TAP Into Technology | Blog

Espionage Barbie? Tech Toys Bring Whole New Meaning to Youth Privacy

Posted by Tim O'Neill on 3/30/17 8:00 AM

Technology has created a never-ending battle between security and privacy. We want technology to make our lives as convenient as possible. And for the most part, we’re willing to give up a bit of privacy to make it possible.

We use Facebook. We let our Amazon Echo listen just in case we need something. We give Google a detailed record of our location data. People want privacy but not if it comes at the expense of innovation.

But what about when it comes to our kids?

Read More

Topics: Hacks and Data Breaches

2016 Security Breaches: The Reality from the Predictions

Posted by Tim O'Neill on 2/23/17 8:00 AM

At the beginning of 2016, I warned of key security threats that the world would face in the coming year.

As I look back at those predictions, I realize that there are still critical insights to be gained from the numerous attacks that occurred last year.

Read on to gather the lessons learned. 



Read More

Topics: Network Security, Hacks and Data Breaches

Top 7 Security Predictions for 2017

Posted by Tim O'Neill on 2/2/17 8:00 AM

As a network TAP provider, Garland anchor's security solutions for so many organizations across all public and private sectors. I like to think that working with IT’s top security professionals has given Garland and myself unique insight into the evolving threats and technical issues that can impact IT security strategies. In this post, I’d like to share some of the key trends that InfoSec will have to address in 2017 and beyond.

Read More

Topics: Network Security, Hacks and Data Breaches, Network Visibility/Monitoring, Software Defined Networking (SDN)

Russian Hackers Eyeing Germany’s Election—Lessons Learned from America’s Struggles

Posted by Tim O'Neill on 1/19/17 8:00 AM

No matter which side you stand on, we can all agree that 2016 was an unusually crazy election year. Aside from the actual politics, this was the first time we spent all year talking about election hacking.

But we can’t just relax now that the election is over. Russian election hacking is only just starting!

After successfully disrupting the U.S. election, Russian hackers are setting their sights on Germany’s 2017 election. There’s still time for Europe to learn from America’s cybersecurity struggles.

Read More

Topics: Network Security, Hacks and Data Breaches, Network Visibility/Monitoring

Russia’s 2016 Election Hacks—Major Implications for an Age-Old Problem

Posted by Tim O'Neill on 12/29/16 8:05 AM

We talked about the vulnerability of presidential campaigns in March. We talked about the reality of election threats in September. And now, after almost a full year of discussion, we’re dealing with the aftermath—the FBI and CIA agree that Russia hacked pieces of our election to put Donald Trump in office!

So, what happened? Did a massive state-sponsored attack manipulate our voting machines? Did Russian super spies use their hacking skills to derail the Clinton campaign?

No. Our election was impacted by a basic phishing attack—an age-old issue that now has global consequences.

Read More

Topics: Network Security, Hacks and Data Breaches, Network Visibility/Monitoring

Protect Your Network: Know Your Baseline Traffic

Posted by Tim O'Neill on 12/27/16 8:13 AM

Everyone knows that a standard doctor’s visit begins with a review of your vital signs. They take your blood pressure, check your breathing, read your pulse and take a look at your eyes, ears, nose and throat to get complete picture of your health. By taking baseline readings each time you visit, the doctor can monitor for anything out of the ordinary.

The same process applies for understanding the health and security of your network. Taking baseline readings for your network traffic is the first step to efficiently spotting potentially fraudulent activity.

Every manager needs to create a framework for understanding what network activities are normal and which should be considered aberrations. Here are some readings to take to get you started:

Read More

Topics: Network Security, Hacks and Data Breaches, Network Visibility/Monitoring