Regardless of the type of company you're running or even the industry you're operating in, one thing needs to become astoundingly clear as soon as possible: cyber security is by far the biggest risk to your organization. Not only that, but it's only going to become more of a pressing issue as time goes on.
Phishing is the use of fraudulent emails appearing to be from reputable companies in an effort to acquire sensitive or secure information from the recipient. Phishing may be attempted to solicit credit card numbers, passwords, social security numbers or other personal or business-related information. Phishing can be particularly problematic in a business situation, where dozens or even hundreds of employees may be accessing emails on company computers.
A creative solution to the sometimes-exorbitant cost of planning for and installing fiber-optic systems, dark fiber's reach is quickly expanding. Already, the “dark” concept plays a huge role in connectivity across dozens of cities and in a wide array of industries. Read on to learn more about this revolutionary solution and when it's a preferred option:
The rise of various technologies has made it easier to stay connected and speak with friends, family and colleagues around the world. Traditional landline phones eventually gave way to mobile phones and wireless technologies that have made long-distance calls and video chats more affordable. Voice over Internet Protocol (VoIP) offers speed and convenience for many, in particular when it can be done using a user’s mobile phone. Many such calls are free as long as users are sharing the same VoIP service, and quality is remarkably good these days. Those who have never heard of VoIP phones may be surprised in that they may have already used the technology when making a Skype call to a family member. Read more to learn about the history of VoIP phones and how consumers may or may not benefit from the technology.
We worked to keep our customers updated during Harvey via email, website, and social media. We wanted to also keep record of those posts in our blog in case customers needed to refer to dates.
Make sure your ports are covered!By Robbie Adair, PS LIGHTWAVE Consultant
In this data-driven and IoT world, businesses have to take network security very seriously, re-evaluating and checking their current policies and procedures often. There are many steps to setup and then maintain a secure network. First is obviously the physical security, such as the servers, cabling, and devices. Who has access, where they are housed for protections against the elements, and power supplies are some of the major items to be considered on a physical network. Second is the non-physical part of the network, the “unseen” structure that allows for business to be conducted with internal and external employees and clients of the company. This non-physical side of the network is more often wrongly configured policies that need to be scrutinized, as digital space is the most likely source for security breaches.
Robert Jacobs, a PS LIGHTWAVE employee, recently received a surprise honor from one of our partners, Extreme. He has been a member of The Hub, Extreme Network’s community forum, since it was formed in 2014. This active forum has around 5000 users, and they moderate it with the help of a full time support engineer and various volunteers. Extreme started an “Embassador” (E for Extreme) program a few months back and have added a few chosen experts as contributors and helpers with issues and questions that are posted.
Facts regarding ISPs selling customer dataBy Robbie Adair, PS LIGHTWAVE Consultant
In March 2017, the United States Congress voted to repeal the FCC Internet privacy rules that were going to go into effect later this year. The FCC Internet privacy rules were explicitly designed to prohibit Internet providers like Comcast, Verizon, AT&T, and PS Lightwave from sharing, selling or utilizing client data like usage history, browsing habits, geolocation information, and more. There were policies in place before these rules, but they were unclear and confusing. By repealing the new rules, something that was lobbied for by many of the large scale Internet providers, the common fear is that ISP’s will be more aggressive in data gathering and sharing of your online activities.
By Jennifer Henderson, PS LIGHTWAVE Communications Manager
At PS Lightwave, we use the DISC Assessment as a tool toward a better understanding of, and better communication with one another. DISC is the most widely used tool of its kind, and offers a comprehensive overview of the way people interact with one another, and process information from those interactions. “DISC” is an acronym for: Dominance, Influence, Steadiness, and Conscientiousness, the four behavior types identified in the assessment.