Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

How to Detect RYUK Ransomware on Your Network

What is RYUK Ransomware?  ​An advisory from the US based Department of Health and Human Services notes that attacks involving RYUK appear to be targeted. In fact, its encryption scheme is intentionally built for small-scale operations, so that only crucial assets and resources are infected in each targeted network by a manual distribution from...
Continue reading
  112 Hits
  0 Comments
112 Hits
0 Comments

Making The Shift to Network Security Resilience

​In the webinar above,the concept of network security resilience and how to implement it is explained. However, successful implementation relies upon making the fundamental mind shift to the strategy. One cannot expect to see the benefits if they don't embrace change. ​However, change is easier said than done. It seems like many security engineers,...
Continue reading
  115 Hits
  0 Comments
115 Hits
0 Comments

Discover Application Performance Issues Before Your Business Does!

Availability issues. Slow response times. Performance bottlenecks. Also web applications have problems that affect the satisfaction of your employees and customers. Identify and troubleshoot them before they impact your business with Flowmon APM, an agent-less solution to proactively drive user experience and application value.    Applica...
Continue reading
  189 Hits
  0 Comments
189 Hits
0 Comments

SNMP: The ABCs of Network Visibility

Network management and monitoring is a large topic. It includes device monitoring and management, device cluster monitoring and management,network monitoring and management, application monitoring and management, problem resolution, and elements of network security as well. In this blog, I wanted to focus on device monitoring. Devices are often ref...
Continue reading
  162 Hits
  0 Comments
162 Hits
0 Comments

How Resilient PNT is Used in Cybersecurity

Cybersecurity is a hot topic today. Hackers are always looking to undermine our network connections and we are always trying to protect against them.  I'm no cybersecurity expert, but I am often asked, "Can Resilient PNT be used to improve cybersecurity?" Resoundingly, "YES"  Here are a few simple examples:  1. Passwords - Most secur...
Continue reading
  256 Hits
  0 Comments
256 Hits
0 Comments

The Next Generation CISO

Every day we hear of security breaches, which damages the company brand and reputation.  At the present time the advantage has been with the attacker and the CISO is now expected to provide meaningful and actionable security intelligence to board members. So how can CISOs train tomorrow's security executives when today's well-known securi...
Continue reading
  729 Hits
  0 Comments
729 Hits
0 Comments

Inspecting SSL Traffic

A delicate balancing act is taking place on networks globally. It is the balance between applying strong protective measures to keep data safe and unintentionally concealing new IT security vulnerabilities. And it all centers on SSL (Secure Socket Layer) encryption. Just as SSL encryption protects certain details of a transaction, it can also conce...
Continue reading
  2012 Hits
  0 Comments
2012 Hits
0 Comments

Eight Steps to take when conducting your first threat hunt

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don't wait to take action until they've received a security alert or, even worse, suffer a data breach. Instead, hunting entails looking for opponents who are already in your environment. Hunting leads to discovering undesirable activity...
Continue reading
  1123 Hits
  0 Comments
1123 Hits
0 Comments

Netfort's How to deal with the Locky Ransomware Email Campaign

Locky Ransomware Ransomware has been the number one cyber-security threat in 2017. Outbreaks such as WannaCry have caused massive amounts of damage worldwide. If you want to detect Ransomware such as WannaCry you should watch out for an increase in file renames and deploy technologies such as IDS to identify outbreaks on your network.  Recentl...
Continue reading
  1205 Hits
  0 Comments
1205 Hits
0 Comments

Prevent Petya Ransomware by disabling SMBv1 on your Network

Petya \ GoldenEye encrypts entire disks  A new variant of Petya ransomware, also known as Petrwrap, NotPetya, or GoldenEye, is spreading rapidly with the help of the same Windows SMBv1 vulnerability that the WannaCry ransomware abused to infect 300,000 systems and servers worldwide in just 72 hours. Petya ransomware has been delivered via phis...
Continue reading
  1225 Hits
  0 Comments
1225 Hits
0 Comments

Viavi: Nearly 90 Percent of Enterprise Network Teams Spend Time Troubleshooting Security Issues; 80 Percent Report More Time Spent on Security vs. Last Year

Tenth Annual "State of the Network" Global Survey from Viavi Reveals Network and Security Trends from over 1,000 Network Professionals  In April 2017, Viavi Solutions (NASDAQ: VIAV) released the results of its tenth annual State of the Network global study today. This year's study focused on security threats, perhaps explaining why it gar...
Continue reading
  1158 Hits
  0 Comments
1158 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)