We’ve all heard about the recent global ransomware attacks Petya and WannaCry. The news instilled a sense of fear in businesses around the world, as they illustrated that cybercrime doesn’t discriminate and organizations of all sizes in every industry are potential victims. Despite these high-profile attacks throwing cyber security into the mainstream media, knowledge on how to address cybersecurity varies widely, especially for small and medium businesses (SMBs). This in itself, provides a unique business opportunity for communications service providers whereby they can help address key cybersecurity challenges facing the SMB market.
Challenge #3: Migration to packet. An obstacle to some. An opportunity for others
In the third of our ‘Taming the Big Four’ blog series, looking at the key challenges facing power distributors, Marco Berger, ECI’s Head of Critical Infrastructure Solutions, explores how to upgrade legacy infrastructure smoothly and, just as importantly, see it as an opportunity, not just an obstacle.
In the second of our ‘Taming the Big Four’ blog series, which looks at four key challenges facing power distributors, Marco Berger, ECI’s Head of Critical Infrastructure Solutions, unlocks the door on security.
Challenge #2: Security: how secure does secure have to be?
Let’s be honest, cyber security, or rather the lack of it, has damaged a fair few corporate reputations. We can each probably think of one or two major breaches in the last few years that have caught the power utilities industry napping. Breaches that, with even a slight shift in thinking or approach, most likely could have been prevented.
DDoS is a Threat to Large and Small Operators Alike
Most large scale providers manage Distributed Denial of Service (DDoS) attacks by spreading the attack over as many servers as possible, and simply “eating” the traffic. This traffic spreading routine is normally accomplished using Border Gateway Protocol (BGP) communities and selective advertisement of reachable destinations, combined with the use of anycast to regionalize and manage load sharing on inbound network paths. But what about the smaller operator, who may only have two or three entry points, and does not have a large number of servers, or a large aggregate edge bandwidth, to react to DDoS attacks?
Topics: Cyber Security
L1 Encryption Needed in Today's Networks
When initially introduced into the market, optical encryption was a niche application looking for a market. Optical encryption protects primarily against fiber tapping and traffic cloning, which were not viewed as widespread threats a few years ago.
A Day in the Life of an SMB Account Manager
The single biggest existential threat that's out there, I think, is cyber.
- Michael Mullen, former Chairman Joint Chiefs of Staff
Why Networks Need Security?
At my recent presentation to the 2016 Canadian Utilities Information & Communications Technology Conference in Toronto entitled “Is Your Network Secure or Secured?” I started by explaining to the audience that the purpose of any good security lecture is to scare the audience.
The LightReading Big Communications Event (BCE) for 2017 was held May 24th and 25th in Austin, Texas. The attendees list was strong and the presentations were certainly worth the cost of admission. The show presented a microcosm of the significant issues and themes confronting the telecommunications industry as a whole, with a significant focus on virtualization of network functionality. Other major themes of the show included security, automation, and disaggregation. All of these topics showed up throughout vendor and service provider presentations alike.
Up until the late 2000s, implementing carrier-grade security solutions involved a great deal of struggle and multiple appliances were installed all over the network. Ordinary servers weren’t built to handle the resource-intensive software that would monitor and protect your network. In the modern day, COTS servers have greatly increased their capabilities, allowing complex applications to run on general-purpose computing machines. The next obvious step is to run network security applications using NFV.
Service providers are bleeding! Over the last few years, service providers have had their lunch absolutely devoured by OTT (Over the Top) applications and services: When Skype (or WhatsApp, or Google Hangouts, or Facebook Messenger) allows users to make calls over Wi-Fi and data, for example, consumers pay less than a network would charge them for making an ordinary phone call. When users use the chat functions embedded in these apps, service providers can’t capture the revenue provided by text-messaging rates. When someone cuts the cord and switches to exclusively watching Netflix (or Hulu or Amazon Instant Video), then an entire cable bill’s worth of revenue is lost. As of 2014, telecom companies alone have lost $386 billion to OTT apps, and the meter is still running.