for the 12-hour period. (more…)
October 23, 2015
You run a tight ship. You’re like the Admiral Nimitz of the IT space. You work closely with management to maximize resources. You know the projects already on the books for 2016, and you’re fighting for every penny, trying to keep the c-suite focused on the future, aware of the dangers that lurk in the ether and the need to guard against them. They just won’t listen to reason! (more…)
October 10, 2015
As an IT professional and keen business observer, you’re always scouting talent. You like to recruit good people as you find them, not as you need them. Your savvy and swagger often assure the corner offices that you’ve got everything under control, even as they tell you about the seven new projects they’ve landed for next year. You’d like to celebrate, but you’ve got networks to manage, managers to network, and emails to return.
And you’re going to need more people. (more…)
October 20, 2015
You’re an IT professional, so the wonders of technology are not lost on you. If there’s an app for that, you want to know about it. And the emergence of biometric security features on phones and IoT devices is right in your wheelhouse. At first blush, you recognize the stellar, seemingly impenetrable fortress that is the fingerprint. And unlike passwords and social security numbers, we can’t change our fingerprints. That’s like the ultimate cryptology at your fingertips. But still, there is that nagging little voice that says even that can be hacked. (more…)
October 12, 2015
Columbia, SC is a sleepy little town by most accounts, except when the Gamecocks win at home. The state capitol of South Carolina, Columbia has a vibrant business community and service-sector economy. Until about a week ago, it’s distance from the ocean insulated it from the seasonal hurricane fray. But that was last week. (more…)
October 15, 2015
U.S. House of Representatives Inspector General Theresa Grafenstine told Congress last week what every male IT professional has been saying for years: There are not enough women in this business. The larger context of her comments was the ongoing global cyberwar we seem to be fighting and the notion that arming ourselves with mostly men in this battle is, quite literally, a half-brained idea. Women, she suggests, bring unique skills and strengths to bear on these and other situations, and we should work toward a greater balance between men, women, and minorities. (more…)
September 28, 2015
Nature’s Good Side
How confident are you that that your network would survive a lightning strike or even a one-hour power outage? Let’s say you’re pretty sure you’ve got the right things in place to weather the storm. Have you tested your strategy in the last month? Year? At any point since the Reagan Administration? (more…)
September 24, 2015
You’re an IT expert, department head, and management guru. You eat complications for lunch and challenges for dessert, but have you ever really gotten that stellar mind of yours around budgeting? You know about the known knowns, and the known unknowns can be accounted for, but that last category of unknown unknowns stumped even Dick Cheney. And the unknowns in the IT space get more complex every day. (more…)
September 19, 2015
In 1985, when IT was an emerging career track and Steve Jobs was resigning from Apple, the British sent Katrina and the Waves across the big pond, walking on sunshine. Fast forward 20 years and we encountered a completely different Katrina and much bigger waves, leaving folks stranded on rooftops and walking on the Superdome. Who knew popular music could be so prescient? (more…)
September 15, 2015
The last several months have seen an increase in the reported breaches of government or related networks. The University of Virginia network was breached recently by Chinese hackers, mainly, it is thought, because of their connection to DoD, Intelligence, and other government contractors, programs, and facilities.
Government contractors seem especially vulnerable these days, particularly to APTs, so let’s take a look at this threat with fresh eyes. (more…)
September 9, 2015
Imagine your life as a conservative, family values politician, or maybe even a minister, leading a flock of faithful men and women, your devoted wife at your side and pictures of the children on the desk behind you. That’s the “Before” picture, the one you see in your mind before the Ashley Madison hack and data dump, before the world connected your name and address and, in some cases, your most intimate details with the online presence designed to optimize invisibility. The “After” picture? Well, that one’s still in process, but the smiles evaporated quickly, and it’s an image that’s likely to stick with you for a long time. (more…)
August 29, 2015
In response to the ever-increasing number of high-profile cybersecurity breaches, The White House has formed the Cyber Threat Intelligence Integration Center to coordinate cyber threat data and assessments. Regardless of your position on government intervention, the move reflects a heightened national awareness of the pervasive nature of cyberthreats in our world. (more…)
August 25, 2015
Boys (and Girls) of Summer
Summer’s almost over. The kids are making their way back to school, and the parents are breathing a sigh of relief. Time has flown over the last three months, leaving in its wake a sandy, chlorine-smelling, airplane-riding, summer-camping, barefooted, late-sleeping bundle of teenage angst. Good times, am I right? But while time has flown by, you may have noticed that none of the lawn furniture or street signs or mobile homes have. Flown by, that is. Because we have had a relatively mild hurricane season so far. Well, last winter was mild too, until January checked in. (more…)
August 22, 2015
Your business has been rocking along, but the tide of change is rising. Maybe your stellar sales team has lined up a truckload of projects and you’ve got to expand your network. Maybe you’re facing an ownership change and need to make the upgrades the previous owners didn’t favor. Or maybe you’re starting a new venture, from the ground up with the sky as the limit, and you need network architecture that takes you to the moon. ICS can help with that. (more…)
August 18, 2015
Someone asked a reputed “Captain of Industry” when it was appropriate to fire somebody. His response was simple. “The first time is crosses your mind,” he said. If you supervise people, lead a team, herd vendors, or manage customer relationships, you’ve probably asked yourself the same question, and maybe you came up with a better answer. It is more likely that you made an effort to avoid conflict and hoped for the best. Human nature. (more…)
August 14, 2015
The Golden Age of Yesterday
Remember way back, when flip phones roamed the earth and the threat of trojans could be quarantined in the CPUs and laptops in your life? The innocence dissipated with the dawn of smartphones in 2007. Then the deluge of apps ushered in all manner of new threats, but at least you could, in theory, control your exposure by limiting the apps you used and practicing robust password security. Good times, gone the way of the brick and the bag phone. (more…)
July 31, 2015
You’re probably recalling where you were the first time you heard Sting and The Police, or what the funky red graphics were on the cover of that album. That’s what most folks recall. We are, after all, Spirits in the Material World. The expression was actually coined by Gilbert Ryle in his 1949 book The Concept of Mind, an examination of Rene Descartes’ dualistic separation of mind and body. At the core of this philosophical marvel is the notion that the mind and body work independently of one another, and their connection is speculative at best. This concept takes on new relevance in the digital world.
July 27, 2015
June is usually a big month for baseball, but sometimes the biggest news is found beyond the box scores. This year the boys of summer, or at least their front office representatives, took a swing at a slider and hit a really foul ball, making the statistics-obsessed management of America’s game seem like child’s play.
Allegedly, the St. Louis Cardinals hacked the Houston Astros, breaching interior databases that housed trade speculations, scouting reports, and other sensitive, proprietary information about the team. The breach is still under investigation, so the reasons behind the attack remain as elusive as a knuckle ball. It seems likely, though, that the Cardinals were mining Astro data in hopes of building a better team. Or maybe a senseless jab by disgruntled former colleagues.
July 28, 2015
Joey, Have You Ever Been in a Turkish Prison?
The 1980s comedy franchise Airplane does a great job of spoofing the more dramatic Airport and, to a lesser extent, The Poseidon Adventure. At a time when truly global travel was emerging for the general public, there remained in the hearts of many a fear of the complexity of travel, a fear that has almost completely evaporated in the travel world we take for granted these days. Airplane turned chaos into comedy, exploiting the potential for danger and the human love of a train wreck. (more…)
July 24, 2015
The thumb drive sits on the edge of the table, carefully wrapped in cellophane and surrounded by the other promotional materials from the SWAG bag left by the Chamber of Commerce. It was a very nice gesture, and you’re giving serious thought to the guided tour of local brewpubs pictured in one of the brochures, but you eye the thumb drive with suspicion. And rightfully so. (more…)
July 20, 2015
SOC it to You!
Imagine a small chip with an oddly configured pin out footprint, originally designed to connect serial to USB. Now tweak the ROM on that chip, infuse it with a dash of RAM and a sprinkle of flash memory, and you have just actuated SOC, or system on a chip. Actually, you don’t have to imagine it. You can buy the chips for about $5 and use them to connect devices to the old interwebs. That’s right. A $5 chip is now a gateway to the holy grail of network security. (more…)
July 6, 2015
Think of today as Monday. Maybe you’re just back from a long holiday weekend. You’ve celebrated the birth of a nation, perhaps, and the chili dogs are still waging war, keeping the spirit of rest and relaxation alive and well. Now the battle takes a twist as you rattle down the list. These are the projects you face today, the fires that demand your immediate attention, like the chili dogs.
June 24, 2015
Looking for a good business model with a market poised to explode in the next five years? No, it’s not the latest social media platform or even a cryptocurrency. It’s cybercrime, and your business is rapidly becoming their business. (more…)
June 14, 2015
April 15th lurks in the shadows of every year, as inescapable as the Grim Reaper and only slightly less popular. The IRS has conflict in its DNA, as our nation’s first revenue commission was established in 1862 to pay for the Civil War. Repealed ten years later and even ruled unconstitutional by the Supreme Court in 1895, the IRS began collecting income taxes in 1913, after the 16th Amendment was ratified, and the steady gathering of data began.
June 4, 2015
Ever feel like somebody else is in control of your life, flying the airplane that is your body through the friendly skies of your daily routine? Well, if you’re on the same plane with Chris Roberts, you might just be living beyond the metaphor. Chris likes to fly big airplanes, with real people on them. But Chris Roberts is not a pilot.
May 28, 2015
Joplin, Missouri is like a barbell. Downtown retains an interesting mix of history and mid-rise offices while, several miles to the south, the medical complex and commercial corridor almost glistens with new construction. In the middle, a once-vibrant residential area known as South Joplin, is a mix of random new commercial buildings and tract homes, with its former glory wiped away, along with any hint of vegetation, by a Category Five tornado in 2011. All the infrastructure is new, but any visitor would know immediately that the previous iteration of this neighborhood had been stricken from the record. (more…)
May 21, 2015
First Quarter results are in the books, and the contracts you hunted late into last year have borne fruit. Like the Robber Barons of yesteryear, you have a dogged commitment to your industry, though sometimes you wish you had cornered the oil market instead. Because, like the scions of the Gilded Age in American history, you are trying to build trust in a marketplace that often seems more like the wild, wild west. Nevertheless, the horizon seems rife with opportunity and your sales team is all fishing and no cutting bait. (more…)
May 12, 2015
Even in the face of increasing network breaches, we distance ourselves from the threat. It’s a big box retailer or a global bank that’s been violated, not us. Our data and personal information might be in danger, but we assuage our fears with the sense and song that the sun’ll come out tomorrow and we’ll face the new day with purpose, repair the damage, and get on with our lives. What happens, though, when the cyber breach threatens a human heartbeat? (more…)
May 4, 2015
In the fifth of six predictions for IT staffing in 2015, CIO suggests that a robust economy and job market will encourage more full-time employees to seek part-time or freelance work. This trend, they suggest, will repeat similar movement in the previous cycle and reap benefits for both employers, who have the ability to identify and deploy specific needs and talents, and employees, who maximize the return on their particular skill sets. For the sake of argument (and this blog post) let’s assume the predictions are spot on. How does your organization take advantage of the shifting talent pool? (more…)
April 21, 2015
The blue skies above a small bay in early April offer no inkling of the potential chaos lurking in the wings. Just inland from the Gulf of Mexico, tourists comb the backwaters for fish and fun as the manatees swim languidly beneath them, timeless watchmen of the water and the weather. Smoke rises from stacks in the distance, a reminder that even the best nature offers stands in the path of progress. Like the manatees, we must adapt to changes in our world, and our world is probably changing more rapidly than we imagine. (more…)
April 10, 2015
April 13, 2015
Spring is working really hard to push through the snow as chilly nights give way to warmer days and the road beckons the warriors back from a long winter’s nap. It’s time to hit the bricks, pound the pavement, spend the shoe leather, all looking for new opportunities for your business. And, when the day is done, when your team has left nothing on the field in Topeka, given their all in Albany, there’s a cozy bed with rewards points, warm cookies, and complimentary WiFi waiting at the next exit. Home, sweet home, right? (more…)
March 23, 2015
It’s Spring Break, and hundreds of thousands of students from the far reaches of North America are making their way across the USA in a Chevrolet, migrating to the seasonal climes and exotic beverage offerings of sunny Florida. Escaping the more — perhaps presumably — disciplined daily rigors of their college studies, many students engage in atypical behavior, casting inhibitions to the wind and embracing the larger world in various stages of sobriety and dress. It’s all silly college kids until you get the call.
Now imagine your data on Spring Break.
Cocktails and Sunscreen
Your data is your data. You protect it when you can and hope your staff makes good decisions when they take it out into the world, because you know that lurking in the shadows are bad people with even worse intentions. They wait at the bar to offer high-tech cocktails, ones that your data won’t even know it drank. They use proven social engineering techniques to gather information and gain entry, tossing out lines line “Oh yeah, I knew Bif when he was in high school. We go way back.” Next thing you know, your data is enjoying an afternoon on the beach with no sunscreen. Feel the burn.
ICS is the Lifeguard for your data, the designated driver and trusted friend that keeps your data at the party but out of harm’s way. And with ICS you always get two for the price of one, both industry leading expertise and peace of mind.
Call ICS today before you get that distress call from your data. Don’t worry, be happy!
March 6, 2015
You know an issue is prominent when it enters popular culture, and the creators of the wildly successful CSI franchise are hoping to demonstrate the increasing need for cybersecurity vigilance with the newest addition to their portfolio, CSI: Cyber. The bread and butter of this successful series of shows is the slow, complex narrative surrounding a single crime scene. They explore every lead and methodically bring the perps to justice. It’s a great formula for television.
House of Cards
For those Netflix binge watchers out there, consider also the role of the cyberterrorist with the guinea pig. At the beck and call of the FBI because of his nefarious activities, he latches on to the tail of the Frank Underwood storm and hacks his way into the personal information of his captors and their wives. High school kids who’ve been warned a million times about the dangers of their digital footprint marvel at the harvest of his efforts and ask, “How did he get all that information?” (more…)
March 12, 2015
Singing in the Rain
Ever tried to hail a cab at night, in the rain, in Manhattan? Even worse, in a metro market where taxi service is not as fluid? Even if you haven’t, you can probably imagine how innovative an app-based cab service could be. Uber and others are filling this niche in markets across the country and around the globe. The service is almost a seamless hybrid of social media and carpooling, and it’s a great example of how technology is changing the way we interact with each other and the world. (more…)
February 23, 2015
Money for Nothing
In late 2013, ATMs in Kiev began spitting out cash at random times, even if nobody was standing in front of them. Turns out, cash on the concrete was just the tip of the iceberg. By the time investigators got their forensics around the issue, over 100 financial institutions across over 30 nations had been breached in what might be the largest bank theft of all time. (more…)