by John Breth | Jul 1, 2020 | Cybersecurity, IT Engineering, IT Operations
Today’s topic was requested on Twitter, to talk a little bit about how to build Cisco switchport trunks and specifically how to improve their security configurations. We’re going to take a look at how to configure them, what are some security best practices, and...
by John Breth | Jan 9, 2020 | Cybersecurity, IT Engineering, IT Operations
Today’s blog post is the second and final part of our #30DaysofCisco information sharing campaign. For a little over the past month, we have been posting daily tips on Cisco configurations to help novice and experienced engineers alike. This campaign was...
by John Breth | Nov 25, 2019 | Cybersecurity, InfoSec, IT Engineering, IT Operations
Today’s blog post is in a different format than our normal articles. This past month, there has been as a great information sharing campaign on Twitter that was created by Arielle Hale (@WhutTheHale) called #30DaysofThreads. The purpose of this campaign is to...
by John Breth | Oct 30, 2019 | Cybersecurity, IT Engineering, IT Operations
So far we’ve covered two basic tenets to network security: documentation and network segmentation and isolation. Network access control layers nicely on top of those. You are taking the defined data flows (what devices are allowed to communicate over specific...
by John Breth | Jul 23, 2019 | Cybersecurity, InfoSec, IT Engineering
This is the first of a six-part series discussing five basic network security principles (The Fab Five) that when implemented properly can significantly improve the security posture of any IT environment. The reality is, no matter how simple something is, it...