US Canada China
Search
Back 

Blog

Tuesday, January 9, 2018

9

Jan

2018

Meltdown and Spectre Side-Channel Advisement

Meltdown and Spectre Side-Channel Advisement

– The Bottom Line
There have been so many articles, advisories, blogs and opinions shared regarding the Meltdown and Spectre Side-Channel vulnerability, it’s difficult to tell fact from FUD. All these data points may still leave you asking: How does all this affect me, my business and my clouds?

Bottom line up front: know what your computer systems are running and quickly apply the recommended patches to each of the vulnerable platforms. Don’t take this lightly, it’s a very serious situation, however exploiting this vulnerability is not easy nor is there a known instance of an exploit in the wild. If you are unsure if you are affected, TIG can help.

Why Look To TIG?
As a leading technology solution provider, TIG has long standing relationships with most of the top tier vendors that manufacturer the equipment that is subject to this published Meltdown and Spectre Side-Channel vulnerability. This relationship provides TIG with an inside track on present and future impact, exposure and recommendations on how to mitigate the risk of this wide-spread vulnerability. TIG is offering a Meltdown/Spectre assessment services which catalogs your organizations assets and assesses the possible points of exposure and makes specific recommendations to minimize risk to your infrastructure.

Number of views (201) Article rating: No rating
Read more

Categories: TIG Blog

Tags:

Thursday, December 14, 2017

14

Dec

2017

What’s Your Data Worth?

Have you ever wondered what your data is worth on the dark web? Recently, RSA went undercover in the dark web to find out just how pervasive “dump” selling was and what your information is worth.

RSA and Fox Business News Report found the following:

Social

  • Instant Messaging ($1-$5)
  • Emails ($1-$3)
  • Dating Sites ($1-$10)
  • Social Media Websites ($3)

Finance

  • Financial Services ($7-$10.50)
  • Online Money Transfer Services ($0.0-$15.50)
  • Bank Accounts ($3-$24)
  • Credit Card Websites ($3-$5)
  • Accounts from Recent Breach ($1)

Travel/Leisure

  • Airlines ($3-$10.50)
  • Hospitality Services ($0.7-$1.50)

The scariest part of these findings is that dating accounts have quickly become the third & fourth most valuable type of account to resell on the dark web. The reason? It provides the attacker with enhanced knowledge giving them the ability to generate a ‘Synthetic’ Identity. They glean intimate personal details about your life to create a new physical and virtual you in order gain credit, buy property, and obtain enough knowledge to take over your existing accounts by answering deeper security questions such as, “What was your first car?”, “What’s your dad’s middle name?”, or “Who was your favorite teacher in high school?”

So why do businesses & organizations care about this new trend?

Many organizations deploy technologies that are based on the same “Personal Question” methodology. An attacker who knows the answers to these questions can gain access to password reset mechanisms. Likewise, employees often use similar passwords across work and personal sites. More cases are being seen involving blackmail and corporate espionage – when people feel subject to embarrassment or criticism over information they posted on a dating site or social media outlet, they are more susceptible to do unnatural things to keep that information private.

How are you protecting not only your networks and Intellectual Property, but how are you educating your users and protecting them?

Be Vigilant, Stay Aware!

Christian Rolland, BVP, CCDP, CCNP+S, CCNP+R&S
Sr. Practice Director, Enterprise Networking

Number of views (422) Article rating: 5.0
Read more

Categories: TIG Blog

Tags:

Tuesday, September 12, 2017

12

Sep

2017

TIG Achieves New Open Trusted Technology Provider Standard Certification

Excellence in Quality Assurance

San Diego – September 12, 2017 –The Open Group granted Technology Integration Group (TIG) certification to the Open Trusted Technology Provider™ Standard (O-TTPS) – Mitigating Maliciously Tainted and Counterfeit Products. Certification is applicable and available to all ICT providers in the chain: OEMS, integrators, hardware and software component suppliers, value-add resellers and distributors. Being able to identify certified organizations on a public registry not only benefits commercial customers and governments who want to work with trusted technology partners, it also benefits COTS ICT providers, who can identify and choose to work with certified component suppliers, distributors and value-added resellers that would also be listed on the registry – thus enabling a holistic approach, essential to raising the bar on security and integrity for all constituents in the supply chain. The O-TTPS was developed and is maintained by The Open Group and in 2015 was submitted through the Publicly Available Specification (PAS) process to ISO/IEC where it was approved as ISO/IEC 20243:2015. The standard is one of the first standards aimed at assuring both the integrity of commercial off-the-shelf (COTS) information and communication technology (ICT) products and the security of their supply chains. The standard helps safeguard the products and their global supply chains against the increasing sophistication of cybersecurity attacks. “Achieving this certification is part of our commitment to provide our government customers with the highest quality of product and service. The detrimental increase of cybersecurity threats, along with the significant risk of counterfeit or compromised product and how to deter this is important to us… As a result, customers now need assurances they are buying from trusted technology providers who follow best practices.” said Bruce Geier, CEO - Technology Integration Group

Number of views (1281) Article rating: 5.0
Read more

Categories: TIG News

Tags:

Wednesday, August 2, 2017

2

Aug

2017

Demystifying the “Software-Defined Data Center”

Software-Defined Data Center (SDDC) is all the rage. Everyone’s talking about it, but why?

For some, it’s extending the Data Center to the Cloud for simple and fast consumption of resources for workloads, or automation of simple tasks. For others, it may be off-site locations for disaster recovery and business continuity. Whatever the reason, IT is being tasked with provisioning resources for workloads, or faster pace and with guaranteed up time. Insert Software to achieve these ever-increasing SLAs (Service Level Agreements). TIG offers multiple solutions to automate tasks, which in the past would require a ton of time from the Administration team. This took focus from the day-to-day management of the infrastructure and meant potentially leaving migrated workloads less secure or inaccessible. In the last couple of years, TIG has had the ability to architect solutions that leverage virtual networking*, IT automation*, and VSAN*. These solutions can apply policies, so no matter where a Virtual Machine resides, it will have the same security firewall policies and address. Automation streamlines tasks to allow users to request and provision VMs onsite or in the Cloud, and manage life cycle and tear down. TIG has the capable tools to predict the resource consumption*, resource contention*, and where resources may be over provisioned*. This provides detailed reporting on where IT should invest funds to achieve maximum results. These are just a few examples TIG has at its fingertips; we are currently using them internally, implementing into Data Centers across the US and Canada. The easiest and most comprehensive way to help you understand what migration to SDDC looks like – and the potential benefits – is to begin with one of TIG’s assessments. From there, we can help you with Cloud, Automation, Disaster Recovery, Security, Networking, Wireless, Analytics, Business Intelligence and many other solutions.

Number of views (2307) Article rating: 5.0

Tuesday, October 25, 2016

25

Oct

2016

Technology Integration Group Awarded MBDA Minority Technology Firm of the Year

Honored for Excellence in Technology

San Diego – October 24, 2016 – Today Technology Integration Group (TIG) was awarded Minority Technology Firm of the Year by the U.S. Department of Commerce’s Minority Business Development Agency (MBDA).  This prestigious honor took place during the 2016 National Minority Enterprise Development (MED) Week in partnership with the National Minority Supplier Development Council (NMSDC) Conference in Chicago, where Secretary of Commerce, Penny Pritzker addressed the audience and visited with award recipients.  Bruce Geier, Founder & CEO, received the award on behalf of the TIG team and encouraged his peers to mentor and help develop new MBEs.
Number of views (6376) Article rating: 5.0
Read more

Categories: TIG News

Tags:

RSS
12345678910 Last

TIG is a single source IT solutions provider for businesses and organizations of all sizes.

TIG shares with its clients the strength of over 33 years of computer system integration experience and hundreds of long-term manufacturer alliances.


Quick Links

Copyright 2018 by Technology Integration Group