Online Safety at Home

By | Security | No Comments

While internet usage in the home continues to grow, so does our need to learn, exercise and share internet safety. From posting on social media to using the latest internet-connected toy, it is imperative that everyone from children through older adults learn to use the internet and internet-connected items safely.

Here are a few tips to get those conversations started based on StaySafeOnline recommendations:

Keep a Clean Machine: Those pesky “updates” on our cell phones, PCs and other Internet-connected devices, are designed in part to help keep your devices free of viruses, malware, and other online threats. Don’t ignore them – many times they include patches to recently discovered vulnerabilities.

Lock Down Your Login: One does not need to look hard to find recent examples of large-scale password exposures. Improve account security by enabling robust authentication tools such as bio-metrics or one-time access codes. Let’s Talk About Passwords.

Read Between the Lines: Would you put up a sign on your front door saying, “Nobody is Home?” Of course not but that could be how a bad actor reads your real-time check-in or vacation photo. If you want to share your adventures, lock down who can see your posts or consider posting once you have returned.

Share with Care: Think carefully about what you are saying about yourself or others before you post. Choices can hurt feelings, betray trust or even come back to bite you in the future.

Back it up: Having a recent copy of your important files and photos can spare you from the ill-effects of device failure and #ransomware.

Protect Personal Information: Personal information is an asset that can be sold for money. Information such as your locations and purchasing habits and even search history is deemed valuable by an array of retailers. Did you know that Medical Records are more valuable on the black market than your credit card numbers?

Be Aware of Incognito Mode: Browsing Incognito can be a great way to ensure that your cookies and site data are not saved. However, parents beware, browsing incognito can allow your home users to visit sites without you being able to track their activity by looking at the browser history.

Avoid Falling for Tricks: From Phishing to Spoofing, bad actors can be very creative in tricking unsuspecting internet users to click on malware. Knowledge is power so keep yourself and your household familiar with how to recognize potential fraudulent attempts to get you to click. Be wary of communications asking you to click or enter private information. When in doubt, contact the organization directly by phone to confirm that the communication is legitimate and to report it if it is not.

Secure Your WiFi Router: Change your WiFi router’s default name in a way that does not let people identify that it’s yours. No using “WoodwardHomeWiFi”. Set a very strong passphrase for your WIFi network. Have fun with it keeping it positive and easy to remember and consider throwing in some numbers to substitute as letters such as “IL0V3THEB3ACH”.

Follow Xiologix for more #cybersecurity information as we participate in the 15th Annual National Cybersecurity Awareness Month and work year-round to help businesses of all sizes protect their digital infrastructure and data.  #cyberaware

5 Reasons to Purchase Cybersecurity From a VAR

By | Security | No Comments

The digital business model requires organizations to adopt a new approach to securing data and networks. At the same time, technology and networks are evolving, making security more complex.

One of the biggest challenges is the sheer number of security products and vendors inside an organization. According to our technology partner Fortinet, Some larger financial enterprises; for example, use products from as many as 40 or more vendors to secure their networks.

All these products — firewalls, intrusion protection systems, antivirus tools and so on — have their own management systems and generate their own alerts. Since they don’t typically integrate, these disparate products complicate security efforts even further.

The number of alerts generated by separate systems can overwhelm even the most robust security teams, with many alerts going uninvestigated.  Read More

Application Infrastructure Dependency Map

Why People are Talking about Uila

By | Cloud Computing, Virtualization | No Comments

Uila LogoUila (pronounced wee-la) with its application-centric infrastructure monitoring and analytics identifies performance bottlenecks for business-critical services and plans workload migration strategies for private and hybrid cloud environments. Uila provides service dependency mapping, full stack correlation with one-click root cause analysis and patented deep packet inspection technology that understands over 3,000 application protocols for transactional meta data analysis. Businesses use Uila to align themselves with their IT operations team and cut time to resolution from days to minutes, keep their application at peak performance at all time and ensure end-user satisfaction to the fullest. Read More

Xiologix Employee Completes 8-Day Wildnerness First Responder Certification

By | Xiologix in the Community | No Comments

Senior Systems Engineer, James Pethigal, completed the 8-day Wilderness First Responder certification course in Southern California this past week. As traditional first responder training typically takes place in domestic and urban settings, the wilderness training teaches participants effective methods when dealing with medical emergencies when 911 is not a viable option. Read More

Xiologix Employee Completes Avalanche Rescue Course

By | Xiologix in the Community | No Comments

Senior Systems Engineer, Abe Covello, completed the Companion Rescue course up at Mt. Hood which included structured rescue scenarios in:

  • Companion rescue
  • Scene assessment
  • Beacon use
  • Probing
  • Recovery of victims not wearing beacons
  • Common mistakes in avalanche rescue
  • Single and multiple beacon search techniques
  • First aid and emergency response in avalanche rescues

This is another example of how Xiologix employees care.   We are proud of our employees’ continued involvement in their local communities.

How E-Rate is Connecting Students to the Internet

By | K-12, Wireless | No Comments

E-Rate Survey

Extreme Networks conducted a survey of K-12 IT Managers and Educators seeking to learn about their knowledge and use of E-rate.  Not surprisingly, the survey found that lack of awareness is the biggest reason that school districts did not take advantage of the E-rate program. Take a look at Extreme Network’s Infographic detailing how E-Rate is being used. Questions?  Learn more about how Xiologix can help you to make the most of your E-rate dollars! Read More

Christopher Kusek named as a Cisco Champion 2018!

By | Xiologix in the News | No Comments

ciscochampionCK18Xiologix’ CTO Christopher Kusek was notified on January 19, 2018 that he had been selected as a 2018 Cisco Champion.

Cisco Champions is a global group of highly influential IT technical experts who enjoy sharing their knowledge, expertise, and thoughts across the social web and with Cisco. The Cisco Champions program encompasses people with interests across Cisco’s technology portfolio, including Data Center, IoT, Enterprise Networks, Collaboration, and Security.

This is Christopher’s 3rd consecutive year to hold this honor.

Why Hackers Hack

By | Security | No Comments

WHY HACKERS HACK

One does not need to look very hard for news of recent cyber attacks. As 2017 numbers come into focus, the problem is continuing to grow.  According to the ITRC Breach Report 2017 breaches increased at about 21% over 2016.   Most of the breaches fell into the Business sector followed by the medical/healthcare sector.  Some big names were involved such as Equifax,  Yahoo, Verizon and more. But notably, over 50% of cyber attacks are aimed at small -mid-sized business that don’t make the national headlines.

Check out the Real Time Threat Map to get a visual on current threat activity.

While the actual numbers are still be tallied, let’s take a look Raconteur’s infographic on what motives cyber attacks. Why do hackers hack? Who is behind the data breaches?

why hackers hack
Courtesy of: Visual Capitalist