Latest Blog Posts

Newsletter

 

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Flowmon - Webinar - The Hacker's Fingerprints

  Wednesday December 10, 2019   1:00 pm EST/10:00 am PST ​Do you know how hackers can gain access to your network? The techniques may vary, but they do leave traces. If you're curious how they do it, join our webinar and see what techniques hackers use and what traces they leave in network traffic. We will explore several hacking scenario...
Continue reading
  595 Hits
  0 Comments
595 Hits
0 Comments

Cybersecurity Checklist for Secure Timing

​ Network cybersecurity is top of mind these days for both government agencies and commercial enterprise. As the heart of network synchronization, time and frequency systems should include a standard suite of security features that give network administrators confidence in the cybersecurity protocols of their time servers. This is our philosophy at...
Continue reading
  556 Hits
  0 Comments
556 Hits
0 Comments

How to Implement Security Monitoring For Critical Infrastructure

​I ran across an interesting statistic a couple weeks ago. According to a Ponemon Institute, report titled "The State of Cybersecurity in the Oil & Gas Industry" , 68 percent of security and risk managers reported losing confidential information or experiencing disruption over the previous year. The existence of security breaches for the last f...
Continue reading
  561 Hits
  0 Comments
561 Hits
0 Comments

Ixia - Exposing Hidden Security Threats and Network Attacks

How do you ensure maximum service availability while protecting and securing your enterprise? IT departments have been wrestling with this problem for years. Virtualization and mobility are expanding the traditional network boundary, which means data and assets no longer sit in a single location behind a firewall.  Network security monitoring ...
Continue reading
  788 Hits
  0 Comments
788 Hits
0 Comments

Orolia Case Study - Banking on BroadShield

​Why This Case Study is Relevant It demonstrates the importance of installing anti-jam and anti-spoofing software. Background  ​A major international financial services provider was experiencing issues in their lab environment with its GNSS-based timing systems. GNSS reception was being intermittently lost and the customer didn't know why. Rat...
Continue reading
  665 Hits
  0 Comments
665 Hits
0 Comments

Orolia - Tech Brief Resiliency in PNT: Cybersecurity

Cybersecurity is the watchword of the day, but what does it mean for Positioning, Navigation and Timing (PNT)? For many, the ability to hack or spoof a GPS/GNSS signal is a cybersecurity issue. At Orolia , we agree, which is why we have a wide array of products to augment, toughen and protect against GNSS vulnerabilities. However, the other aspect ...
Continue reading
  917 Hits
  0 Comments
917 Hits
0 Comments

VIAVI Solutions - State of the Network 2019

NetOps and SecOps Collide Over 600 IT professionals weigh in on the workloads, challenges, data sources and team collaboration required to safeguard critical corporate assets. Study Highlights: Network team role in security increases: Over 80% of network teams play a role in security efforts including investigations and clean-up, implementation and...
Continue reading
  835 Hits
  0 Comments
835 Hits
0 Comments

The Best Way To Optimize Load Balancing for Inline Security Appliances

​ In today's 24x7, "always on" world, the company's data network must be as reliable as possible. Otherwise, revenue reduction and productivity losses are not only possible, but probable. This includes inline security and monitoring tools which can become a single point of failure. Security and monitoring tool survivability is often thought about i...
Continue reading
  739 Hits
  0 Comments
739 Hits
0 Comments

What is hidden in encrypted internet traffic streams

​ Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network. When you open any website today, it is highly probable you will see a small padlock in front of the address. For the everyday internet user, this is the only visible sign that the site is secure and communication with the site i...
Continue reading
  717 Hits
  0 Comments
717 Hits
0 Comments

5 predictions for cyber security in 2019

​Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed data relating to tens of millions of Facebook accounts. The year also confirmed that hacking has become a means for political activists and an effective tool for...
Continue reading
  867 Hits
  0 Comments
867 Hits
0 Comments

Webinar - Do You Have a Strategy for IoT?

 When Thursday, June 27th, 2019 at 2pm EST Due to the popular demand of our IoT webinar in March, we have decided to run another for those who could not make the first.  Join us on Thursday June 27th @ 2pm EST for an in-depth look at how our customers are using NMSaaS to monitor and report on all kinds of new data outside of the tradition...
Continue reading
  912 Hits
  0 Comments
912 Hits
0 Comments

How to Optimize Your Security Defenses

​As I mentioned in a blog a couple of months ago, there is an absolute myriad of security architectures and techniques available to the enterprise IT professionals. These strategies all have pros and cons. Lets look at one of the most common ones-a defensive approach. Everyone in the security arena is familiar with this concept. It is sometimes tho...
Continue reading
  1136 Hits
  0 Comments
1136 Hits
0 Comments

An Inline Security Primer

​Anyone in network security knows that it is a complicated and involved process. The clear goal is to prevent security breaches. How do you go about that though? There are so many schools of thought, methods, and configurations. Here are just a few examples: Cyber range training Cyber resilience Defense in depth Encryption Endpoint security Firewal...
Continue reading
  1858 Hits
  0 Comments
1858 Hits
0 Comments

How to Detect if a Rootkit Compromised Your System

​ The importance of having a quality network test access port (TAP) when conducting Digital Forensics and Incident Response (DFIR) has been covered in a white paper by Profitap, titled " Special Tool for Special Forces: Tapping into real-time threats in the cyberspace ". In addition to the points presented in the white paper, I would like to provid...
Continue reading
  1074 Hits
  0 Comments
1074 Hits
0 Comments

Network Security Resilience – What Is It?

In a recent webinar, Best Practices for Security Resilience, Jon Oltsik (an analyst from ESG Research Group) and I discussed the topic of network security resilience. The basic concept is that it is not a question of "IF" your company network will be breached, but "WHEN". The real question for you to answer is, "How painful do you want that breach ...
Continue reading
  982 Hits
  0 Comments
982 Hits
0 Comments

Ixia's 2019 Security Report

Welcome to the third annual Security Report issued by Ixia, a Keysight business. Each year, the Ixia Application and Threat Intelligence (ATI) Research Centre summarizes the most interesting and prominent internet security trends. We analyze ATI data to help organizations understand where they can improve. We also analyze the data to predict the bi...
Continue reading
  917 Hits
  0 Comments
917 Hits
0 Comments

WEBINAR - 4 Gaps to Fix in Your Security Detection and Response with VIAVI Solutions

​Join VIAVI on April 24th when we host a roundtable discussion with expert security threat hunters who will reveal the top pitfalls they see in enterprise security strategies. As their decades of experience converge, common themes appear, identifying the gaps that put their clients at risk for being the next news headline. Reserve your spot now to ...
Continue reading
  1066 Hits
  0 Comments
1066 Hits
0 Comments

Give Your Network An Unfair Advantage Against Hidden Malware

​ The IT role is extremely hard today. Whether you are part of the DevOps or SecOps team makes no difference - threats and problems are a daily, if not hourly, occurrence. What you need is good quality data as fast as you can get it to counter security threats, troubleshoot network outages, and remediate performance problems. Unfortunately, IT...
Continue reading
  718 Hits
  0 Comments
718 Hits
0 Comments

It's Time to Prepare Your Network For the Effect of Rogue IOT Devices

One of the most common forms of network threats today is distributed denial of service (DDoS). An attack involves flooding networks and servers with false internet traffic, thereby blocking access to genuine devices. Sometimes used to target specific businesses, cyber-attacks can bring down entire telecoms networks, as was the case in the attack on...
Continue reading
  840 Hits
  0 Comments
840 Hits
0 Comments

Report Summary TLS 1.3 Adoption in the Enterprise

​ Cyber defenses encrypt data to keep it safe while hackers encrypt malware to sneak threats onto your network. A new report from Enterprise Management Associates (EMA) says enterprises see the new Transport Layer Security (TLS) 1.3 encryption standards as offering greater privacy and security—over 70 percent of respondents have or will start enabl...
Continue reading
  1004 Hits
  0 Comments
1004 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.