Today, Electronic Messaging is an embedded part of our Daily Lives, whether as e- mail, Instant Messaging, Skype, Facebook, just to name a few. We really don’t concern ourselves on how to configure or doing message testing – we just know it works!
That has not always been the case. Over the years, a lot of planning and development was required to bring about the messaging systems of today. This also included the creation of ‘standards’ among the various vendors creating messaging software. “Standards”, are industry agreements and rules on how to design and create the software to smoothly work in a multi-vendor environment. For instance, you might think of the “Internet” as a standard, it might be better thought of as a “Network of Networks” containing a group of standards ‘under its hood’. The Internet, however, was not widely used outside of Government and some Educational facilities, until the mid 1990’s. Also during this early time period, “Electronic Messaging’” was just called ‘e-mail’…
As a Fax Server Architect (and Systems Administrator), one of my functions is to set up and maintain Least Cost Routing tables. If you have fax servers spread across several states (or countries), you want to route the fax jobs to minimize Toll Costs. This requires knowing about Telephone Area Codes and staying on top of new Area Codes being added. If there are also geographic areas that you want to block (i.e., Caribbean Islands), you also need to know which specific Area Codes are assigned to those areas. Most of the Caribbean Islands are included in the North American three-digit Area Code Numbering Plan, used in the United States and Canada. Long Distance routing is not quite as confusing of an issue as it used to be, when you had one telecommunications company providing your local service, but having to use a separate telecommunications company for long distance calling, particularly between LATA’s (Local Area Transport Area) Boundaries. LATA’s were established as part of the AT&T breakup, in 1984, defining which calls can be placed by your local telephone company (Baby Bells) and which ones required a Long Distance provider. Most telecommunication companies now support specific compliance rules allowing them to provide both Intra-LATA and Inter-LATA calls. There are close to 200 defined LATAs…
The IT Summit Denver Welcomes Colorado Governor John W. Hickenlooper as Keynote Speaker
Colorado Governor John Hickenlooper keynote to kick off “star studded” information technology conference
Portland, Oregon, March 5, 2015: The IT Summit is honored to announce Colorado Governor John Hickenlooper as a special guest speaker at the 2015 edition of The IT Summit Denver Information Technology Conference. Advancing the future of the tech industry in the state is an issue of interest to many and the governor has been an advocate of increasing the states’ presence in the tech industry. Colorado tech leaders should not miss this opportunity.
The conference also features guest speakers David Luhan, State of Colorado Director of Information Technology, and Frank Daidone, Chief Information Officer (CIO) for the City and County of Denver, along with other IT and data security luminaries such as Jamie Yancy, VP/IT Manager & Security Officer, Native American Bank, and Ike Barnes, who is the head of the Colorado Electronic Crimes Task Force for the US Secret Service.
“We know that speakers with technical expertise are important to tech leaders, but we also recognize that the influences and demands on the tech industry and tech leaders come from a number of directions. Because our conferences are designed specifically by IT leaders for IT leaders, we work to bring speakers to address the many issues that can affect IT leaders,” said Wes Sherman, President of The IT Summit.
Additional information regarding times, venue, and registration and complimentary admission qualifications can be found on the company’s website at http://www.theitsummit.com, or can be obtained by calling at 503/828-0294.
The IT Summit announces its 2015 Conference Series for IT Executives, Professionals and Solutions Providers
The IT Summit returns with it’s popular series of IT focused conferences, updated for 2015
Portland, Oregon, January 5, 2015: Following their successful 10th Anniversary year events, The IT Summit has announced the dates and locations for its highly anticipated 2015 Conference Series. Regarded as the ‘Ultimate Conference Series’ for IT executives, professionals, and solutions providers, The IT Summit conferences are for senior leaders to promote economic development, education, and the proliferation of information technology. “Our regionally focused conferences are special not only because they are designed specifically for IT leaders, but each is crafted with the input and guidance of IT leaders,” said Wes Sherman, President of The IT Summit. “As a result, each of our events offers the incredible opportunity for C-Level technology leaders to interact with, and learn from their peers, the opportunity to attend informative seminars by dynamic speakers that are of specific interest to IT leaders, the opportunity to meet with a wide selection of outstanding solution providers, and to be able to do this all in single location over the course of a single day. And not only do we offer all this to IT leaders at no expense to them, we even throw in the proverbial ‘free lunch.’”
The IT Summit 2015 series includes events in: Bellevue/Seattle, WA; Denver, CO; Houston, TX; San Diego, CA; Long Beach/Los Angeles, CA. Additional information regarding times, venue, and registration and complimentary admission qualifications can be found on the company’s website at http://www.theitsummit.com, or can be obtained by calling at 503/828-0294.
| Comments Off on Press Release: The IT Summit announces its 2015 Conference Series
If you have a business printer, you know you can’t afford to have it go down and not be able to get it serviced. And it gets a workout you know you are going to have issues with it at some time. So, you buy a service contract.
Might we suggest that you buy an Oki Data printer instead?
First, one major mean of preventing printer failures is buying a printer that can stand up to the environment. A printer that is not likely to fail in the first place. Oki has a reputation for building tough printers. If you need confirmation, look at the computer system in a dusty, grimy environment such as an auto repair shop. Chances are, you will see an Oki Data printer attached to it. In terms of an office printer, instead of an intricate imaging system with numerous moving parts and inherently subject mechanical issues — Oki replaces the traditional laser and rotating mirror and lens system with a stationary array of LEDs (light-emitting diodes) as its light source. Fewer moving parts means fewer mechanical failures.
Second, Oki is offering 60 months of protection—parts and labor, including transfer belt and fuser replacement—with on-site expert repairs nationwide, and a recycling program that’s easy and eco-correct on their MC700 Color MFP Series (MC770, MC780, MC780f and MC780fx) and MB700 Monochrome MFP Series (MB760, MB770, MB770f and MB770fx) printers. So, instead of having to purchase extended service contracts for years — service which is generally provided by a third party who may or may not have an official sanction of the printer manufacturer — you can get 5 years of protection provided by the manufacturer.
What do you do and where do you go when your organization needs an IP address for its network? One option is to go to your ISP and obtain a dedicated IP. But where do they get them? And can you bypass your ISP and get an IP directly? In a blog article entitles “How IPs are legally and illegally exchanged” author Sam Walt gives an overview of the process, the players and what businesses need to know about the process when they decide they need additional IP addresses.
| Comments Off on IP Addresses: How To Get One (When You Need One)
American Digital Corporation is a forward-thinking IT Solutions Provider. We have a proven track record of helping Fortune 1000 organizations develop and maintain IT strategies that solve day-to-day business challenges while positioning themselves for future growth and advancements in technology.
As an HP Platinum Partner, American Digital provides custom system integration and consulting services across HP’s complete enterprise portfolio of server, storage, security and converged infrastructure solutions. We also support business critical applications such as SAP, VMWare, RedHat, Microsoft, Oracle, Meditech, Epic and Ellucian.
With our West Coast Division based in Irvine, CA, our 30 years of experience and nationwide presence allow us to support a variety of markets including health care, finance, manufacturing, distribution and higher education.
According to the 2014 IDC EMC Digital Universe Study, the digital universe is doubling in size every two years. The amount of data we create and copy will reach 44 zettabytes (44 trillion gigabytes) by 2020. Over two thirds of that 44 zettabytes is unstructured data generated by end users, yet 85% of that user-generated content is managed by an enterprise IT department at some point in its lifecycle. This explosive data growth is forcing companies of all sizes to explore more efficient data storage strategies which allow them to deliver storage services at cloud scale, allow them to meet new application and user demands while providing operational efficiency at scale. These demands are requiring companies to take a new approach to information storage.
What is that approach? Our friends from EMC have the answer to that question: ViPR Software-Defined Storage.
What is ViPR Software-Defined Storage? In short, it is a unified storage platform that provides a single control plane for multi-vendor, heterogeneous storage systems. The ViPR Software-Defined Storage platform forms the infrastructure that hosts ViPR Services, which support object, HDFS, and block storage on commodity hardware. The folks from EMC have made their white paper entitled “VIPR SERVICES STORAGE ENGINE ARCHITECTURE WHITE PAPER: Deploy a modern hyperscale storage platform on commodity infrastructure” available for you which details this solution. After you have read this informative document, we encourage you to contact your local EMC representative or authorized reseller, visit the EMC website, or explore and compare products in the EMC Store to learn more about EMC products, services, and solutions and how they can help solve your business and IT challenges.
| Comments Off on Deploying a modern hyperscale storage platform on commodity infrastructure
Adobe Flash 184.108.40.206 [Macintosh OS X: Firefox, Opera, Safari]
Adobe Reader 11.0.07
Dropbox 2.10.3 [Citadel warns against relying on Dropbox security. We recommend files containing sensitive information be independently encrypted with a program like Axcrypt; encryption keys be at least 15 characters long; and the Dropbox password be at least 15 characters long and different from other passwords.]
Google Chrome 36.0.1985.125
Internet Explorer 11.0.9600.17126
Java SE 7 Update 67 [Citadel recommends removing or disabling Java from your browser. Java is a major source of cyber criminal exploits. It is not needed for most internet browsing. If you have a particular web site that requires Java, Citadel recommends using a two-browser approach to minimize risk. If you normally browse the Web with Firefox, for example, disable the Java plugin in Firefox and use an alternative browser — such as Chrome, IE9, Safari, etc — with Java enabled to browse only the sites that require it.]
Safari 7.0.4 [Mac OS X]
Newly Announced Unpatched Vulnerabilities
For an updated list of previously announced Unpatched Vulnerabilities, please see the resources section of Citadel’s website.
For Your IT Department
Cisco Multiple Products: Secunia reports that Cisco has released updates for its IOS Software and IOS XE Software, Unity Connection and others. Apply updates. Secunia reports that Cisco has released a partial fix for its TelePresence Products. Update or upgrade to version 1.10.7:3 or 6.1.4:4.
McAfee Network Security Manager: Secunia reports that McAfee has released updates for its Network Security Manager to fix a vulnerability. Update to version 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, or 188.8.131.52.
OpenSSL Multiple Products: Secunia reports that vulnerabilities, some of which are moderately critical, are reported in previous versions. Update to version 0.9.8zb or update to version 1.0.0n or 1.0.1i.
If you are responsible for the security of your computer, Citadel’s Weekend Vulnerability and Patch Report is for you. We strongly urge you to take action to keep your workstation patched and updated.
If someone else is responsible for the security of your computer, forward our Weekend Vulnerability and Patch Report to them and follow up to make sure your computer has been patched and updated.
Vulnerability management is a key element of cyber security management. Cyber criminals take over user computers by writing computer programs that “exploit” vulnerabilities in operating systems (Windows, Apple OS, etc) and application programs (Adobe Acrobat, Office, Flash, Java, etc). When software companies find a vulnerability, they usually issue an update patch to fix the code running in their customer’s computers.
Citadel Information Group publishes our Weekend Vulnerability and Patch Report to alert readers to some of the week’s important updates and vulnerabilities. Our focus is on software typically found in the small or home office (SOHO) or that users are likely to have on their home computer. The report is not intended to be a thorough listing of updates and vulnerabilities.
Citadel Information Group … Delivering Information Peace of Mind ® to Business and the Not-for-Profit Community
With latest Russian hack, should we move beyond passwords for web security?:Stan Stahl Speaks on AirTalk with Larry Mantle. A Russian crime syndicate has apparently stolen over 1 billion internet usernames and passwords from hundreds of thousands of websites, the New York Times is reporting. Hold Security, a cybersecurity firm in Milwaukee, first made the discovery. According to the firm’s founder Alex Holden, the hackers targeted not only US companies that are household names, but pretty much any website they could break into. KPCC Radio, August 6, 2014
Target (TGT) stock tumbles; data breach will cost $148 million (+video): Target (TGT) lowered its second-quarter forecast Tuesday, saying it expects expenses tied to a massive data breach this past winter to come to $148 million. Target has been reeling since it announced in December that hackers stole millions of customers’ credit- and debit-card records. The Christian Science Monitor, August 5, 2014
P.F. Chang’s data breach hits 33 restaurants in 16 states (+video): P.F. Chang’s is providing more details on its ongoing investigation into a security breach first reported in June. The list of P.F. Chang’s restaurant locations where customers’ credit and debit card data may have been stolen includes 33 locations across the United States. The Christian Science Monitor, August 4, 2014
Teens Are Waging a Privacy War on the Internet — Why Marketers Should Listen: Back in the early days of social media, Danah Boyd was asked to participate on a panel alongside some representatives from various consumer brands. A fellow panelist who worked at Coca-Cola commented with satisfaction that his company was the most popular brand on MySpace. Without meaning to, Boyd (who writes her name in all lowercase letters) laughed audibly. At the moderator’s prompting, she explained that she, too, had noticed how popular Coke was on the site, and investigated. The most popular “brand” turned out to be not the soft drink, but cocaine. Wharton University of Pennsylvania, August 5, 2014
How to Keep Data Out of Hackers’ Hands: The numbers sound abstract: Hundreds of millions of email addresses and other types of personal identification found in the hands of Russian hackers. For people worried that they are caught in the mix, however, the discovery by Hold Security of a huge database of stolen data is very personal. But personal doesn’t mean helpless. There are common sense steps everyone can take to keep the impact of hackers to a minimum. The New York Times, August 5, 2014
Russian Hackers Amass Over a Billion Internet Passwords: A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say. The New York Times, August 5, 2014
Financial Cyber Security
Financial institutions and Cybercrime: It’s only just begun: A recent bout of high profile cyber-attacks on financial institutions across the UK, US and Canada has put the spotlight back on the importance of data security and the need to be diligent when it comes to cybersecurity within the banking industry, writes Alex Raistrick. BankingTech, July 28, 2014
U.S. government warns retailers about malicious software: BOSTON (Reuters) – The U.S. Department Of Homeland Security warned retailers about a type of malicious software attacking point-of-sales systems, dubbed “Backoff,” that it said is undetectable by most types of anti-virus software. MSN, August 1, 2014
Cyber Security Management
Securing the eCampus: Ten Observations About Cyber Security in Academia: I recently gave the keynote address at “Securing the eCampus,” a gathering of university CIOs and CISOs hosted by Dartmouth College. Drawing on my fifteen years of experience in the kinetic security world, running a security software company, and serving on the Board of Trustees at Dartmouth, I offered ten observations on the cyber landscape, especially as it pertains to academic environments: EndGame, August 2014
A Tough Corporate Job Asks One Question: Can You Hack It?: SAN FRANCISCO — Pity the poor chief information security officer. The profession barely existed a generation ago. But to combat the growing threat of online breaches, companies and governments are hiring executives whose main responsibility is to make sure data systems are secure. When things go wrong — and they often do — these executives expect to bear the blame. The New York Times, July 20, 2014
In Fight With Hackers, We Are on Our Own: Call it the hack whipsaw. A computer security company — it is rarely a government entity — comes out with a new report. Millions of stolen passwords. Tens of millions. No, hundreds of millions. The point is apparent: This is a big deal. Then it becomes clear this company is not simply informing the world out of some sort of noblesse oblige: It is trying to make money. The New York Times, August 7, 2014
New Site Recovers Files Locked by Cryptolocker Ransomware: Until today, Microsoft Windows users who’ve been unfortunate enough to have the personal files on their computer encrypted and held for ransom by a nasty strain of malware called CryptoLocker have been faced with a tough choice: Pay cybercrooks a ransom of a few hundred to several thousand dollars to unlock the files, or kiss those files goodbye forever. That changed this morning, when two security firms teamed up to launch a free new online service that can help victims unlock and recover files scrambled by the malware. KrebsOnSecurity, August 6, 2014
Cyber Security Management – HIPAA
HIPAA Omnibus Rule compliance tips for healthcare law firms: In addition to covered entities, it is widely known that the HIPAA Omnibus Rule had a significant impact on business associates (BAs) and subcontractors. Interestingly, law firms that help covered entities comply with HIPAA regulations are often BAs themselves, so they were forced to make changes to the ways they handle protected health information (PHI). HealthITSecurity, August 1, 2014
How To Talk To Your Employees About Cybersecurity (Without Putting Them To Sleep): You can just see the eye-rolls across the conference table when you bring it up. It may not be tops on the list of things you want to address at a staff meeting, but cybersecurity is an issue that likely effects every one of your employees, everyday, and if you’re delegating it to one person at the back of the IT department, you’re making a big mistake. Forbes, August 6, 2014
The World’s Top 5 Cybercrime Hotspots: A Russian crime ring is suspected of obtaining access to a record 1.2 billion username and password combinations, shedding renewed light on how vulnerable online personal information can be. Cybersecurity firm Hold Security said the gang of hackers was based in a city in south central Russia and comprised roughly ten men in their twenties who were all personally acquainted with each other, the New York Times reported. Time, August 7, 2014
‘White Label’ Money Laundering Services: Laundering the spoils from cybercrime can be a dicey affair, fraught with unreliable middlemen and dodgy, high-priced services that take a huge cut of the action. But large-scale cybercrime operations can avoid these snares and become much more profitable when they’re able to disguise their operations as legitimate businesses operating in the United States, and increasingly they are doing just that. KrebsOnSecurity, August 4, 2014
Google Says Website Encryption – Or Lack Thereof – Will Now Influence Search Rankings: Google will begin using website encryption, or HTTPS, as a ranking signal – a move which should prompt website developers who have dragged their heels on increased security measures, or who debated whether their website was “important” enough to require encryption, to make a change. Initially, HTTPS will only be a lightweight signal, affecting fewer than 1% of global queries, says Google. TechCrunch, August 7, 2014
The FBI Is Infecting Tor Users with Malware to Catch Kiddie Porn Creeps: Tor’s had a tough week. Just a few days ago, the organization made the difficult announcement that an attack on their system likely stripped users of anonymity. Now, Wired reports that the FBI effort has been running a campaign to identify Tor users by installing malware on their computers for years, virtually unchecked by the courts. Gizmodo, August 4, 2014