Entries by Bob

Cybersecurity for Rural Telecom and Broadband Sites

Greetings and welcome back.  This week, we continue our series on Cyber and Physical Security for Remote Telecom sites with our blog: Cybersecurity for Rural Telecom and Broadband Sites.  In our last blog, we discussed the availability of open network ports that are used by cybercriminals as back doors to steal data and destroy your […]

Cyber and Physical Security for Rural Telecom Sites

Greetings and welcome back.  This week we begin a study of the Cyber and Physical Security for Rural Telecom Sites. If you are a provider of telecom and broadband services to rural areas, you know that cybersecurity and physical security are large and growing concerns.  The huge geographic areas that your network covers and the […]

Secure, Unified Monitoring for All Your Network Closets

Many organizations have dozens, even hundreds of network closets, server labs and other small IT and Telecom rooms in their facility or campus.  All-too-often, these rooms have been monitored by multiple applications with a Network Management System (NMS) monitoring the SNMP devices, a Building Management System (BMS) monitoring the environmental and power conditions and a […]

Securing Network Closets in Healthcare Facilities

Greetings and welcome back.  In today’s blog we look at a subject that is all-too-often overlooked in hospitals, doctors offices, and other medical facilities: Securing Network Closets in Healthcare Facilities.  The fact is, healthcare records have the largest value of any type of record in the black market for Personally Identifiable Information (PII).  Because of […]

Network Closet Vulnerabilities – Cybersecurity

Greetings and welcome back!  In today’s blog we will look at the problem of cybersecurity in network closets and small server rooms.  This is of particular importance to those who fall under the requirements of HIPAA, PCI-DSS or Gramm Leach Bliley as they make no distinction in where the data is located or the size […]

Network Closet Security Vulnerabilities – Physical Security

Greetings and welcome back.  In this blog, we take a close look at Network Closet Security Vulnerabilities – Physical Security.  This is the first in a new series on the key types of network closet security flaws.  This is a key topic, especially for all those of you who are covered under HIPAA, PCI-DSS, FERPA, […]

Network Closet Security – Physical Security

Greetings and welcome back.  In this blog, we take a close look at Network Closet Security Vulnerabilities – Physical Security.  This is the first in a new series on the key types of network closet security flaws.  This is a key topic, especially for all those of you who are covered under HIPAA, PCI-DSS, FERPA, […]

New York Cybersecurity Law & Your Rack Systems

Greetings and welcome back!  This week we continue our series on the effect of the New York Cybersecurity Law for Financial Services Companies on the need to protect Information Technology (IT) systems as well as Industrial Internet of Things (IIoT) systems.  Specifically, we look at the New York Cybersecurity Law & Your Rack Systems. New […]

Server & Telecom Racks and New York Cybersecurity Law

Greetings and welcome back!  Beginning this week, we are going to dovetail our discussions of the Federal Gramm Leach Bliley Act (GLBA) for financial services companies together with the New York Cybersecurity Regulations for Financial Services Companies.  Because New York is the home to many of the country’s financial services companies, it seems natural to […]

Gramm Leach Bliley Requirements for Data Rack Security

Greetings and welcome back!  In this week’s blog we look at the Gramm Leach Bliley Requirements for Data Rack Security.  The Gramm Leach Bliley Act (GLBA) covers security requirements for all organizations that handle confidential information related to loans.  This Act is broad-based and covers everything from data about student loans, auto loans and home […]