Networking Technologies - Monthly Insight
We are dedicated to providing you with Positive IT Outcomes!
Here is your May 2018 newsletter. In this issue…

• Letter From the President
Upcoming Events

How to Present in Skype for Business

• Are Your IoT Devices Easy to Hack?
• Cryptojacking: What It Is and How to Prevent It
• Using Machine Learning to Deliver a Smarter Security Solution
• Employee Highlight of the Month
Tech Talk
Community Sponsorships

Letter from the President

Until recently, keeping your IT systems secure meant building defenses to
protect the perimeter and preventing potential attackers from getting inside
that perimeter. However, the sophistication of IT from BOYD to IoT has created a new challenge – protecting the organization from inside attacks.

Preventative measures are no longer enough to keep hackers and attackers
out. We have seen, just in the last few years, the steady climb in firewall
breaches, malicious attachments and employee bribing to gain access behind
the firewall. IT professionals know a response is necessary. In fact, the
latest report showed projected IT security budgets climbing 40% by 2020.

Traditional cyber threat products deal with the common threats and are still necessary. However, we are now dealing with a boundless, constantly evolving inside threat from multiple devices that access our network from anywhere at any time. These include: multiple devices being used by single users to access corporate assets, cloud-based applications that are not managed by your IT department (SalesForce, Basecamp, etc.), access demands from partners and contractors and IoT devices accessing the network. It is no longer possible to fully secure the perimeter. The best way to manage with this ever-changing threat is through user and entity behavior analytics (UEBA).

UBEA builds a baseline of normal behavior for each entity — a user, system or device with an IP address. This “normal” behavior is built using models that operate on key data from logs, netflow and packet
streams. Behavior that deviates from these baselines, indicate a potential attack. This method makes it much more difficult for an attacker to fool the system. If a username and password is stolen, the attacker would have difficult time mimicking the user’s behavior, thus triggering UBEA alerts.

We will be discussing this more at a June 15 event in Akron, Ohio. You can learn more or
register for the event here. If you can’t attend, let us know and we can set up a time to talk!

From all of us
at Networking Technologies,

James Bahm
President, Networking Technologies

Upcoming Events
Security from the Inside Out: Aruba IntroSpect User and Entity Behavior Analytics (UEBA)
June 15, 2018
Courtyard by Marriott Akron | 41 Furnace Street, Akron OH 44338
Join Kevin Walter, Director for Aruba Security in the Ohio Valley, as he discusses the latest trends in User and Entity Behavior Analytics. Bringing over 20 years of experience working with clients in Northeast Ohio, Kevin’s unique perspective on how to reduce organizational risk
utilizing machine learning is fascinating. This event includes a train ride on the Cuyahoga Valley Scenic Railroad with beer tasting and dinner.

How to Present in Skype for Business
Once you know how to share your screen or present your slides in Skype for Business, you will find all sorts of ways to use it. We guarantee it.

Wee use Skype for Business every day for messaging and meetings. Our team is far-flung, with offices in four states and remote workers. It’s extremely common to hear “Hey, can you share your screen so I can see what you’re looking at?” or “Let me present this so everyone in the meeting can see it.”

Read more →

Are Your IoT Devices Easy to Hack?
used with the permission of http://thenetwork.cisco.com
by Stephanie Chan
Internet of Things devices are reportedly becoming easier to hack — Channel Partners reports that in 2016, a malware called the Mirai botnet took over household cameras in a distributed denial-of-service (DDOS) attack, effectively shutting down the cameras. A botnet is a network of computers or Internet-connected devices that use bots to automatically spread malicious software.

Read more →

Cryptojacking: What It Is and How to
Prevent It
used with the permission of http://thenetwork.cisco.com
by Stephanie Chan

Google announced Monday a ban on all Chrome extensions in the Chrome Web Store used to cryptojack computers. This newer form of hacking uses these extensions to get into a victim’s computer and use its resources to mine cryptocurrency. A blog post from the tech giant states that around 90% of these cryptojacking extensions were ignoring Google’s policies.

Read more →

Using Machine Learning to Deliver a Smarter Security Solution

Traditional cyber defense products were not designed to deal with the sophisticated, carefully-crafted and targeted attacks that enterprises now face. They are still needed to deal with the vast majority of “standard” threats that come in every day, but require help with the smaller number of deadly “advanced” attacks that arrive without warning and evade perimeter defenses. We call these “attacks on
the inside”.

Read more →


Employee Highlight of the Month
Spring 2018 Employee Certifications

Congrats to the following Networking Technologies employees for earning certifications
in the last quarter!

Read more →

Every Fourth Wednesday
at 11 a.m. EST/EDT

Course Descriptions and Registration: net-cloud.com/techtalk

MAY 23
Office 365 – Beyond OutlookJune 27
Reduce Management Requirements
of Your VMware EnvironmentJuly 25
Next Generation of IT ConsumptionAugust 22
Designing the Smart, Digital Workplace
September 26
E-Rate Made EasyOctober 24
Protecting Your Data in a Hybrid IT Environment
November 28

Extreme Control and IoTDecember 19
Is Cloud the Right Place for Your Compute?
Community Sponsorships

Sponsor of Candide a joint production between the Erie Philharmonic and the Erie Playhouse on Saturday April 14 at the Warner Theater in Erie, PA. (L-R Debby & Todd Swanson, Jim & Wendy Bahm.)

Let’s Get Social
We are now providing customers with regular posts on Twitter, LinkedIn and Facebook.
Check us out!
Networking Technologies

   Twitter   Facebook
Monthly Quote

“If you don’t know anything about computers, just remember that they are machines that do exactly what you tell them but often surprise you in the result.”

– Richard Hawkins


Monthly Cartoon