Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

Network Security Conference Data Connectors – September 6, 2018

  Come join Telnet Networks and ProfiTap at Data Connectors in Montreal being held at Hotel Omni Mont-Royal on September 6 th . This Cyber Security Conference will feature vendor displays and educational speakers discussing current cyber-security issues such as cloud security, email security, VoIP, LAN Security, wireless security and more. We ...
Continue reading
  56 Hits
  0 Comments
56 Hits
0 Comments

Firewall Configuration/Network Configuration and Change Management (NCCM)

Turn on any "techy" TV show or movie these days and you are bound to see some reference to hackers trying to break into corporate or government networks by breaching firewalls. While many of the scenarios are unrealistic as they are portrayed onscreen, the real-life battle between security vendors and hackers does go on. In their effort to defeat t...
Continue reading
  69 Hits
  0 Comments
69 Hits
0 Comments

VIAVI'S State of the Network Study 2018

Over 600 IT professionals reveal how they navigate increasing bandwidth demand, evolving infrastructure, and the loss of visibility. For over 11 years VIAVI Solutions has conducted the global State of the Network Study. The State of the Network Study from VIAVI Solutions examines critical trends and technologies that shape network management . The ...
Continue reading
  84 Hits
  0 Comments
84 Hits
0 Comments

Cybersecurity – the Rising Challenge of the 21st Century

The internet has grown to a point where we cannot imagine life without it. From the beginning of the 21st century, we've seen an incredible growth in the amount of people that have access to the internet, with around 40% of the world population having an internet connection today. In 1995, it was less than 1%. While mankind benefits enormously from...
Continue reading
  91 Hits
  0 Comments
91 Hits
0 Comments

Xplornet Announces Mobile Launch Plan

Canadian rural fixed-wireless broadband operator Xplornet yesterday revealed that it will launch 4G LTE mobile network services in Manitoba this autumn under the Xplore Mobile brand. Xplornet obtained mobile 700MHz/1700MHz/2500MHz frequencies for the province in March 2017 in a windfall from Bell Canada's takeover of Manitoba Telecom Services, unde...
Continue reading
  128 Hits
  0 Comments
128 Hits
0 Comments

The Associated Expenses That Add To The Cost of a Ransomware Attack

Organizations typically consider two figures when attempting to calculate the cost of a ransomware attack: the ransom demand and the cost of recovering data. But more goes into restoring a system than those two factors, judging from the recovery efforts organizations mounted following recent ransomware attacks. Temporary staff increases, consu...
Continue reading
  170 Hits
  0 Comments
170 Hits
0 Comments

Business Benefits of Network Behavior Analysis

When we talk about the business value of a tool or a system that (at first point) may seem like a "nice to have" or "helpful but not absolutely necessary" technology or system, it is good idea to start this discussion by putting some things in perspective. Business in this day and age depend on ensuring (at least) confidentiality, integrity and ava...
Continue reading
  113 Hits
  0 Comments
113 Hits
0 Comments

One Way To Stop The IT Blame Game

How well does your company communicate internally? Specifically, how well do your IT departments communicate with each other? Enterprises typically contain four or more IT sub departments ( Security , Network Operations , Virtual DC, Capacity Planning , Service Desk, Compliance, etc.) and it's quite common for them to be at odds with each other, ev...
Continue reading
  127 Hits
  0 Comments
127 Hits
0 Comments

Why is Timestamping Important for Packet Capture

Everything happening on the network is time sensitive, that's why timestamps are extremely important when we're talking about packet capture and analysis. This feature can not only prevent and analyze cyber attacks, but it can also allow you to examine trends and network latency.  Network packet timestamping can be used to investigate various ...
Continue reading
  130 Hits
  0 Comments
130 Hits
0 Comments

DNS Traffic Analysis - Make networks more secure

It's quite easy to overlook the Domain Name System (DNS) and the critical role it plays across the internet and in local intranets. This is largely because, despite our everyday reliance on DNS, it is basically transparent to users and it's taken for granted that it will just work. When an ordinary person opens a web browser and types in something ...
Continue reading
  147 Hits
  0 Comments
147 Hits
0 Comments

The Advent of Tightly Synchronized Clocks in Distributed Systems

The last decade has brought a paradigm shift in computing systems from single processor devices whose performance plateaued to distributed computing systems. In distributed systems, nodes execute concurrently with limited information about what the other nodes are executing at the moment. Thus, a fundamental problem in distributed sy...
Continue reading
  235 Hits
  0 Comments
235 Hits
0 Comments

Network Configuration & Change Management Best Practices with StableNet®

Solution Strengths comprehensive solution for Configuration , Performance and Fault Management unified code base eliminates need for fault prone module/product integration ultra scalable architecture, nothing gets added that could impact scalability End-to-End awareness delivers automated dependencies, root cause and delivers massive automation benefits ROI in months, not years A truly ‘‘VendorAgnostic“ Solution supports many different network hardware manufacturers, including Cisco, Huawei, Jun...
Continue reading
  165 Hits
  0 Comments
165 Hits
0 Comments

Measuring Device Latency with the ProfiShark

Mike Penacchi shows us how to use the SPAN mode of the ProfiShark while determining and comparing the latency introduced by a Microtik configured to use NAT; determining the latency that a device adds to the network can be difficult. In this video, Mike with Network Protocol Specialists, LLC; shows how the ProfiShark can be used to a...
Continue reading
  207 Hits
  0 Comments
207 Hits
0 Comments

Network Performance Monitoring: The ABCs of Network Visibility

According to research conducted by Enterprise Management Associates in October of 2016, 41% of IT personnel spend over 50% of their time working on network and application performance problems . Additional research cited by ExtraHop shows that tactical network data loses 70% of its value after 30 minutes. This makes the speed and accuracy of monito...
Continue reading
  199 Hits
  0 Comments
199 Hits
0 Comments

FIVE REASONS WHY BANNING USB DRIVES IS A GOOD SECURITY PRACTICE

IBM banning its employees from using removable storage devices, like USB sticks, received extensive media coverage, even though the US CERT warned against using USB drives in 2011. Why are USB and other removal drives still relevant and why is it a good idea to not use them? REMOVABLE DISKS ARE STILL USED BY ATTACKERS While you'd think that using U...
Continue reading
  219 Hits
  0 Comments
219 Hits
0 Comments

Keeping Your Clocks Accurate

Electronic clocks control critical functions in many applications. However, clocks are often designed for low cost rather than for keeping accurate time. Even fairly accurate computer clocks will vary due to manufacturing defects, changes in temperature, electric and magnetic interference, the age of the quartz crystal, or even system load. Even th...
Continue reading
  205 Hits
  0 Comments
205 Hits
0 Comments

4 Key Factors When Planning Business Continuity For Your Contact Centre

​ Customers are the lifeblood of any business, and for many companies, your contact centre is the front line for interacting with these customers.Despite the importance, few companies have a comprehensive disaster recovery and business continuity plan in place for their contact centre. Many back-office functions can be performed by employees from t...
Continue reading
  204 Hits
  0 Comments
204 Hits
0 Comments

HOW RANSOMWARE ATTACKS HAVE CHANGED ONE YEAR AFTER WANNACRY AND NOTPETYA

Ransomware continues to garner headlines. However, this particular blight appears to be abating. Since 2015, the number of ransomware families and variants has decreased by about 50 percent. For organizations fighting this threat, this means that ransomware is no longer the in vogue malware. At the height of ransomware attacks in 2015, anyone who w...
Continue reading
  229 Hits
  0 Comments
229 Hits
0 Comments

IXIA 2018 Security Report

IXIA has just released its 2018 security report .In our increasingly digital and connected world, security is an ever-present challenge. Human ingenuity and creativity drive both the solutions we develop and the threats we face. For that reason, we must continue to push forward and implement solutions that are continuous and resilient, stress detec...
Continue reading
  321 Hits
  0 Comments
321 Hits
0 Comments

Bell Canada’s revenues up 4.8% in First Quarter 2018

Bell_L_20170601-163435_1
Bell Canada Enterprises ( BCE ) reported a 4.1% year-on-year rise in group revenue to CAD5.590 billion (USD4.35 billion) in the quarter ended 31 March 2018. Service revenue grew 3.2% to CAD4.964 billion and product revenue increased 19.2% to CAD626 million, reflecting increases at both Bell Wireless and Bell Wireline (including favourable financial...
Continue reading
  414 Hits
  0 Comments
414 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)