259 Fairport Village Landing, Fairport, NY 14450585-377-8910info@campbellnetsolutions.com

Blog

IoT security for healthcare is in critical condition

IoT security for healthcare is in critical condition

It seems like collectively as an industry, we’ve determined medical and healthcare information as one of the most important segments of data to protect, and rightfully so. As medical IoT starts to become more and more standard, now we’re not only protecting people’s personal data, we’re now responsible for protecting their actual health and, in some cases, their lives. Is that something that network security managers are ready to take on?

IoT security is a headache, a mess and several other flavors of annoying for any enterprise, but in healthcare, it can be literally life and death. Compromising any connected device has two main consequences – one is to enlist devices into a botnet, like the security camera-capturing Mirai, and the other is to offer a passage deeper into any infrastructure the device is connected to. +ALSO ON NETWORK WORLD: What is IoT? + Bluetooth Mesh takes aim at enterprise IoT, but hasn’t taken flight But medical IoT poses additional security risks. For one thing, connected records systems and anything that contains personal information are attractive targets for identity thieves – your Social Security number is all over your medical records. Compromising a medical IoT device and pivoting to other targets on the network could result in a breach of these records, researchers have found . Under certain circumstances, an attacker could exercise direct control over medical equipment , with potentially fatal consequences – witness the infamous hacked insulin pump, which first made headlines all the way back in 2011. The key difference between traditional security and IoT security is visibility, according to Xu Zou, CEO and co-founder at IoT […]

Read More
4 Signs Your IT Strategy is Off Track

4 Signs Your IT Strategy is Off Track

Your IT strategy can be a fickle beast if it’s not planned and managed correctly. The plans are typically crafted pretty well but, as the best laid plans do, they often go awry – and you my not even realize it. Here’s a good article on four things to look for to find out if your strategy has gone off the rails and needs to be reigned in.

Whether the cause is immature technology, outdated processes and skills, or a shift in corporate mindset, IT projects can go wrong at midstream. Having an IT strategy that is fully aligned with business goals is a differentiator that can lead to competitive advantages. Unfortunately, as those of you who have been involved in IT road mapping understand, it is too easy to get off track. The difficult part, is trying to identify exactly what sent you down the wrong path so it can be corrected. When an IT project initially kicks off, there is a clear path to reach the technical goal — and an even clearer vision on how the technology will positively impact the business. Yet somewhere along the line, things go awry and you end up with a technology that no longer aligns with the business. Today, we’re going to look at four potential signs showing where your strategy went off the tracks while chasing some of the latest technology trends. If, by chance, you read this and can relate to one or more scenarios, it may be a sign that it’s time to reassess and rework projects so they properly align with business goals. 1. […]

Read More
A C-level view of SD-WAN

A C-level view of SD-WAN

Are you reviewing SD-WAN for your organization? What are your thoughts? Blessing or curse?

Credit: Thinkstock If you ask a group of 10 people what SD-WAN is, there’s a good chance you will get 10 different answers. So, which one is right? Well, that depends on your perspective. If you take all the marketing and jargon out of the equation it will be something like this: Let’s start off with what the acronym stands for. SD-WAN is a Software Defined Wide Area Network. It is a fresh new approach to how you build your WAN to accomplish the following objectives: Move from legacy packet networking that frequently holds the business back, to an application-policy based approach to build your WAN infrastructure. This is a fundamental shift that is an essential prerequisite for the modern remote office. Eliminate dependencies on your network service provider. Gain the freedom to utilize disparate and sometimes cheaper forms of connectivity to deliver data reliably to remote offices. Make your enterprise and WAN truly cloud-ready. Decouple policy and infrastructure so your applications be delivered to the remote office from the cloud/SaaS/data center in a consistent manner. Eliminate dependencies on proprietary hardware. Gain cost savings and a rapid innovation cycle aligned to business needs. Deliver a great user experience with […]

Read More