Deploying a POL can help make your network more secure. Here’s why. Fiber optic cabling is more secure than copper cabling. Centralized intelligence and management is accessible only at the OLT, locked in the main data center. It’s easy to implement tight network access control. ONTs do not store user or network information. And, ONTs have no local management access.
Keep your network safe by adding a physical layer to your security system with the new SmartKeeper product which offers a master key that controls multiple devices to block a variety of open ports.
The Internet of Things (IoT) revolution is presenting smart building managers with a multitude of new cybersecurity challenges stemming from the rapid increase in the number of devices in most organizations’ networks. These devices are mostly unmanaged, come from a multitude of vendors, use non-standard operating systems, support a diversity of, often unencrypted, protocols, and may dynamically connect to other devices inside or outside the organization’s network. They also often lack security features, which means that vulnerabilities are discovered with increasing frequency. Additionally, bad security practices such as default or simple credentials, unencrypted traffic and lack of network segmentation remain common. As the scale and diversity of IoT devices grow, cybersecurity becomes an important focal point for any organization.
Researchers detail the risk posed by insecure IoT devices, demonstrating how hackers could hide evidence of a physical break-in from operators of internet-connected cameras.
The U.S. utility industry may have just experienced its first malicious “cyber event”—or at least the first such event to be reported. The report was a “denial-of-service” attack that disabled Cisco Adaptive Security Appliance devices ringing power grid control systems for the affected locations.
Internet service provider Internet Initiative Japan has built a 430,500 square foot (40,000sq m) data center in Shiroi, Japan. Reception, patrolling, monitoring, and other operational tasks in the data center will be […]
Department of Justice officialshave requested $2 million for a new, but small, IT program aimed at protecting data in the cloud as a key to the agency’s future cybersecurity. The amount is […]
Many in the ICT industry are considering how the fourth industrial revolution will reshape businesses, careers and the world — the Industrial Internet of Things (IIIOT) This shift is driving significant change […]
Newly discovered vulnerabilities in 4G and 5G cellular paging protocols open up associated devices to attack.Researchers discovered that if several phone calls are set up and canceled in a short period of […]
Retail businesses, and other consumer-facing organizations, have to deliver new applications, reliability and security, outside the comfort zone of traditional IT. One huge difference between these applications and traditional IT is the […]