Learning Center
By:
Jason Maki
December 10th, 2021
In July 2021, the Peoples Republic of China announced the first phase of an IPv6 transition which will be completed by 2023. This means all-new network hardware in China must be IPv6 enabled.
Security | DDoS Attack | Cybercrime
By:
Jason Maki
August 6th, 2021
Historically, if your company wanted to implement DDoS mitigation tactics, you were left justifying a quarter-million-dollar expenditure just to scratch the surface of network protection.
By:
Jason Maki
July 1st, 2021
IPv4 address exhaustion is an issue that runs deep into every part of the service provider’s business and is no longer a topic that one can forego action on. There are two main options service providers have today.
By:
Jason Maki
April 28th, 2021
Bob runs a company working on a very large and competitive government services bid. After combing through the numbers and settling in on a rather aggressive proposal, he feels good about winning the business and starting a relationship with the government facility being built in his area. He’s fine with breaking even on this deal, knowing there will be more business in the future. The bidding process requires physically sealed bids that are certified and opened at the same time, so he’s confident that his strategy won’t be known by the competition. Four weeks later, Bob is notified that the business was awarded to a competitor with a bid very similar to his own but lower by fifty bucks. Since it was a government bid, Bob goes out to the site to review the winning proposal and to learn from the near miss. The winning bid had identical language from his proposal, with only a few words and numbers changed here and there. How is that possible? Somebody would need to have seen the classified proposal.
DNS | Security | Phishing Attacks
By:
Jason Maki
April 21st, 2021
It is a warm summer day and the ice cream shop down the block sends out a coupon link for 50% off a pint of your choice to your office. The coupon link comes from the reception desk email from your office building. To receive the offer, you click the link and pull it up on your phone’s mobile browser to show it at the register. How many of your staff are going to question whether it’s legitimate? How long until the ice cream shop clerk says it’s not legitimate? By the time word spreads of the scam, employees have opened a malicious link that can lead to a network breach.